Google and LG Prepare Tablet Nexus?

Jakarta Indonesia - Google reportedly is preparing its own Android tablet, in partnership with LG. Although the name is not clear, this tablet will supposedly branded Nexus, together with Google smartphone which came out in two generations, Nexus and Nexus S. This news blows from Eldar Murtazin, a technology activist who often correct in predicting the presence of a new product. According to sources Murtazin, tablet Honeycomb Nexus with Android OS will probably slide this summer. Same with Nexus smartphones, tablet that supposedly will get preferential treatment such as the certainty of the latest OS updates. Google seems to have reached an agreement with LG to manufacture tablets Nexus is driven directly by Google. On the other hand, Murtazin also provide information that Google does not allow the tablet that runs Android Honeycomb 2.x to get updates. If true, it means that such tablets Tab Galaxy 7-inch version can not find the Honeycomb and at best to the Gingerbread. So far, there has been no confirmation either from Google or Nexus LG about the existence of these tablets. Similarly, as reported by The Next Web and quoted on Monday (4/28/2011).

Nokia T7 So New Stud Symbian?

Jakarta Indonesia - Although you have set the operating system Windows 7 Phone as a primary OS in smartphone, Nokia has promised not to get rid of Symbian. Even a leak shows Nokia is preparing a new handset based on Symbian, Nokia T7. This T7 handset leaked on Nokia's Ovi Publishing tools, which presents some of the latest handset Nokia output design. T7 placed under the handset Nokia N8 and given a category 'assumed to work'. Apparently, the handset is being intensively tested by Nokia. Not much detail is revealed in this leak and any form of the handset is not displayed. A quite likely, would adopt Symbian OS T7 ^ 3. Screen size of between 3.5 to 4 inches with a resolution of 360 x 640. The presence of T7, if properly realized, means adding a new series of Nokia that is the beginning with the letter T. Previously existing series such as C, N, or E. Not yet clear when the T7 will glide into the market and at what price range. Similarly, as reported by UnwiredView and quoted on Tuesday (03/29/2011).

Scientists Create From Plastic Processor

What would happen if the processor that had been made with silicon, modified from materials unused stuff? A group of scientists in Europe have used the 4000 plastic, or organic transistors to make a microprocessor out of plastic. The chip size of two inches and built on a flexible plastic foil and medium, which was mentioned as an alternative to silicon. According to Jan Genoe in nanotechnology center IMEC in Leuven, Belgium This chip can be cheap, environmentally friendly and flexible. From the test results indicate that this new chip does not have such power superkompeter and processors in general. The chip can only run a simple program of 16 instructions. This should be hardcoded into the second foil etched with plastic circuits can be connected to the processor. Launched by Eye Tech, the processor is running at 6Hz and the only force able to process information in the eight-bit pieces at most. It is slightly slower than the PC in the era of the 1980s, or indeed not too pretty quick. However, the chip is very thin so that components can be printed onto it like ink. More work is needed to make organic transistors to smaller sizes as well. But if a team to manage it, it will be possible to have an organic gas sensor gas pipe wrap to report any leaks with a flexible microprocessor to clean the noisy signal. It is not possible in the future, the processor-based plastic would be an option to substitute silicon. This of course will be environmentally friendly and cheap, of course.

Facebook will Attract Obama's Former Assistant

Jakarta Indonesia - The social networking giant Facebook is rumored to be to attract former White House press secretary, Robert Gibbs, a senior employee at their company. Derived from the news delivered New York Times, stated that one of the closest assistant of former President of the United States (U.S.), Barack Obama, glance up to organize an intensive communication up to meet an initial public offering scheduled for early next year. Based on information obtained from people close Gibss, before moving to work in the private sector, Gibbs is leaving his career in the White House last month, was asked to assist the general election campaign of 2012, to choose another Obama as U.S. president. However, as reported by Reuters and quoted on Monday (3/28/2011), up wanting Gibbs immediately provide an answer to their offer. There has been no official statement from both. Neither up nor Gibbs declined to comment on.

What Hackers Know About Your Network - That You Do not!

Posted by Tio Jericho Friday, 15 April 2011
Whether you call them hackers, crackers or cyber criminals do not matter. The important thing is whatever you call them - they find a way into your network! 

You may not realize, but the hacker scans the Internet connection you find a gap. 

What will they do if they find one? 

They will carry out attacks against the opening of that to see if they could exploit the vulnerability that will allow them to remotely run some commands by giving them access to your network. 

But it all starts by scanning your network. 

Automatic Tools Are Wonderful Thing 

Cyber ​​criminals do not scan each individual network on the Internet one by one. They have an automated tool that randomly scan any IP address on the Internet. 

Hackers are not lazy - just very efficient. And very smart. 

The tools they use can be loaded with a variety of Internet addresses to scan. As the tool is to find a particular Internet address to the opening to produce a list of addresses and open. 

The list is then put into another tool which is actively trying to exploit that opening with a variety of programs. If it does not exploit the work, hacker program to move to the next potential victim. 

When you look at your firewall log scanning activity, you will know where you are being scanned from and what they're trying to target. Armed with that data security people you should check to see if you're running software that uses that port and if you have any new openings are found. 

If you use the software to listen on a port scan and there is a patch available, you should have a patch that is applied immediately - because the hackers may know something you do not. It is our experience that many businesses patch their Microsoft Windows software, but rarely do they examine the patch to all other software used in business. 

