Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Saturday, March 27, 2010

Hackers invade cell phone: A Hawaii Kai man's bill hits $5,000 for unauthorized calls after he answers a call from a phone number he did not know

 Hawaii residents apparently are falling victim to a scam triggered simply by answering their mobile phones.

Callers then hack into mobile phones and use the phone number to make long-distance calls and possibly gain access to other information.

"It's crazy. ... Now, with all these smart phones ... everybody has to be careful," said Hawaii Kai resident Kaulana Chang.

Chang has one piece of advice after his experience: Use caller identification and don't answer unless you know the telephone number of the caller.

Chang, 30, said he apparently answered a call on his BlackBerry from someone with a number in the 866 area code, which is normally set aside for toll-free numbers.

The caller was able to use a computer program to obtain enough information to use his phone number and charge $5,000 worth of international calls to his account.

Chang said luckily, his cell phone carrier, Sprint, was understanding and canceled the charges.

He said the illegal charges accumulated over a six-month period, and he notified Sprint of them.

Chang, who works as an event coordinator and magician, said that four or five times, he was unable to use his mobile phone when hackers were using it, and he lost business.

"It's not just me. I've had some people ... tell me stories," he said.

Cybercrime specialist Chris Duque, who worked for the Honolulu Police Department for nearly 30 years, said the scam has been happening for several years.

Duque said the 866 area code caller used a computer program to gather information to make third-party calls using Chang's number.

"It's pretty common," Duque said.

He said the scam usually originates in a foreign country, making capture and prosecution difficult.

Duque said these kinds of scams financially affect communications companies.

"The industry is taking a hit," he said. "It goes into the millions of dollars."

Duque said if you don't recognize who the caller is, don't respond.

"Personally, I don't answer calls if I don't recognize the number," he said.

Duque said he waits for callers to leave a message, and if he doesn't recognize them, he doesn't call back.

"You've got to be in control," he said. "You don't let the caller be in control."

He said phone users should be especially suspicious about numbers with the area codes 800, 888, 866 and 900.

HOW TO PROTECT YOURSELF

The Federal Trade Commission said to minimize risk of identity theft:


» Be wary of where you put your personal information, including your Social Security number, mother's maiden name, account numbers and other identifying information.

» Before you share any personal information, confirm that you are dealing with a legitimate organization. Check an organization's Web site by typing its URL in the address line rather than cutting and pasting it. Many companies post scam alerts when their name is used improperly. Or call customer service using the number listed on your account statement or in the telephone book.

Facebook is shoring up its privacy policy as the social media giant continues to expand its testing of thousands of games and applications, prepares for location-sharing and more of its 400 million users are able to interact with friends through third-party sites.

With a posting on its today, Facebook is inviting users to submit comments on proposed revisions to its Privacy Policy and Statement of Rights and Responsibilities.

It is also announcing possible partnerships with websites that Facebook pre-approves “to offer a more personalized experience at the moment you visit the site.”

“In such instances, we would only introduce this feature with a small, select group of partners and we would also offer new controls,” wrote Michael Richter, deputy general counsel for Facebook.

As its popularity continues unabated, Facebook is facing mounting criticism from U.S. privacy advocates and foreign governments over its lack of privacy controls. It is also hearing warnings from the online security community about its vulnerability to hackers.

“It is important to note that, while we’re still developing many aspects of these products, user control over privacy remains essential to our innovation process and we’ll continue to develop new tools to help you control the things you share on Facebook,” Richter said.

Users can view the redlined deletions and additions to the policies. Most of them involve detailed elaborations on the privacy settings available to users.

One section explains in further detail the “Everyone” setting, which is designed to enable users to share content “as broadly as possible.”

“To enable this distribution, we allow others to see, access, display, export, distribute and redistribute content set to ‘Everyone’ and we’ve tried to make this even clearer,” Richter said.

In another revision, the following has been added:

”Your contact information settings control who can contact you on Facebook, and who can see your contact information such as your email and phone number(s). Remember that none of this information is required except for your email address, and you do not have to share your email address with anyone.”

Facebook has come under increasing criticism from European authorities who contend that Facebook users are posting content containing private information on non-users without getting proper consent.

