Sunday 21 December 2014

Five ways to secure e-mail from hackers

The more concern about today's security for the companies related information is being hacked by sending malicious links to the e-mails of the employees which will ask for the details of the credit card numbers. 
Here are five simple steps to make e-mail more secure and limit the harm a hacker can cause:

1) Archive early and often

Most corporate e-mail systems allow people to set up regularly scheduled archiving so that e-mails are moved off of the server after a certain number of days.You can still check archived e-mails on your work computer, but they are no longer easily accessible on websites outside the office or on your phones. The limits hackers ability to access those e-mails too. You can make exceptions for e-mail that you want to keep in your active inbox, and they won't be archived.

2) Get Organised

As e-mails come into your inbox, deal with them. Sort them into folders. This segments your data, requiring an attacker to know which folder to go or to take multiple steps to search for wanted information.
Paired with archiving it also ensures that what the hacker does compromise is limited and known for any future damage assessment. Sensitive information can also be removed from your inbox. For example delete an e-mail and save what you need to your hard drive or an external drive.

3) Keep work and personal mails separate

Don't use your work e-mail for personal e-mail or activities online. That limits details a hacker can glean about you to conduct more sophisticated attacks targeting you as the entryway into your company's system.
For example hackers can learn about your shopping habits or personal hobbies and use those to send a phishing e-mail that appears to come from websites you bought goods from or read frequently.Phishing messages route you to a fake address and allow hackers to gain access to your system.

4) Don't click on unexpected links

If you receive an e-mail with a link or attachment you weren't expecting, send the person a separate e-mail asking whether the first e-mail was legitimate.
For links from companies such as banking institution, hover your cursor over the hyperlink to right-click to show the link's final destination. Before you click make sure the address that pops up when you hover over the matches where the hyperlinks say you'll be sent.
If unsure use a new window and physically type in the website's address to conduct your business.

5) If you see something say something

 If your e-mail is acting up or a link or attachment trikes you as strange forward it to your IT department as quickly as possible. Your attention and fast response may prevent someone else at your company from making a mistake. 


Monday 8 December 2014

Mobiscope: an app for IPhone

Sicher App

Mobiscope Cloud completes your video surveillance system with intelligent cloud-based DVR and mobile apps for instant on-the-go access to live video stream and stored recordings.

Mobiscope Cloud is compatible with hundreds of popular network cameras out of the box and it DOESN’T REQUIRE ANY ADDITIONAL HARDWARE OR SOFTWARE FOR YOUR COMPUTER – all you need is Mobiscope app on your smartphone or tablet. With Mobiscope Cloud you’ll have professional video surveillance solution up and running in under 5 minutes!
To turn a webcamera into surveillance camera for Mobiscope Cloud simply install Mobiscope Desktop Camera app on your Windows or Mac OS X computer!

Friday 21 November 2014

Tracking Mobile for investigating criminal cases

        A mobile cellular system such as Idea or Airtel is primarily meant for providing communication to people on the move that is why it is called mobile communication network. In a mobile network, except the subscriber's handset which is called a mobile station(MS) all network systems such as Base Transceiver Station(BTS) base station controller(BSC) and mobile switching center(MSC) are fixed installations. A mobile subscriber(MS) can be anywhere at any time. But the mobile network must know where the mobile subscriber is. This is to facilitate routing the call to the MS whenever there is a call coming for the subscriber. Therefore, by design, the mobile station is programmed to intimate its own MSC where mobile is switched on. This information is known as Location Updating.
     
        When a subscriber number is known and the subscriber switch on the mobile station, the location updating takes place and the network knows where the mobile is and under which BTS it is located. The information is passed to the investigating agencies by the network operator. This way, the mobile can be tracked for investigations. 


Wednesday 19 November 2014

Android 5.0 Lollipop faces off Apple iOS 8: Which OS is better?

Android 5.0 Lollipop faces off Apple iOS 8: Which OS is better?

