Sunday, June 13, 2010
Windows 7 Sins
The new version of Microsoft's Windows operating system, Windows 7, has the same problem that Vista, XP, and all previous versions have had -- it's proprietary software. Users are not permitted to share or modify the Windows software, or examine how it works inside.
The fact that Windows 7 is proprietary means that Microsoft asserts legal control over its users through a combination of copyrights, contracts, and patents. Microsoft uses this power to abuse computer users. At windows7sins.org, the Free Software Foundation lists seven examples of abuse committed by Microsoft.
1. Poisoning education: Today, most children whose education involves computers are being taught to use one company's product: Microsoft's. Microsoft spends large sums on lobbyists and marketing to corrupt educational departments. An education using the power of computers should be a means to freedom and empowerment, not an avenue for one corporation to instill its monopoly.
2. Invading privacy: Microsoft uses software with backward names like Windows Genuine Advantage to inspect the contents of users' hard drives. The licensing agreement users are required to accept before using Windows warns that Microsoft claims the right to do this without warning.
3. Monopoly behavior: Nearly every computer purchased has Windows pre-installed -- but not by choice. Microsoft dictates requirements to hardware vendors, who will not offer PCs without Windows installed on them, despite many people asking for them. Even computers available with other operating systems like GNU/Linux pre-installed often had Windows on them first.
4. Lock-in: Microsoft regularly attempts to force updates on its users, by removing support for older versions of Windows and Office, and by inflating hardware requirements. For many people, this means having to throw away working computers just because they don't meet the unnecessary requirements for the new Windows versions.
5. Abusing standards: Microsoft has attempted to block free standardization of document formats, because standards like OpenDocument Format would threaten the control they have now over users via proprietary Word formats. They have engaged in underhanded behavior, including bribing officials, in an attempt to stop such efforts.
6. Enforcing Digital Restrictions Management (DRM):With Windows Media Player, Microsoft works in collusion with the big media companies to build restrictions on copying and playing media into their operating system. For example, at the request of NBC, Microsoft was able to prevent Windows users from recording television shows that they have the legal right to record.
7. Threatening user security: Windows has a long history of security vulnerabilities, enabling the spread of viruses and allowing remote users to take over people's computers for use in spam-sending botnets. Because the software is secret, all users are dependent on Microsoft to fix these problems -- but Microsoft has its own security interests at heart, not those of its users.
hack
I found another hacking technique which is quite popular now a days that is USING VIDEO SITES, TROJANS are delivered to your pc. Yes, by visiting a video site, if you download the codec to view the video, you can install a server on your machine.
These technique uses a software called DOWNLOADER which is basically a small client which receives malware on your machine, if installed. Usually if some link is taking you to some page with VIDEO PLAYER but you are not able to view the video ( and you will not able to view the video for sure, because there is no video for you, just an outfit of a video player is there), website will ask you to download the CODEC ( small piece of software which enables the machine to play different types of media files). Actually this will not be a codec, but a trojan program which will be installed on your machine. Now the person who is having server for this DOWNLOADER, can send any kind of malware to your machine. It works like a door for HACKER. Now HACKER can not only retrieve your personal data but also can test his/her viruses on your machine. It helps HACKER to always update his VIRUS before your anti-virus start recognizing the virus.
This is damn good way of spreading viruses and now a days FACEBOOK and GOOGLE are really fighting with this problem. According to CNET News , on your facebook, you will receive a message which will contain google link to view a video, when you click on link, it will take you to some non-google page and ask you to download codec to view the video. and in above mentioned way DOWNLOADER will be installed on your machine.
So, BEWARE ALL FACEBOOK USERS. IF YOU ARE RECEIVING SUCH MESSAGES , DON'T FOLLOW THEM.
ref::
http://news.cnet.com/8301-1009_3-10078353-83.html
These technique uses a software called DOWNLOADER which is basically a small client which receives malware on your machine, if installed. Usually if some link is taking you to some page with VIDEO PLAYER but you are not able to view the video ( and you will not able to view the video for sure, because there is no video for you, just an outfit of a video player is there), website will ask you to download the CODEC ( small piece of software which enables the machine to play different types of media files). Actually this will not be a codec, but a trojan program which will be installed on your machine. Now the person who is having server for this DOWNLOADER, can send any kind of malware to your machine. It works like a door for HACKER. Now HACKER can not only retrieve your personal data but also can test his/her viruses on your machine. It helps HACKER to always update his VIRUS before your anti-virus start recognizing the virus.