The issue of privacy extends into the area of online security. Both Facebook and Twitter have come under in recent weeks by scammers using phishing emails to gain access to user passwords.

Thursday, March 25, 2010

Trying to access YouTube this morning proved a little difficult prompting me to wonder if the site had been hacked or was experiencing a denial of service attack. a YouTube spokesperson was quoted as saying, "We apologize for the inconvenience, but YouTube is temporarily unavailable. Our engineers are currently working to restore the site."

Though I cannot find any other reports, so this is pure speculation on my part: Last night I noticed that the Google Adsense network seemed to be down for about an hour around 10 PST. I first noticed that all of the Google advertisements on our site were mysteriously gone at around 1800 PST. I then surfed on over to at least a dozen other sites that I know have Google ads only to discover that there was none displayed their either.

Another round of pure speculation: During the same time last night when Google Adsense was not working, GoDaddy DNS seemed to be having a hiccup. The ACW domain is hosted at GoDaddy and I have a DNS redirect to our blogger site. Around 1800 PST last night, when accessing our site, I received a 'Service Unavailable' message from GoDaddy.

If I am right about the Adsense outage and the GoDaddy issues I was having, then that would make GoDaddy and two major Google services down in less than a twelve hour period. This just days after Google went on the offensive with China and a day after GoDaddy joined forces with Google.

This information has been provided by Mike Wright

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

3 Best Gmail Tips: How to Use Custom Gmail Addresses | How to Use Gmail as a Hard Drive | How to access GMAIL without Internet

Use Custom Gmail Addresses

You can make up an unlimited number of arbitrary email addresses to use. You can use all these addresses when making a purchase online or want to track a conversation or anything else.These email addresses you can create using plus-addressing.

Simply append a plus sign (+) and any string of letters or numbers (meaningful to you). For e.g. my mail id is . Now I can create as many custom emails as I can. For all my online shopping’s, I am using amarjitsingh1984+ and to follow any comments stream online I am using amarjitsingh1984+. I can further create subtags such as amarjitsingh1984+News+ & amarjitsingh+News+.

The magic of these email address is that all plus-addressed emails I am receiving to my mail id itself only. Here I can use filters and labels in Gmail inbox as per my convenience.

Some of my favorite uses of plus-addressing are:

· Informing my mates for biking trip: I am inviting all my Venturous Bikers Team usingamarjitsingh1984+ and copying myself a copy to keep track. To finalize a trip, it takes around 20-30 days, so I can easily keep track all emails.

· Subscribing News Letters: All my newsletters I subscribed using unique mail ID. For e.g. useamarjitsingh1984+ to subscribe www.quickonlinetips.com newsletter & using amarjitsingh1984+ to subscribe hacking sites news letter.

Use Gmail as a Hard Drive

GMail Drive (http://www.viksoe.dk/code/gmail.htm) provides 2+ gigabytes of storage allotted to your Gmail account right onto your desktop. It looks and feels just like a regular hard drive, and it’s not available locally of course. This drive is networked.

Open http://www.viksoe.dk/code/gmail.htm and in download section, you will see Gmail Drive. Download it and install.

Enter your Gmail username and password and click the OK button to log in. Your drive will be ready to use. Simply drag and drop the data and files to and fro between your local drive and GMail Drive.

NOTE: Mac OS X (10.3 or above) users should check out the freely available gDisk (http://gdisk.sourceforge.net) that adds a Gmail-powered drive to your desktop.

TIP: Using this Gdrive, no need to stick with pendrive or any other external drive. Go to your friend’s place, open Grive and copy paste the required data. Now come back to you system and open it. SO SIMPLE.

How to access GMAIL without Internet

Using this gmail tool, you can access all you gmail mails even when you are not connected with internet also. Similarly like we are using outlook for or official purpose, you can use gmail. All you mail you send while offline will be placed in you outbox and automatically send when you connected to internet.

Once you turn on this feature, you need to download gmail gears on your system. As long as you stay connected with internet, this gear will continuously synchronize the cache on local system with gmail server .