  There’s no operating system that can be called perfect. Despite the fact that Android leads the mobile OS game, running on 84% of smartphones globally, it’s known to have some rough edges. With the latest version of Android, called Lollipop, Google aims to smoothen these rough edges with plenty of design improvements, new features and security upgrades.
Android’s closest rival is Apple’s iOS, which runs on 12% of smartphones shipped globally. It’s been two months since Apple launched iOS 8 – the latest version of its operating system for iPhones and iPads. With better multitasking and support for third party apps and widgets, Apple calls it the biggest update since the launch of the App Store.

Look and feel
iOS 8 is just like iOS 7 in terms of the overall look and feel. It uses colourful and flat vector-based icons, while other aspects of the UI stick to basic colours of blue and black with a white background.
While iOS 8 continues to be conservative with subtle colours, Android has always been the more colourful one. However, we’ve noticed Android steadily toning down its colours with each iteration.
android_lollipop_002

Android 5.0 Lollipop goes a step further in that direction. While it uses a fantastic colour scheme as part of its ‘Material Design’, the colours are lighter and you see a prominent white background instead of black (except for the app drawer, which still uses a black background). It’s also good to see other Google apps including Gmail, Google keyboard and Google Maps, carry on the same design language.

Features
As always,  Android offers lot more features than iOS 8, including the option to add multiple users, the ability to cast the screen to a separate device without the need for installing a third-party app and making calls from the lock screen. The latest Android 5.0 Lollipop update takes this one step ahead by making these features easier to use.
In terms of refinements, again, both are pretty close to reach a level where it gives users enough control without overwhelming an average user. For example, with Lollipop, you now see how much more time you have before you’ll need to charge the device again, which is missing in iOS 8. However, iOS 8 tells you exactly which apps have been consuming battery and by how much, so you can delete unnecessary apps – a feature we would have loved to see in Android Lollipop.
android_lollipop_001

Android 5.0 Lollipop now lets you control which notifications can appear on the lock screen. iOS 8 also gives you this option, but it also lets you dictate which apps can push notifications on a locked screen.
iOS 8’s built-in keyboard lets you send voice clips other than photos and text. However, voice clips can only be sent through iMessages i.e to a fellow Apple user and not to non-Apple devices. It introduced predictive text, which does a great job at helping you complete the words you are about to type. You can also disable the suggestions while you are using the keyboard. If you’re unhappy with the keyboard, you can switch to third-party keyboards apps.
iOS 8 predictive text


Android Lolliop’s stock keyboard is very different from the one on iOS 8. It’s flatter and, as usual, lets you ‘swype’ instead of typing individual keys. While iOS 8’s built-in keyboard does not let you swipe text, both keyboards are equally accurate and intuitive to use.
Unlike Android Lollipop, iOS 8 separates the notification and shortcuts for quick settings. While notifications appear on the top dropdown, the Control Center lets you swipe upwards from the bottom of the screen to give you quick access to Bluetooth, Airplane and Sleep modes, Wi-Fi and auto-rotate options. However, it lacks the GPS/Location setting which you’ll find on Android 5.0 Lollipop.

iOS 8 separates quick settings and the notification area

Android Lollipop has uncluttered its notification dropdown and includes essential quick settings such as Wi-Fi, Bluetooth, Auto rotate and Location. Like iOS, there’s now a flashlight option. Plus, there’s more you can do now – you can switch between users directly from the notification screen, tap to reply to message notifications and cast the screen on to a connected device.
To put it in a nutshell, Android has more features to offer, while iOS 8 has limited features that are a bit more refined.

Verdict
It’s a tough call. Having used both iOS 8 and Android 5.0 Lollipop, I must say that I’m impressed by both. The latest mobile OSes from Google and Apple, take inspiration from each other to make their existing mobile platforms even better. The complete design overhaul in Lollipop shows that Android is trying to refine its features and make them easier to use, while Apple is being more open and trying to give users more control over their devices. You can tell this from the addition of widgets, support for third party keyboards and the battery-usage feature. Similarly, both operating systems have some useful features that you won’t find in the other.
In the process of one-upping each other, both are getting to be more alike, which should help those who are looking to make a switch from iOS to Android or vice versa. However, this also means that there’s no clear winner among the two major mobile operating systems.