As stated, you will see this activity in your firewall logs - that is, if someone actually review your firewall logs. 

Oh, my firewall log? 

However, when most business owners are asked about their firewall logs, the typical response is usually something like, "Oh, I have a firewall log?" 

Yes, all firewalls generate log files. Most of them only shows what was blocked, which is like showing pictures of all the thieves are in jail, while the bank was robbed on the street. 

Do not you want to see all the traffic? This produces more jobs, but if your firewall only knows about the activity log, the security you really depends on the capabilities of your firewall and how it is configured. 

Many firewall companies want to reduce their number of technical support calls. their business model revolves around having technical support available, but in the process they are also looking for ways to reduce the amount of time an incoming call 

This is not necessarily a bad thing, but when their products have less features, so less benefit as a result - it is a bad thing. 

Most firewalls are designed for the small business market lack the features that most small businesses would benefit from. Many of them have all the technical terms such as "deep packet inspection", "spyware prevention", "intrusion detection" and many others, but they do not go into the level of detail needed to be effective. 

First, many firewalls are "designed" for small business begins with a company that has 100-250 users. This may be considered small businesses by the Bureau of Labor Statistics, but for the purpose of technology companies of this size has its own IT staff (96% do). 

Not just one IT person, but the IT staff, which means someone who might be responsible for security. If not, they will have someone to train them in the installation, setup and monitoring of security tools. 

We consider small businesses have a place 3-50 PCs. The companies at the higher end of this scale may have a person dedicated to dealing with IT issues. But these people are usually very swamped with PC support issues that they have less time "remaining" to effectively monitor the firewall log. Toward the lower end of this scale, they usually have either an outsider or a responsible company or they have employees who are "pretty good with computers" who have other responsibilities. 

These small businesses will rarely have someone watch your firewall logs consistently.Someone might see them on if there is a problem, but the log is spinning when filled so that valuable information may be lost before it ever reviewed. 

And it was embarrassing. 

Without reviewing the logs you do not know what or who is trying to go with where or what. 

An Example Log Files 
Let's review some of the log. 

This happens to be a log of the client. The columns are labeled accordingly. This report has been cleared to make it easier to explain and understand. 

Date Time Source IP Source Port Destination IP Port Objectives 
06/18/2007 12:04:03.416 12200 55.66.777.1 6588 
06/18/2007 12:16:05.192 4925 55.66.777.1 5900 
06/18/2007 13:08:02.256 12200 55.66.777.1 6588 
06/18/2007 13:22:10.224 58,180,199,163 4637 55.66.777.1 2967 

What shows this? 

Well the source of the first IP (Internet) address from Heilongjiang, a province in China.The goal is our client (destroyed to protect the innocent) but the important data is the destination port. That identify what they are looking for. 

Port 6588 can be different things. They can scan for a trojan that uses that port. If they respond with a response typical scan remote access Trojans, they knew that they had found an infected system. Port 6588 can also be a proxy server (which we will not describe here) with a bug recently. This bug allows hackers to exploit by giving them remote access to systems running the software proxy server. 

System hackers will tell them what service listening on port 6588 so they know what this tool to be used to attack the port. 

The second line in our log files above are from Africa. VNC port 5900 is used by many people, many system administrators to remotely connect to a system to perform maintenance on it. This software has several new exploits and one last year to allow the attacker to have remote control of the system with VNC installed without having to crack any password! 

Line 3 has been our friend from China back to try again. Same port. They should try some of the exploitation of this port. Maybe they know something that public safety was not aware of yet. 

On line 4 in our logs we see the new IP address in the source. This one is from Korea but notice that the scanning port 2967. This happens to be a port that Symantec Anti-virus software to listen to the new updates. There is a known exploit that allows remote attackers to execute arbitrary code via unknown attack vectors. When hackers find this port they know exactly what the exploit to try. 

In other words, the security software designed to protect the system is actually a way for hackers because of software bugs. 

There may be a "hole" new in Symantec software that hackers know about but Symantec does not. Previous holes patched so good hackers looking for yet unpatched Symantec software or they know of a new hole and find ways to infect them. 

Without reviewing your log you do not know what is trying to get into your network. 

Without a firewall configured correctly, this type of attack would definitely go. This happens to be our firewall is configured so that we know the port like this and we block access to the outside because the client does not use Symantec products. 

When speaking of security with a business owner that I always ask, "When was the last time your network was scanned for the opening?" They usually respond with, "No". To which I replied, "Oh you are wrong there is you've scanned., You do not know with who!" 

Regular scans of your network showing what hackers see your network. This is a simple process and should be done at least once a month. Results should be presented to you in a report, it is very easy to read understandable. 

What to Do Next 

The first thing you should do is check your firewall to ensure that all logging activity. 

Then, your task is to begin assessing whether the daily log or at least, once a week. 

Some routers have a firewall built-in ". I often find it very limited in their ability to protect.Even more limiting is the function of their logging. Normally this device will only show what is blocked. 

Often this is a router / firewall has an option to have the log emailed to someone when they're filled with entries. This is a good choice because you can have them directed to someone who will (should) review them in detail and advise you of any entry to care. 

If your firewall does not provide the level of detail described in this article, you should seriously consider upgrading. You can save just turn off the existing router firewall features and buy special firewall. 

Then you will know what the hackers know about your network.

Related Post:

No Responses to "What Hackers Know About Your Network - That You Do not!"

Leave a Reply

Thank's for Ur Visited In My Blog