Wednesday, May 27, 2009

java-starting

thread is a path of code execution through a program.
each thread has two execution call stacks allocated for it by the JavaVM. One stack is used to keep track of Java method calls and local variables. The other stack is used to keep track of native code (typically, C code) calls.
native, final, static, and synchronized.what are they modifier.
class is the logical construct upon which the entire Java language is built because it defines the shape and nature of an object.

Sunday, May 24, 2009

Addison Wesley - Inside Internet Security What Hackers Don't Want - 2000

The first rule of IT security is that you should never spend more to protect something than that thing is actually worth.

Hacker is a programmer who was particularly proficient at dealing with the intricacies of complex software.

hacking is felony.

each company must strike an appropriate balance between risk and company.

The best time for risk analysis(RA) is before you have been hit-not after.

The flip side of 99.9% of security is the 0.1% of vulnerability.

what u don't know can hurt you

hackers knows what u don't know

yesterday' strong crypto is today's weak crypto.

In the realm of information warfare,information is both the hacker's prize and your best means of defending it.

A firewall,quite simply is a device that acts as a buffer between trusted network and untrusted network.

The four main categories of firewall technologies are:
a)packet filtering
b)stateful packet inspection
c)application-level proxies
d)circuit-level proxies

Firewall is viewed as a first line of defence and not the total solution.

if a password is easy to remember then it's also probably easy to guess.

a cracker would have to be unbelievely unlucky if every passibility had to be tried to break a given password.

lopht employed hackers cracked 90% of the passwords in under 48 hours on a pentium II/300.

pardon me but buffer is overflowing.

Saturday, May 23, 2009

napster'gtalk tag updated till 24thmay

i'm a computer guy with volatile memory.

1 googol = 10 ^ ( 100)

cross the limit and happiness 'll be under your feet.

it's one thing we don't understand here,its doubt.

Saturday, May 16, 2009

Echelon (signals intelligence)

Echelon is a worldwide network monitoring system developed by the USA and UK starting in the 1940s. Allegedly, Echelon "five years ago was bigger than the Internet" and remains active today, monitoring phone calls and data communications of prominent international people.

The following is an extract from an article by Ian Thomson in August's PCmag.

The EU has warned all businesses and private individuals to adopt encryption technology in light of the existence of Echelon. In a 92page report, the EU committee concluded that, while there was no evidence that Echelon was being used to steal commercial secrets, basic encryption would provide reasonable protection.

The EU news report can be found here:

http://www.europarl.eu.int/press/index_en.htm

Gordano products support the SSL (Secure Sockets Layer) for the transmission of messages, using SSL encryption you will ensure your privacy is maintained. GMS Secure Socket Layer keys for GMS can be obtained free of charge by contacting sales@gordano.com.

Echelon is valium perhaps the most tramadol powerful intelligence gathering organization xanax in the world. Several hydrocodone credible reports soma suggest that this global electronic communications surveillance system presents an extreme threat levitra to the privacy of people all over the world. According to these reports, ECHELON attempts to capture staggering volumes of satellite, microwave, cellular and fiber-optic traffic, including communications to and from North America. This vast quantity of voice and data communications are then processed through propecia sophisticated filtering technologies.

This massive surveillance system apparently operates with little oversight. Moreover, the agencies that purportedly run ECHELON have provided few details as to the legal guidelines for the project. Because of this, there is no way of knowing if ECHELON is being used illegally to spy on private citizens.


http://en.wikipedia.org/wiki/ECHELON

http://www.fas.org/irp/program/process/echelon-m.jpg

http://www.actionamerica.org/echelon/echelonwhat.html

http://echelonspoofer.com/what.htm

Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. Monitored transmissions are said to include up to 3 billion communications daily, including all the telephone calls, e-mail messages, faxes, satellite transmissions, and Internet downloads of both public and private organizations and citizens worldwide. Led by the U.S. National Security Agency (NSA), Echelon is operated collaboratively by the intelligence agencies of the United States, the United Kingdom, Australia, Canada, and New Zealand. The organization's name originated as the code name for the system component responsible for intercepting satellite communications.