Friday 14 November 2014

Apple downplays Masque threat, 'not aware' of any users affected

In Apple's first statement since a vulnerability in its popular mobile devices was described by security specialists, the company said Thursday that it was unaware of any user actually being hacked through the "Masque Attack" technique.

"We designed OS X and iOS with built-in security safeguards to help protect customers and warn them before installing potentially malicious software,' an Apple spokesman said in an emailed statement. "We're not aware of any customers that have actually been affected by this attack."

On Monday, researchers with Milpitas security firm FireEye described a path through which hackers could take over a legitimately downloaded iOS mobile application and potentially siphon personal information. The malicious software would be delivered through an app downloaded from the Web, which Apple and FireEye strongly warned against.

"We encourage customers to only download from trusted sources like the App Store and to pay attention to any warnings as they download apps," the Apple statement read. "Enterprise users installing custom apps should install apps from their company's secure website."

An approach similar to the Masque Attack vulnerability was used in software found on a site offering Mac applications in China that could attack iPhones and iPads as they synced with Apple PCs. That vulnerability was disclosed last week by FireEye rival Palo Alto Networks.


Wednesday 5 November 2014

Authentication for iPhones and iPads

Proxy-based user authentication is supported by the Content Gateway (proxy) component of Web Security Gateway and Web Security Gateway Anywhere, resulting in user- or group-based filtering.
User identification via DC Agent is not supported and, therefore, there is no user- or group-based filtering solution with Web Filter or Web Security. Filtering can be provided to those devices based on IP address or network range.
Content Gateway user authentication has the following features and restrictions:
1)   Works with the authentication method configured in Content Gateway. Users must belong to the associated user directory.
2)   Supports the Safari browser. Other browsers may not work as expected.

3)   Transparent authentication is not supported. The user is always prompted for credentials.
4)   Works in transparent and explicit Content Gateway deployments.

5)   Many iPhone and iPad apps do not work well with Content Gateway (or any Web proxy) because they are not well programmed to handle proxy user authentication.
Explicit proxy settings can be configured in the iOS Network settings area.