This is damn good way of spreading viruses and now a days FACEBOOK and GOOGLE are really fighting with this problem. According to CNET News , on your facebook, you will receive a message which will contain google link to view a video, when you click on link, it will take you to some non-google page and ask you to download codec to view the video. and in above mentioned way DOWNLOADER will be installed on your machine.
So, BEWARE ALL FACEBOOK USERS. IF YOU ARE RECEIVING SUCH MESSAGES , DON'T FOLLOW THEM.
ref::
http://news.cnet.com/8301-1009_3-10078353-83.html
Unthinkable Hacking Techniques !!!
Hi Guys ! I am posting this article for those who use pirated softwares. Because this is the time to stop using pirated softwares. You can't even imagine what your loss can be if you are using your PC for professional purposes.
Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.
Another MOST DANGEROUS HACKING TECHNIQUE is quite undetectable. You know what are you type in browser's address bar is resolved by your ISP's Domain Name Servers. What if your request goes to a hackers's machine first and then goes to ISP. Yes, this is possible a simple VBSCRIPT or WSH Script can do the trick. you won't be able to know that you are being watched or you are being traced. No firewall or no anti-hacking tool wil help you. Usually such scripts might be available as registration scripts for some kind of softwares.
Now About Windows XP users, this operating system's services are available through internet which can be very dangerous. Do you that by default you are all drives are ready to share data over network. Another thing is TERMINAL SERVICES which allows multiple users on a single machine. It means if you are working on your machine, if someone can log in to your machine remotely and you won't be alerted.
If you are downloading Operating Systems from Internet. Then take care that you download from trusted sources only. Cause it is very easy to embed some tracking code into your OS Images which can not be detected later on by any security software.
If you are using LINUX Operating Systems, it is highly recommeded that you use the softwares from trusted sources only otherwise you can be hacked or can cause damage to your machine.
Another good hacking tool is sniffer which is used by network administrator. It scans the network traffic and can filter sensitive information like passwords, credit card numbers etc. So if you are using credit cards at cafes so beware. you can be victim.
Usually we download softwares from various forums/boards which provides cracks or keygens. These keygens are not only keygens but most of the time small server programs (hack tool) which transfers your sensitive data over internet to someone. If you are using Windows Firewall , it is quite easy to bypass the windows firewall. you won;t be able to know that your data is being sent over the internet. and Same thing goes for the CRACKS also. Spreading trojans is quite easy by providing game cracks or some full screen applications. Because user won't be able to know what is going on behind the fullscreen. So beware of using cracks and keygens. Your antivirus may or may not detect such malware. Now a days viruses are created more rapidly than detected.
Another MOST DANGEROUS HACKING TECHNIQUE is quite undetectable. You know what are you type in browser's address bar is resolved by your ISP's Domain Name Servers. What if your request goes to a hackers's machine first and then goes to ISP. Yes, this is possible a simple VBSCRIPT or WSH Script can do the trick. you won't be able to know that you are being watched or you are being traced. No firewall or no anti-hacking tool wil help you. Usually such scripts might be available as registration scripts for some kind of softwares.
Now About Windows XP users, this operating system's services are available through internet which can be very dangerous. Do you that by default you are all drives are ready to share data over network. Another thing is TERMINAL SERVICES which allows multiple users on a single machine. It means if you are working on your machine, if someone can log in to your machine remotely and you won't be alerted.
If you are downloading Operating Systems from Internet. Then take care that you download from trusted sources only. Cause it is very easy to embed some tracking code into your OS Images which can not be detected later on by any security software.
If you are using LINUX Operating Systems, it is highly recommeded that you use the softwares from trusted sources only otherwise you can be hacked or can cause damage to your machine.
Another good hacking tool is sniffer which is used by network administrator. It scans the network traffic and can filter sensitive information like passwords, credit card numbers etc. So if you are using credit cards at cafes so beware. you can be victim.
Thursday, June 10, 2010
To run old s/w of xp in win 7
DOWNLOAD winxp mode 4 win7:
http://microsoft.com/uk/windows/virtual-pc/download.aspx
http://microsoft.com/uk/windows/virtual-pc/download.aspx
Subscribe to:
Posts (Atom)