Monday, 31 October 2011

What were Steve Jobs’ last words?


Describing Steve Jobs a tender and loving soul, Apple’s visionary co-founder’s biological sister has revealed his last moment and the enigmatic words he uttered before he died. In a touching eulogy about her late brother at his memorial service on October 16, Mona Simpson told the group of mourners that Steve Jobs looked at his wife and children, then beyond them, before uttering, “OH WOW. OH WOW. OH WOW”.
Describing his death in the eulogy reprinted in the New York Times, she said that Steve’s final words were monosyllables, repeated three times.
“Before embarking, he’d looked at his sister Patty, then for a long time at his children, then at his life’s partner, Laurene, and then over their shoulders past them, before saying his final words,” she said.
According to the Daily Mail, Simpson recalled that, as Jobs was dying, he seemed to ‘be climbing’.
“His breath indicated an arduous journey, some steep path, altitude,” she said.
She told how Jobs had called her the day before and told her ‘hurry up to Palo Alto’ and that he was ‘sorry, truly deeply sorry, to be leaving us’.
“He told me, ‘I’m telling you now because I’m afraid you won’t make it on time, honey’,” she said.
Simpson, a novelist and a professor of English at the University of California, first met her brother when she was a struggling writer in New York aged 25.
She described in the eulogy how she waited her whole life for a man she could love and would love her in return. She thought she would find this man in her father or future husband, in fact, she found it in her brother.

Duqu malwar


Symantec Corp. researchers have revealed the presence of new malware that is strikingly similar to the dangerous StuxnetTrojan, and could be a precursor to a future Stuxnet-style attack.
Symantec Security Response researchers say Duqu (pronounced dyü-kyü), named because it creates files with the file name prefix “~DQ”, was first identified on October 14. The security vendor issued a report Tuesday outlining its analysis of Duqu (.pdf).
The Mountain View, Calif.-based vendor said parts of the Duqu are nearly identical to Stuxnet, indicating it was created by someone who has access to the Stuxnet source code.
Unlike Stuxnet, which was created to disrupt industrial control systems, Win32.Duqu was designed to gather intelligence data and assets “in order to more easily conduct a future attack against another third party,” Symantec said. It was recovered from computer systems in Europe and researchers only began analyzing the malware last week.
“The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility,” Symantec said in its report.
Duqu Trojan infections were discovered in Europe, mainly in industrial control systems manufacturers, said Kevin Haley, director of Symantec security technology and response. Haley said it’s not uncommon for malware authors to reuse their code.
“Because of the amount of time and effort that went into creating the Stuxnet code, it’s not surprising that the people behind it would try to reuse it,” Haley said. “Stuxnet was an incredibly complex piece of code and something you would want to get your money’s worth out of.”
It’s currently unknown how the malware spreads. Researchers are scouring the Internet to find the installer and determine how systems can be infected by the malware, Haley said.
According to additional analysis by McAfee researchers, attacks appear to be also targeting certificate authorities in Africa, Southeastern and Central Europe and the Middle East. McAfeeis warning CAs to analyze their systems for the malware.
Once a system is infected with Duqu, attackers install a keylogger, which records keystrokes and seeks out additional system information. Symantec said the mawlare can copy lists of running processes, account details and domain information. It can take screenshots, record network information and explore files on all drives, including removable drives.
“In one case, the attackers did not appear to successfully exfiltrate any sensitive data, but details are not available in all cases,” Symantec said.  Stolen data is sent to a command-and-control (C&C) server, which, according to McAfee, has been blacklisted by the ISP and is no longer functioning.
Two variants of the malware were recovered, and Symantec data suggests attacks using Duqu could have been conducted as early as December 2010. Symantec said the Trojan is configured to run for 36 days and then it automatically removes itself from the infected system.
The short lifespan of the malware indicates it has a specific target, said Jason Lewis, chief technology officer at Baltimore-based security software services firm Lookingglass Cyber Solutions. Lewis, a former global network exploitation and vulnerability analyst with NSA, said it was likely authored by a nation state, given the time and resources it takes to develop a sophisticated piece of malware.
“It’s meant to be stealthy, so if they can’t get the data they need they’ll try something else,” Lewis said. “Because of the time and money that goes into developing something like this, you don’t want someone to discover it right away and then have Symantec analyze it to push out detection signatures.”
The StuxnetTrojan, which surfaced in 2010, was heralded by most security experts as a uniquely sophisticated piece of malware. It targeted Supervisory Control and Data Acquisition (SCADA) systems, which are used to manage power, water and sewage plants and other industrial facilities.
Stuxnet specifically sought out Siemens' SCADA software and was designed to then inject itself into the programmable logic controllers that automate the most critical parts of an industrial facility's processes. The New York Times reported in January that Stuxnet wasa joint effort by the U.S. and Israeli governments, created to take down Iran's Nantaz uranium enrichment facility, which reports suggest it did successfully.