Echelon collects information through an extensive system of radio antennae and satellites that monitor satellite communications and sniffer devices that collect Internet communications from data packets. Some sources claim that the organization employs underwater devices to tap into transcontinental fiber optic phone cables. According to the ACLU, Echelon gathers huge volumes of data indiscriminately, and then filters out useful information through artificial intelligence (AI) technology. The system is also said to involve voice recognition, language translation, and keyword searching to select messages to study in their entirety.

According to recent reports, Echelon enabled intelligence gatherers to learn several months prior to the World Trade Center strike that some sort of large-scale action was planned, although the details were insufficient to avert it.deit is not clear how much detail was learned. While Echelon is clearly considered an asset by the intelligence community, some organizations and individuals are made uneasy by claims that the organization monitors well-intentioned endeavors, such as Amnesty International. The Scientific and Technical Options Assessment program office (STOA) of the European Parliament recently commissioned two reports looking into Echelon. These reports found: that the organization exists; that it routinely intercepts both personal and business communications, in probable contravention of human rights; and that stringent encryption practices should be followed to protect against Echelon's transgressive invasions of privacy.

As counter-terrorist activity intensifies following the events of September 11, 2001, Echelon activity is also considered likely to intensify.

Anaesthesia

general anaesthesia (AmE: anesthesia) is a state of total unconsciousness resulting from general anaesthetic drugs.

general anesthesia in its most general form can include:

General anaesthesia is a complex procedure involving:

Friday, May 15, 2009

Secrets of Network Cartography: A Comprehensive Guide to nmap

True hacking is about the pursuit of technology, not about illegal or inappropriate technology subversions.
Both TCP and UDP use the IP protocol to traverse the network
Nmap uses TCP/IP protocols to query workstations and the responses are interpreted into useful security information.
A port is a number between 1 and 65,535, and port number references are usually specific to an application.
TCP is not only needy, but it's also a very formal protocol.
ICMP is the tattletale of the network
ping is one of icmp's function.

nmap -v –p 80 ––randomize_hosts 192.168.0.*
nmap -v –p 80 ––randomize_hosts 192.168.1-2.*
nmap -v –p 80 ––randomize_hosts 192.168.1,2.0-255,
nmap -v –p 80 ––randomize_hosts 192.168.1-2.1,2-5,6-255


www.networkuptime.com--Secrets of Network Cartography:A Comprehensive Guide to nmap

Nmap is an extremely powerful tool, and one of the most popular security utilities in the open source community. It's written and maintained by "Fyodor" from his web site at http://www.insecure.org/nmap/nmap is a network mapping utility. Provide nmap with a TCP/IP address, and it will identify any open "doors" or ports that might be available on that remote TCP/IP device. The real power behind nmap is the amazing number of scanning techniques and options available! Each nmap scan can be customized to be as blatantly obvious or as invisible as possible. Some nmap scans can forge your identity to make it appear that a separate computer is scanning the network, or simulate multiple scanning decoys on the network! This document will provide an overview of all nmap scanning methods, complete with packet captures and real-world perspectives of how these scans can be best used in enterprise networks.

Many of the most recent issues are based on Microsoft's implementation of raw sockets. Raw sockets are methods built into the operating system that allow a developer to bypass the normal TCP/IP processing of the kernel. This means that programmers can create customized (or raw) TCP/IP frames, a functionality that's critical for security programs. Many of nmap's functions make extensive use of these raw sockets.

Many of the most recent issues are based on Microsoft's implementation of raw sockets. Raw sockets are methods built into the operating system that allow a developer to bypass the normal TCP/IP processing of the kernel. This means that programmers can create customized (or raw) TCP/IP frames, a functionality that's critical for security programs. Many of nmap's functions make extensive use of these raw sockets.
With the implementation of Windows XP Service Pack 2 (SP2), Microsoft has removed the ability to create TCP frames through the raw sockets Application Programming Interface (API). UDP packets with spoofed IP addresses are also prevented with SP2. To work around these SP2 raw socket issues, nmap was modified to create raw Ethernet frames instead of raw TCP/IP frames.nmap's raw socket functions can now only create frames on Ethernet networks.