Tuesday 4 November 2014

Camparison between Linux and Windows Operating System's




Properties

Linux


Windows

What is it?
Linux is an example of Open Source software development and Free Operating System (OS).
Windows is the family of operating system (OS) from Microsoft, which is the most famous OS in the world.
Cost
Linux can be freely distributed, downloaded freely, distributed through magazines, Books etc. There are priced versions for Linux also, but they are normally cheaper than Windows.
For desktop or home use, Windows can be expensive. A single copy can cost around $50 to $ 450 depending on the version of Windows.
User
Everyone. From home users to developers and computer enthusiasts alike.
Everyone. From home users to developers and computer enthusiasts alike.
Manufacturer
Linux kernel is developed by the community. Linus Torvalds oversees things.
Microsoft created the Windows operating system, but allows other computer manufactures to distribute their own computers with Windows pre-installed.
Usage
Linux can be installed on a wide variety of computer hardware, ranging from mobile phones, tablet computers and video game consoles, to mainframes and supercomputers.
On PC's desktops, laptops, servers and some phones.
Development and Distribution
Linux is developed by Open Source development i.e. through sharing and collaboration of code and features through forums etc and it is distributed by various vendors.
Windows is developed and distributed by Microsoft
GUI
Linux typically provides two GUIs, KDE and Gnome. But there are millions of alternatives such as LXDE, Xfce, Unity, Mate, twm, ect.
The Windows GUI is an integral component of the OS and is not replaceable. This can be a con when it comes to Windows 8's Metro.
File system support
Ext2, Ext3, Ext4, Jfs, ReiserFS, Xfs, Btrfs, FAT, FAT32, NTFS
FAT, FAT32, NTFS, exFAT
Text mode interface
BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters
Windows uses a command shell and each version of Windows has a single command interpreter with dos-like commands, recently there is the addition of the optional PowerShell that uses more Unix-like commands.
Price
Free but support is available for a price
$50-$450
Security
Linux has had about 60-100 viruses listed till date. None of them actively spreading nowadays.
According to Dr. Nic Peeling and Dr Julian Satchell's “Analysis of the Impact of Open Source Software” there have been more than 60,000 viruses in Windows. Anti Virus cost about $20 to $400
Threat detection and solution
In case of Linux, threat detection and solution is very fast, as Linux is mainly community driven and whenever any Linux user posts any kind of threat, several developers start working on it from different parts of the world
After detecting a major threat in Windows OS, Microsoft generally releases a patch that can fix the problem and it can take more than 2/3 months. Sometimes sooner, Microsoft releases patches and updates weekly.
Processors
Dozens of different kinds.
Limited but most (80%)
Examples
Ubuntu, Fedora, Red Hat, Debian, Archlinux, Android etc.
Windows 8, 8.1, 7, Vista, XP
Gaming
Very few games available natively. Some games can be played through Wine, but often not all features are available.
Almost all games are compatible with Windows. Some CPU intensive and graphics intensive games are exclusive to Windows PC's.
User experience
Although there are many GUI applications, most of the work is done through Terminal (a console window), and if a problem arrises GUI is rarely usable to fix them.
Everything can be controlled through GUI and incompatibility problems are rare.
Graphics performance
Because hardware manufacturers, such as NVidia, often does not provide documentation for linux developers, drivers can not use full card performance.
Combined with newest DirectX versions and full graphics card support the performance is almost as good as it can get
Company / developer
Linus Torvalds
Microsoft
Introduction (from Wikipedia)
Linux is a Unix-like and POSIX-compliant computer operating system assembled under the model of free and open source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released
Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft. Microsoft introduced an operating environment named Windows on November 20, 1985 as a graphical operating system shell for MS-DOS.
Available language(s)
Multilingual
Multilingual
License
GNU/Free
Proprietary
Supported platforms
All
PowerPC: versions 1.0 - NT 4.0; DEC Alpha: versions 1.0 - NT 4.0; MIPS R4000: versions 1.0 - NT 4.0; IA-32: versions 1.0 - 8; IA-64: version XP; x86-64: versions XP - 8; ARM: version RT;
Default user interface
Gnome or KDE (Depends on distro)
Graphical (Windows Aero)
Preceded by
Basic Terminal (CLI)
MS-DOS
Source model
Open Source
Closed / Shared source
Update method
Many
Windows Update
Terminal
Multi Terminal Windows
--


                       

Sunday 26 October 2014

Windows OS Versions

                                       Windows 1.0
-Graphical Personal Computer Operating System Environment.
-Release date – 20 Nov, 1985

Features
-Windows 1.0 is regarded as a "front-end to the MS-DOS operating system", a description which has also been applied to subsequent versions of Windows. Windows 1.0 is an MS-DOS program. Windows 1.0 programs can call MS-DOS functions, and GUI programs are run from .exe files just like MS-DOS programs. 
-Windows 1.0 runs a shell program known as the MS-DOS Executive, which is little more than a mouse-able output of the DIR command that does not support icons and is not Y2K-compliant. Other supplied programs are Calculator, Calendar, Clipboard Viewer, Clock, Notepad, Paint, Reversi, Cardfile, Terminal and Write.

-Windows 1.0 does not allow overlapping windows. Instead all windows are tiled. Only dialog boxes can appear over other windows.