Friday, 28 October 2011

Facebook Video Player For Chrome Browser


fb player 
Facebook Video Player is a simple Chrome extension that allows you to play Facebook videos in a fixed block so that you can scroll down the actuality page and continue to read posts. The extension automatically starts working once you install it and reload the Facebook tab. Once installed, just click on any video on your Facebook stream. A new block will appear at the right side of the Facebook screen displaying the video you clicked on.
The new block created by the extension will appear at the right side as a fixed element on the page, hiding the Facebook new ticker feed, so that you’ll be able to scroll down to view other Facebook statuses. There is a button next to the name of the Video you’re playing, clicking on it will remove the block and make your Facebook screen back to normal including the ticker feed.
While playing the video in the right side block, you might have trouble seeing the contacts in the chat list, as the block hides some area of Facebook chat behind itself. But it allows you to browse the network regardless of the video playing on the right hand side of the Facebook screen. You can click on the ‘X’ button to remove the block anytime. The extension is in its alpha stage, you can expect weird goings-on throughout. You can install ‘Facebook Video Player’ for Google chrome browser from here.

Latest Security Flaw in Skype Enables IP address & Location Tracking



Surprise surprise! There's a new flaw in the 'system' that tracks down the user's location through their IP address.

It has been reported that any skilled hacker can now find out the location of a user logged into their account. This gives us another reason to be 'extra careful' when using programs and softwares that help us communicate with our loved ones and a few not-so-loved!

The company, however, is trying to recover from the shock and claiming that the ability to derive IP addresses was common with all web based communication clients. They probably don't know how terrifying this can be for some people. A massive security and privacy breech, i mean, c'mon!!

Adrian Asher, Skype's chief information security officer, said:


Just as with typical Internet communications software, Skype users who are connected may be able to determine each other's IP addresses. Through research and development, we will continue to make advances in this area and improvements to our software.
The blind spot can be abused by many a proficient hacker and that too, on a massive scale. This was observed by the company when they demonstrated to millions of users how their location can be tracked.

We feel comfortable saying that we have gotten pretty used to third party apps and programmes misusing their privileges. But the information we provide is worth being taken notice of. We request our readers to think twice before doing anything that we ask you NOT TO DO.

How To Use ‘Trusted Friends’ Feature On Facebook

Facebook is now a home to more than 800 million members. So it’s the first and the foremost responsibility of the Facebook to protect all user’s personal information. However, several new security features have been added recently to the gaint social network by the Facebook team to ensure that everyone’s personal information is safe. I’ve already written a detailed post on how to use new security features on Facebook. You must read that blog post.

Today Facebook has announced two more security features – Trusted Friends and Application Passwords – that will make users feel even more secure on the network. Application Password does work like Google’s application specific password. There are tons of third party applications, which aren’t compatible with ‘Login approval’ feature and requires your Facebook credentials in order to use the app. For these 3rd party applications, Facebook now allows you to generate an app password that you can use to securely log into third party applications such as Jabber, Skype, Xbox instead of your Facebook account password. You can play with this new feature by heading over to Facebook security settings and then ‘App Passwords’.

Now let me tell you about ‘Trusted Friends’ and how to use this feature on Facebook. Suppose you have been locked out of Facebook or you account has been hacked, the conventional process to get your account back is using your email address or mobile number to reset the password. The worse is, if both email address and mobile number associated with your Facebook account have been changed what will you do then? In that case, you can use ‘Trusted Friends’ feature. This feature allows you to pick 3-5 friends on Facebook who you most trust, as whenever you are locked out of Facebook, by using this new feature you can tell Facebook to ask your friends that you are the real owner of this profile.
You might also like How To Tag Friends Using Facebook Mobile OR SMS
Facebook explained, in the official blog post, the feature as ‘It’s sort of similar to giving a house key to your friends when you go on vacation–pick the friends you most trust in case you need their help in the future’. To get started using this feature, all you need to do is choose the ones you most trust and be careful while choosing them, as you have to rely on them to access Facebook account.

How to set up this feature on Facebook
If you’re interested to know more about how to set up ‘Trusted Friends’ and how it will work afterwards, continue reading the post and follow the steps mentioned below.
1) Go to your account settings on Facebook. On the next page, look out for ‘Security’ option in the left sidebar and click on it. Under security section, click on ‘Trusted Friends’.
2) Next, click on ‘Choose Trusted friends’ and pick friends from the list. I’m again informing you that be careful while choosing friends in this step. Choose only those friends who you most trust. You are allowed to pick 3-5 friends and each will be asked separately that you’re the legitimate owner of the account.


                                                                                                                        
         
3) Now whenever your Facebook account gets locked out, simply go to ‘Forget your password’ and reset using ‘Trusted friends’ option. Once you opt for ‘Trusted Friends’ option, Facebook will send a unique code to each friend in your ‘Trusted friends’ list. Now it’s time for you to call your friends and collect the unique codes sent to their accounts.
How To Use Trusted Friends Feature On Facebook thumb How To Use Trusted Friends Feature On Facebook
As soon as you get all the unique codes and press the ‘Submit’ button, you are allowed to enter into your Facebook account. This is a very interesting security feature that keeps your more secure on the social network. If you have any questions of any kind about Facebook, I’d surely like to help you. Just drop-in your comments below. Don’t forget to download the Facebook Security Guide that contains more than a dozen tips that will surely help you to know how you can protect your personal information from stalkers.