Just follow these steps to get started:

· Click Settings and click the offline tab in your gmail inbox.

· Select Enable next to Offline Gmail.

· Click Save Changes.

· A POP up window will open asking to install gmail gears on your system. Click install

· After your browser reloads, you'll see a new "Offline" link in green in the upper righth corner of your account, next to your username. Click this link to start the offline set up process and download Gears if you don't already have it.


Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

After an investigation of months conducted jointly with the F.B.I., French authorities on Tuesday detained a 25-year-old Frenchman accused of hacking the Twitter accounts of several high-profile people, including the official account of President Obama and an account for Britney Spears, French media reported Wednesday. The man, known by the alias Hacker Croll, is accused of infiltrating the accounts on Twitter, a social networking Web site, in April 2009. French authorities have not revealed his real name. The man was released Wednesday but is set to face charges in court in June. He could be sentenced to up to two years in prison if convicted.

Go Daddy to Stop Registering .cn Domain Names in China

GoDaddy.com, the world's largest domain name registrar, will stop registering .cn domains in China after the government there has demanded personal information about people who have purchased domain names from GoDaddy in the past, the company said Wednesday during a hearing in the U.S. Congress.

GoDaddy's decision, announced at a Congressional-Executive Commission on China (CECC) hearing, comes after the Chinese government has demanded that the registrar provide photo identification, business identification and physically signed registration for all .cn domains registered through GoDaddy.com in the six years the company has been operating in China, said Christine Jones, executive vice president, general counsel and corporate secretary for the Go Daddy Group, GoDaddy.com's parent company.

"We're concerned about the security of the individuals affected by [the] new requirements," Jones said. "Not only that, but we're concerned about the chilling effects we believe the requirements could have on new domain name registrations, and therefore, the free exchange of ideas on the Internet."

Previously, China's domain-name authority, CNNIC, had only required GoDaddy to collect the name, address and e-mail address of .cn customers, and that information is commonly provided when people register domain names worldwide, Jones said. CNNIC requested the additional personal information for all domain owners in February, and it appeared to GoDaddy that the Chinese government was trying to gain more control over who registers domain names, she added.

CNNIC told GoDaddy that if it did not provide the additional information, "the domain names were going to stop working," Jones said. "We have 40 million domain names under management. We've done this a lot. This is the first time any registry has ever asked use to retroactively obtain information on individuals who have registered domain names through our company."

GoDaddy.com's decision to scale back its Chinese business comes two days after Google stopped censoring search results, news information and photos in China. Members of the CECC praised both companies for taking a stand against Chinese censorship and surveillance.

FOR MORE CLICK HERE

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Wednesday, March 24, 2010

Top 10 posts in cybercriminal operations | Cybercrime organizations often run like corporations, staffed by experts in specific jobs

Criminal hacker organizations are operating with increasing corporate-like efficiency, specialization and expertise, according to the FBI.

From a business perspective, these criminal enterprises are highly productive and staffed by dedicated people willing to operate worldwide, around the clock "without holidays, weekends or vacations," according to Steven Chabinsky, deputy assistant director in the FBI's cyber division. "As a result, when an opportunity presents itself these criminals can start planning within hours."

"The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services," Chabinsky told an audience today at the FOSE conference, a government IT trade show, held here.

During the presentation, Chabinsky presented a list of the top 10 positions in cyber crminal organizations. They are:

1. Coders/programmers, who write the exploits and malware used by the criminal enterprise. Contrary to popular belief, Chabinsky noted that coders who knowingly take part in a criminal enterprise are not protected by the First Amendment.

2. Distributors, who trade and sell stolen data and act as vouchers for the goods provided by other specialists.

3. Tech experts, who maintain the criminal enterprise's IT infrastructure, including servers, encryption technologies, databases, and the like.

4. Hackers, who search for and exploit applications, systems and network vulnerabilities.
5. Fraudsters, who create and deploy various social engineering schemes, such as phishing and spam.

6. Hosted systems providers, who offer safe hosting of illicit content servers and sites.

7. Cashiers, who control drop accounts and provide names and accounts to other criminals for a fee.

8. Money mules, who complete wire transfers between bank accounts. The money mules may use student and work visas to travel to the U.S. to open bank accounts.