                                      Windows 2.0
-16 bit Microsoft Windows GUI based Operating Environment.
-Release date – 09 Dec, 1987

Features
-Windows 2.0 allowed application windows to overlap each other unlike its predecessor Windows 1.0, which could display only tiled windows. Windows 2.0 also introduced more sophisticated keyboard-shortcuts and the terminology of "Minimize" and "Maximize", as opposed to "Iconize" and "Zoom" in Windows 1.0. 
- Windows 2.0 was also the first Windows version to integrate the control panel.
- New features in Windows 2.0 included VGA graphics (although 16 colors only). It was also the last version of Windows that did not require a hard disk.


                                        Windows 3.0
-Windows 3.0, a graphical environment, is the third major release of Microsoft Windows.
-Release date – May 22, 1990

Features
- Windows 3.0 succeeded Windows 2.1 x and included a significantly revamped user interface as well as technical improvements to make better use of the memory management capabilities of Intel's 80286 and 80386 processors.
- The MS-DOS Executive file manager/program launcher was replaced with the icon-based Program Manager and the list-based File Manager, splitting files and programs
- A number of simple applications were included, such as the text editor Notepad and the word processor Write, a macro recorder the paint program, and a calculator. Also, the earlier Reversi game was complemented with the card game Solitaire
- The Windows icons and graphics support a full 16 colors in EGA and VGA mode
- Windows 3.0 was the last version of Windows to advertise 100% compatibility with older Windows applications.

                                        Windows 3.1 x
- Windows 3.1 x (code named Janus) is a series of 16-bit operating systems, produced by Microsoft for use on personal computers. The series began with Windows 3.1, which was first sold during April 1992 as a successor to Windows 3.0. Subsequent versions were released between 1992 and 1994 until the series was superseded by Windows 95. During its lifespan, Windows 3.1 introduced various enhancements to the still MS-DOS-based platform, including improved system stability, expanded support for multimedia, True Type fonts, and work group networking.

Windows 3.11
On August 11, 1993, Microsoft released an update for Windows 3.1 known as Windows 3.11. Thus, Windows 3.11 is not a standalone version of Windows, but rather a software update from Windows 3.1, much like modern Windows service packs.

Windows 3.2
On November 22, 1993, Microsoft released a Simplified Chinese version of Windows for the Chinese market. A year later, an update was released, which identified itself as Windows 3.2. Thus, Windows 3.2 is an updated version of the Chinese version of Windows 3.1. The update was limited to this language version, as it fixed only issues related to the complex writing system of the Chinese language.



                                       Windows NT
- Windows NT 3.1 is a 32-bit operating system developed by Microsoft. It constitutes the first operating system of the Windows NT family and was released on July 27, 1993. Although it is the first version in the NT line, the name was chosen as a brand extension of the similar Windows 3.1.
- The operating system's success on the market was only limited, mostly due to the high system requirements for its time and the lack of 32-bit applications which used the capabilities of Windows NT 3.1.

                                        Windows 95
- Windows 95 (code named Chicago) is a consumer-oriented graphical user interface-based operating system developed by Microsoft. It was released on August 24, 1995 and was a significant progression from the company's previous Windows products.
- Windows 95 integrated Microsoft's formerly separate MS-DOS and Windows products.
- There were also major changes made at lower levels of the operating system, such as moving from a mainly 16-bit architecture to a preemptively multitasked 32-bit architecture.
-  It also introduced numerous functions and features that were featured in later Windows versions, such as the taskbar,the 'Start' button, and the way the user navigates.

                                        Windows 98
- Windows 98 (codenamed Memphis) is a graphical operating system by Microsoft. It is the second major release in the Windows 9x line of operating systems. It was released to manufacturing on May 15, 1998 and to retail on June 25, 1998. Windows 98 is the successor to Windows 95. Like its predecessor, it is a hybrid 16-bit/32-bit monolithic product with an MS-DOS based boot stage. Windows 98 was succeeded by Windows 98 Second Edition on May 5, 1999, then by Windows ME(Millennium Edition) on September 14, 2000.
 