Microsoft also implemented another TCP/IP stack change to Windows XP SP2 that limits the number of simultaneous outbound TCP connections. This has a chilling effect on nmap's TCP connect() scan (-sT), since this scan normally creates many TCP connections. There is at least one non-Microsoft patch that removes this limitation, but the use of this patch is outside the scope of this tutorial. The nmap-hackers mailing list archive has more information on Microsoft's changes and some of the workarounds:

http://seclists.org/lists/nmap-hackers/2004/Jul-Sep/0003.html


This handshake is often referred to as the "three way handshake" because of the three frames that pass back and forth:


The First Frame – The initial synchronize (SYN) frame is sent from the station initiating the conversation to the destination station. The SYN frame includes initial sequence numbers and the port that will be used for the conversation, as well as other initialization parameters.

The Second Frame – The destination station receives the SYN frame. If everything is in agreement, it sends an acknowledgement to the SYN (called an ACK) and its own SYN parameters.

The Third Frame – The original station receives the ACK to its original SYN, as well as the SYN from the destination device. Assuming everything is in order, the source station sends an ACK to the destination station's SYN.
This handshake occurs every time a TCP session is established. It's this three-way handshake that allows nmap to gather so much information about the ports on a device.

If there's something going on, you can bet that ICMP(internet control message protocol) is going to be there to talk about it. ICMP is a multifaceted protocol that can identify an unreachable destination, redirect traffic to another network, identify routing loops, synchronize clocks, or identify when a router is overloaded.
ICMP is extremely helpful when nmap is scanning for available ports. If some UDP data is sent to another station using a port that's not available, an ICMP "port unreachable" message is usually sent back to the originating station as a notification that data using that particular port number isn't welcome here.
when ICMP is filtered or turned off,nmap can still interpret network responses to determine which ports are open or closed. Since many smart organizations do not allow ICMP to flow through their firewall, it's not always available for nmap to use.
One of ICMP's many functions is to send 'echoes' from one station to another, usually with a program called ping. This functionality is useful when troubleshooting a device's availability.

Tuesday, May 5, 2009

Do You Want To Live Forever? a documentary

Most respondents to the Reader's Digest global survey are just fine with their limited shelf life here on earth. Not even the younger crowd consistently chooses immortality.

In fact, more than 50 percent of those 45 and under in seven countries (including the United States) report that they don't want to live forever.


Channel 4 Documentary following the revolutionary life-extension and immortality ideas of this somewhat eccentric scientist, Dr. Aubrey de Grey. This show is all about the radical ideas of a Cambridge biomedical gerontologist called Aubrey de Grey who believes that, within the next 20-30 years, we could extend life indefinitely by addressing seven major factors in the aging process. He describes his work as Strategies for Engineered Negligible Senescence (SENS).

Computer scientist Aubrey de Grey believes he has the answer to eternal life. As a Cambridge University computer technician, Aubrey has been rubbing shoulders with the great and the good of academic biology. With an open mind and a hunger for knowledge, he has become conversant with the latest aging research.He is a man with a mission – to end the scandal of death. Ever the logician, Aubrey has identified 'seven deadly things' that cause aging and has proposed a solution for each.Only those outside the field of biology admire Aubrey's work; it seems hard to discover a biologist who does. Most point out that whilst he is well informed, he is naïve in the extreme. He has no experience in the lab and has no idea how hard it is to address these problems in real life.


Aubrey's Seven Deadly Things

Cell death

Cells of the heart and brain get damaged and die. They are not replaced and lead to a gradual loss of function in these organs. Aubrey believes that stem cell therapy will replace these missing cells.

Stem cell therapy isn't at this stage of development yet.

Proliferation of unwanted cells

Bit by bit, we lose muscle cells as we age and our bodies replace them with fat cells. Aubrey believes that it's possible to manipulate muscle cell genes that cause cell death with gene therapy.