9. Tellers, who are charged with transferring and laundering illicitly gained proceeds through digital currency services and different world currencies.

10. Organization Leaders, often "people persons" without technical skills. The leaders assemble the team and choose the targets.

By Patrick Thibodeau. Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld.

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

The Conservatives party in Britain has been embarrassed after hackers attack on a party website: Visitors redirected to pornography website

The site, called “Cash Gordon”, was intended to highlight the Labor party’s ties to the trade union Unite, with the slogan: “Charlie (Wheelan) gives the cash, Gordon gives the power.” The page was designed to spread the campaign via social networking sites such as Facebook and Twitter. However, hackers discovered that basic security measures weren’t in place on the page.

Visitors to the site found themselves being redirected to pornography websites, or the Labour home page. One of the sites key features was to display any message posted on Twitter if it included the term “#cashgordon”. But pranksters soon took advantage of this by writing anti-Conservative tweets including the campaign hashtag, all of which appeared in a box on the Conservative Party website. One tweet read, “So are the Tories really displaying an unmoderated Twitter stream on a campaign website?” while another said, “Tories can’t work the internet. Wouldn’t trust them to run a tuck-shop.”

Later on Monday it was discovered that the developers who built the Cash Gordon website had not included a standard security device to protect the message facility from outside users. By writing Twitter messages containing “#cashgordon” and their own piece of web code, Internet users they were able to redirect visitors to any other site on the Internet. While some visiters were sent to hardcore pornography websites the “code injection” attacks sent other users to a video of Never Gonna Give You Up, the Rick Astley pop song, in a well-known Internet joke known as “Rickrolling”.

The Conservatives were forced to take down the website so the security loophole could be fixed and so far the problems appear to have been fixed. A party spokesman said, “There was an attempt made to redirect #CashGordon users to other websites. We’ve made the necessary adjustments to the site and the #CashGordon campaign has now led to many thousands people hearing about Unite’s funding stranglehold over the Labour Party.”

Source: Xinhua/Agencies

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Tuesday, March 23, 2010

What is Footprinting, Fingerprinting Enumeration & SNMP Enumeration ?? what are the various Attack Methods | Softwares and tools

Defining Footprinting
  • Footprinting is the blueprinting of the security profile of an organization, undertaken in a methodological manner.
  • Footprinting is one of the three pre-attack phases. The others are scanning and enumeration.
  • Footprinting results in a unique organization profile with respect to networks (Internet / Intranet / Extranet / Wireless) and systems involved.
For Full Article VISIT HERE

Footprinting - Attack Methods

The attacker may choose to source the information from:
  • A web page (save it offline, e.g. using offline browser such as Teleport pro
  • Yahoo or other directories. (Tifny is a comprehensive search tool for USENET newsgroups.
  • Multiple search engines (All-in-One, Dogpile), groups.google.com is a great resource for searching large numbers of news group archives without having to use a tool.
  • Using advanced search (e.g. AltaVista),
  • Search on publicly trade companies (e.g. EDGAR).
  • Dumpster diving (To retrieve documents that have been carelessly disposed)
  • Physical access (False ID, temporary/contract employees, unauthorized access etc)
For Full Article VISIT HERE

Active Stack Fingerprinting: This technique is called OS fingerprinting
  • Fingerprinting is done to determine the remote OS
  • Allows attacker to leave smaller footprint and have greater chance to succeed
  • Based on the fact that various OS vendors implement the TCP stack differently
  • Specially crafted packets sent to remote OS and response is noted. This is compared with a database to determine the OS
For Full Article VISIT HERE

Passive Fingerprinting
  • Passive fingerprinting is also based on the differential implantation of the stack and the various ways an OS responds to it.
  • However, instead of relying on scanning the target host, passive fingerprinting captures packets from the target host and study it for tell tale signs that can reveal the OS.
  • Passive fingerprinting is less accurate than active fingerprinting.
For Full Article VISIT HERE