                                        Windows 2000
- Windows 2000 is an operating system for use on both client and server computers. It was produced by Microsoft and released to manufacturing on December 15, 1999 and launched to retail on February 17, 2000.
- Four editions of Windows 2000 were released: Professional, Server, Advanced Server, and Datacenter Server.
- All versions of the operating system support NTFS 3.0, Encrypting File System, as well as basic and dynamic disk storage. The Windows 2000 Server family has additional features, including the ability to provide Active Directory services (a hierarchical framework of resources), Distributed File System (a file system that supports sharing of files) and fault-redundant storage volumes.
 

                                        Windows XP
- Windows XP is a personal computer operating system produced by Microsoft as part of the Windows NT family of operating systems. The operating system was released to manufacturing on August 24, 2001, and generally released for retail sale on October 25, 2001.
-  Windows XP was a major advance from the MS-DOS based versions of Windows in security, stability and efficiency due to its use of Windows NT underpinnings. It introduced a significantly redesigned graphical user interface and was the first version of Windows to use product activation in an effort to reduce software piracy.
- Windows XP eventually proved to be popular and widely used. It is estimated that at least 400 million copies of Windows XP were sold globally within its first five years of availability, and at least one billion copies were sold by April 2014.
- Windows XP remained popular even after the release of newer versions, particularly due to the poorly received release of its successor Windows Vista. Vista's 2009 successor, Windows 7, only overtook XP in total market share at the end of 2011.

                                        Windows Vista
- Windows Vista is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs.
-   Windows Vista was known by its codename "Longhorn". On January 30, 2007, it was released worldwide and was made available for purchase and download from Microsoft's website.
- New features of Windows Vista include an updated graphical user interface and visual style dubbed Aero, a new search component called Windows Search, redesigned networking, audio, print and display sub-systems, and new multimedia tools including Windows DVD Maker.
- Windows Vista included version 3.0 of the .NET Framework, allowing software developers to write applications without traditional Windows APIs.


                                        Windows 7
- Windows 7 is a personal computer operating system developed by Microsoft, a version of Windows NT. Development of Windows 7 occurred as early as 2006 under the codename "Blackcomb." Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009.
-   With the addition of a redesigned taskbar that allows applications to be "pinned" to it, and new window management features. Other new features were added to the operating system, including libraries, the new file sharing system Home Group, and support for Multitouch input. A new "Action Center" interface was also added to provide an overview of system security and maintenance information, and tweaks were made to the User Account Control system to make it less intrusive. 7 also shipped with updated versions of several stock applications, including Internet Explorer, Windows Media Player, and Windows Media Center.
- Among Windows 7's new features are advances in touch and handwriting recognition, support for virtual hard disks, improved performance on multi-core processors, improved boot performance, Direct Access, and kernel improvements.
                                        Windows 8
- Windows 8 is a personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems. The operating system was released to manufacturing on August 1, 2012, and was released for general availability on October 26, 2012
-   Windows 8 introduced major changes to the operating system's platform and user interface to improve its user experience on tablets, where Windows was now competing with mobile operating systems, including Android and iOS.
-  In particular, these changes included a touch-optimized Windows shell based on Microsoft's "Metro" design language, the Start screen (which displays programs and dynamically updated content on a grid of tiles), a new platform for developing apps with an emphasis on touchscreen input, integration with online services (including the ability to sync apps and settings between devices), and Windows Store, an online store for downloading and purchasing new software. Windows 8 added support for USB 3.0, Advanced Format hard drives, near field communications, and cloud computing. Additional security features were introduced, such as built-in antivirus software, integration with Microsoft Smart Screen phishing filtering service and support for UEFI Secure Boot on supported devices with UEFI firmware, to prevent malware from infecting the boot process.



Robot Fish Can Blend in and Spy on Real Sea Creatures

As the world moving towards the Robotics and Automation, here comes a SoFi - which is called a Robofish developed by Computer Science stude...