Wednesday, January 18, 2012
Hacking Security Cameras | Hacking Through Google
Hacking Personal and Confidential Documents | Hack Using Google
Saturday, January 14, 2012
Stolen Facebook Names, Passwords Mostly Old Data
Wednesday, January 11, 2012
Google Encrypted Search
The new encrypted Google search is easy enough to use. Simply type "https" at the beginning of the URL rather than "http". Doing so sets up an encrypted pipe between your Web browser and Google so that any search traffic is kept private between you and Google.
It is not completely private because obviously Google still has a record of what you searched for. Google has established its reputation based on the "Do No Evil" mantra, and most businesses and users implicitly trust that Google won't do anything insidious with its omniscient cataloging of every bit and byte that crosses the Web. But, Google has faced privacy challenges again and again, including the recent revelation that it has "accidentally" captured and archived intercepted wireless data with its Google Street View cars for years.
Assuming Google can be trusted not to abuse the data it has access to, and that it can be relied on to guard the data it stores from compromise by unauthorized users, that becomes a non-issue and IT administrators can focus on the benefits of the new encrypted Google search.
The most obvious benefit is that searches can't be intercepted. But, for businesses there is another feature of the encrypted Google search which has an even more relevant and directly applicable benefit. Searches conducted via Google encrypted search are not archived in history and won't appear in the autofill during a subsequent search.
While there may be some risk of a network sniffer or other unauthorized interception of search traffic as it crosses from your Web browser to Google and back, there is a much larger risk of intentional or inadvertent exposure of search terms or results from the history and cache data stored locally on the computer.
Searches may yield hints regarding ongoing research and development, confidential intellectual property, upcoming product or service announcements, or other sensitive information that is not intended for unauthorized consumption. Google encrypted search does not store that information, so there is no risk of someone stumbling onto it later.
The Internet Explorer 8 Web browser has an InPrivate Browsing mode which behaves similarly on the local computer. InPrivate Browsing protects the entire browsing session by not saving Web history, cookies, temporary Internet files, or other data. However, it doesn't protect the data as it is crossing the Internet.
The beta of Google's encrypted search only works with the core search functionality--not Images, or Videos, or Maps, etc. It also doesn't keep the browser history clear of URL's that are entered directly (as opposed to via a Google search). Perhaps an even more secure solution is to use the encrypted Google search from within an InPrivate Browsing session on Internet Explorer 8.
Sunday, January 8, 2012
Download Torrents In Your College Without Using Torrent Client
TCP 3-Way Handshake (SYN,SYN-ACK,ACK)
The TCP three-way handshake in Transmission Control Protocol (also called the three message handshake) is the method used to establish TCP socket connections and tear down TCP socket connections over the network. TCP's three way handshaking technique is referred to as the 3-way handshake or as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK). The TCP handshaking mechanism is designed so that two computers attempting to communicate can negotiate the parameters of thenetwork TCP socket connection before beginning communication. This three way handshaking process is also designed so that both ends can initiate and negotiate separate TCP socket connections at the same time. Being able to negotiate multiple TCP socket connections in both directions at the same time allows a single physicalnetwork interface (such as ethernet) to be multiplexed.
3-Way Handshake Description
Below is a (very) simplified description of the TCP 3-way handshake process. Have a look at the diagram on the right as you examine the list of events on the left.
EVENT | DIAGRAM |
Host A sends a TCP SYNchronize packet to Host B Host B receives A's SYN Host B sends a SYNchronize-ACKnowledgement Host A receives B's SYN-ACK Host A sends ACKnowledge Host B receives ACK. | TCP Three Way Handshake (SYN,SYN-ACK,ACK) |
SYNchronize and ACKnowledge messages are indicated by a bit inside the header of the TCP segment.
TCP knows whether the network TCP socket connection is opening, synchronizing, established by using the SYNchronize and ACKnowledge messages when establishing a network TCP socket connection.
When the communication between two computers ends, another 3-way communication is performed to tear down the TCP socket connection. This setup and teardown of aTCP socket connection is part of what qualifies TCP a reliable protocol. TCP also acknowledges that data is successfully received and guarantees the data is reassenbled in the correct order.
Note that UDP is connectionless. That means UDP doesn't establish connections asTCP does, so UDP does not perform this 3-way handshake and for this reason, it is referred to as an unreliable protocol.