What is Enumeration ???
  • If acquisition and non intrusive probing have not turned up any results, then an attacker will next turn to identifying valid user accounts or poorly protected resource shares.
  • Enumeration involves active connections to systems and directed queries.
  • The type of information enumerated by intruders:
Network resources and shares
Users and groups
Applications and banners

For Full Article VISIT HERE

To get the list of Enumeration Softwares and Tools VISIT HERE

SNMP Enumeration
  • SNMP is simple. Managers send requests to agents, and the agents send back replies.
  • The requests and replies refer to variables accessible to agent software.
  • Managers can also send requests to set values for certain variables.
For Full Article VISIT HERE

SNMP Enumeration Countermeasures

Countermeasure Do not install the management and monitoring windows component if it is not going to be used. In case it is required ensure that only legally authorized persons have access to it else, it might turn into an obvious backdoor. Edit the Registry to permit only approved access to the SNMP community Name.

For Full Article VISIT HERE

To get the list of Enumeration Softwares and Tools VISIT HERE

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

What is Social Engineering? Art of Manipulation: What are the Common Types of Social Engineering & How to Attacks Online | What is Dumpster Diving ??

  • What is Social Engineering?
  • Common Types of Attacks
  • Social Engineering by Phone
  • Dumpster Diving
  • Online Social Engineering
  • Reverse Social Engineering
  • Policies and Procedures
  • Employee Education
For Full Article VISIT HERE

Social Engineering can be broken into two types: human based and computer based:
  • Human-based Social Engineering refers to person to person interaction to retrieve the desired information.
  • Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information
For Full Article VISIT HERE

Social Engineering Techniques: Dumpster Diving

Information that companies consider sensitive is thrown out daily in the normal garbage cans. Attackers can successfully retrieve this data by literally climbing into the company dumpsters and pilfering through the garbage. Information such as names, Social Security numbers,
addresses, phone numbers, account numbers, balances, and so forth is thrown out every day somewhere.

For Full Article VISIT HERE

We don't need no stinking exploits: Hacking human gullibility with social penetration

Security penetration testers Mike Bailey and Mike Murray rely plenty on attacks that exploit weaknesses in websites and servers, but their approach is better summed up by the famous phrase "There's a sucker born every minute."

For Full Article VISIT HERE

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

In an attempt to steal passwords and other vital information, hackers seemingly have released a virus-tainted spam that falsely gathers information, anti-virus software maker McAfee Inc. reported.

The anti-virus maker further added that the spam informs the recipients that the password on their Facebook accounts have been reset urging them to click on an attachment to obtain new login credentials. As the recipient opens the spam harmful software gets downloaded letting the program install on itself.

Facebook claimed that hackers have already tried several times to attack the site and dig out crucial information and alerted users to beware of such spam.

Dave Marcus, McAfee's Director of Malware Research and Communications said that email comes with a subject line - Facebook password reset confirmation customer support.

SOURCE: www.topnews.in

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Interview questions for fresher network engineer: Tips and Tricks for CCNA, CCNP, OSPF, BGP, MPLS-VPN | Ask all your queries online absolutely free

This is guest post from Mr.Shivlu Jain. He is running a blog related to MPLS VPN

If you have any concerns or any question related with any protocol or networking technology, you can visit his blog and just leave a comment. All you questions will be answered by professionals absolutely free.

Market is on boom and almost every company has opened its door for new positions and everyone is looking for change to grab new positions with new challenges. So make sure that you have prepared the answers for the below questions before your interview. The questions are generic and will make very good impression on interviewer if you answer them in organised and structured manner. The depicted IGP interview questions are for CCNA and CCNP engineers.