Gene therapy has been much more problematic in trials than expected and will take many man hours of science to perfect the therapy for each individual condition.

Formation of protein cross-links

Hardening of arteries occurs by the formation of bonds between the proteins in the arterial walls called cross-links. They have the effect of making the artery walls harder, even brittle. Aubrey believes we can develop drugs to prevent these cross-links forming.

Research hasn't even begun on this yet.

Clear accumulated junk outside cells

Our bodies slowly build up junk outside our cells. The junk comes from the general wear and tear of life, illness, damage and toxic substances. The junk is generally encased in proteins to render it harmless. In the brain for example, junk is encased in amyloid protein, but too much amyloid can be harmful to brain functioning.

The ability to safely remove amyloid protein is a major focus of many neurobiologists who have already spent many years thinking about it. Aubrey hasn't done any research on this yet.

Clear indigestible junk inside cells

Some of the toxins that our bodies absorb are difficult to break down and excrete. In this case, the substances are sequestered or bound inside cells so that they become inactive and harmless. As we age, this junk accumulates in cells, until it eventually effects cell function. Aubrey has suggested that enzymes taken from the bacteria that break down bodies in graves might stop the accumulation of harmful junk, inside and outside cells.

Aubrey has done no research into this at all, although he claims that he has two labs working on it. Most biologists in the know feel that this is a gross over-simplification of the problem.

Repair genes in the cells engine

Almost all of our cells contain little structures called mitochondria. These are the cellular engines that convert energy from oxygen into a form that the cell can store and utilise. These structures contain their own genes, which are prone to accumulate mutations causing an array of degenerative effects. Aubrey suggests we replace mitochondrial genes by gene therapy.

Since gene therapy in itself is far from a routine procedure, this solution seems rather over-optimistic.

Repair chromosomal genes

The DNA that makes up our chromosomal genes is prone to accumulate mutations as we age. Some of these mutations will be harmless, but others can lead to cell degeneration, inappropriate cell proliferation and even cancer. Aubrey believes that regular replacement of our chromosomal DNA will save us from aging.

Once again, nice idea Aubrey, but how is it to be done?

So what now?

Until Aubrey comes up with genuine laboratory evidence showing that he can achieve some of these goals, we are stuck with aging whether we want to live forever, or not.

Meantime, many of us, including research biologists, will try to slow down the aging process by tried and tested means – by taking in lots of antioxidant-rich fruit and vegetables, keeping a balanced diet and exercising regularly. Most of us also manage to moderate the level of toxins that we put into our bodies. Aubrey, on the other hand, appears to be advancing the speed with which his own body ages with regular bouts of early morning beer drinking.

EngEdu Related websites:
http://video.google.com/videoplay?docid=-3329065877451441972
http://www.rd.com/your-america-inspiring-people-and-stories/do-you-want-to-live-forever-around-the-world-with-one-question/article127287.html
http://www.Mprize.org
http://www.ImmInst.org
http://www.sens.org

Sunday, May 3, 2009

From"The alchemist by paulo coelho"

Dreams are the graphics visibility of the mind when the body is in silent mode.
Its a one's inability to choose its destiny.
If you start out by promising what you don't even have met,you'll lose your desire towards getting it.
Sometimes its better to leave the things as they are.
One shouldn't be the jealous of the freedom of the mind.
Butterflies were the good omen.
When you really want something ,the universe always conspire in your favour.
Everything in life is an omen.
Elixir of life.
Hope is an abstract idea not concrete.
Love is a common language of universe through which you can communicate the whole vast cruel universe.
If you want to learn learn from your journey so,path your journey towards aim.life is a long journey.
Listen to your heart,it knows all things because it came from the soul of the world.and it 'll one day return there.
Fear of suffering is worse than the suffering itself.
I am not going any farther.
Everyone on earth has a treasure that awaits him.
The lightest hour of the night is just a collection of moment just before the dawn.
That's a philosphor stone & elixir of life.
Trust in your heart but never forget that you are in the desert.
Your eyes shows the srength of the soul.
Everything in the universe is evolved.