1. Difference between RIPv1 and RIPv2?
2. How many number of routes carried by RIP packet?
3. Is OSPF link state or distance vector or path vector protocol?
4. What is the difference between OSPF and IS-IS and which one is preferred?
5. Can we use BGP instead of any IGP?
6. How many network types available in OSPF?
8. LSA 3 and LSA 4 are generated by which router?
9. When to use Stub and Not So Stubby Area?
10. How to get the external routes without making area Not So Stubby?
11. What is the different type of route summarization available in OSPF?
12. What is the requirement of doing summarization?
13. A major network is advertised as summary in one area and few of the routes from that network is configured in another area. What will happen in that case?
14. If any of the OSPF area is not stabilized, does it impact another area?
16. External routes are available in OSPF database but not installing in routing table?
17. If loopback is not configured, what will be the router-id selected by OSPF process?
18. Can we run multiple OSPF process in single router and what is the advantage of using it?
19. What are timers of OSPF?
20. Multicast address of used by OSPF.
21. OSPF works on which layer?
22. What is backbone area in OSPF?
23. Can we use OSPF without backbone area?
24. Is it required that OSPF router-id must reachable in IGP cloud?
25. After configuring new router-id, automatically it will be used or do we need to use some type of command to get it operational.
26. Why the secondary ip address of interface is not advertising in IGP cloud?
27. OSPF neighbourship is not coming up. Please tell the various steps to troubleshoot it.
28. One side MTU is 1500 and another side MTU is 1600. Does it affect neighbourship?
29. Provide process of DR and BDR election.
30. If DR is down and no BDR is configured what will happen?
31. What is the difference between a neighbor and adjacent neighbor?
32. My OSPF neighbourship is showing 2-way, what does it mean?
33. Define different type of OSPF neighbor states?

For more CLICK HERE

Monday, March 22, 2010

Google and China have been going back and forth for two months over the Chinese government (allegedly) hacking Google’s servers with the intent of attempting to acquire information on certain Chinese civil rights activists. In retaliation for the attacks, Google said they would cease censoring search results on Google.cn, or cease doing business in China. Now, according to a report from Bloomberg, they’ve packing up and leaving the world’s biggest market.

According to Bloomberg, Google is expected to officially announce its departure from China sometime today, citing information from a Google China employee. The leak comes from an alleged Google China ad sales agent, although Google wouldn’t confirm anything when Bloomberg called. Google’s great Chinese pull-out will allegedly happen on April 10th.

To recap, in January, Google made a posting on their official corp blog, alleging that they had been tracking China attempting to hack their servers to access Gmail accounts of Chinese civil rights activists, ones both in and out of China. At the time, Google say that while their servers were secure, the hackers did manage to get some information from their targets via social engineering. As for retaliation for the attacks, Google said they would cease censoring search engine results in the country (for example, results on Tiananmen Square, Tibet, etc.)

This may, or may not, have an effect on Android phones being sold in China. Google managed to delay the launch of some Android phones in China, and some have speculated that the “Android Experience” in China would be crippled if Google apps and services were blocked in China. Case in point, Motorola changed the default search engine from Google to Bing on all Android phones in China.

China is the world’s most populous country and definitely a powerful market for any country. Bloomberg talked to Peter Lui, Google’s former financial controller for Google China and he said “[Google has] burnt bridges and they’ve burnt the Google brand in China. There is no way Google can ever come back.” If he’s right, being banished from the world’s biggest country probably isn’t a good thing, even for the unstoppable Google.

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Sunday, March 21, 2010

Hackers attacked 20 district websites operated by the Prime Minister's Office

The hackers who claimed to be Indians threatened Bangladesh with a cyber war if any Pakistani terrorist enters India through Bangladesh.

Home Secretary Abdus Sobhan Sikder said they have already restored the websites and cyber-crime experts in Rab and Special Branch of Police are working to detect the hackers.

"Earlier such incidents took place but the hackers were detected. Now we are also hopeful of tracing the hackers," he told The Daily Star last night.

After the sites were hacked they flashed some Hindi letters and "JAI HIND!".

The text on the hacked sites reads, "Secure border between INDIA and BANGLADESH If any terrorist send by Pakistan came via Bangladesh route then I will be danger to YOU Cyber War will be started this is demo We don't want more 26/11 in India. GOVERMENT LOOK AT IT ELSE CYBER WAR WILL START ....WE ROOTED AND ----- YOUR ISP ! " "EMIL INDIAN HACKER HackeD Your System [sic]."

"Mission is now complete. Who will be next," reads a message on one of the hacked sites. The message also reads, "If you need help contact me: ."

In instant reactions, Yeafesh Osman, state minister for science and ICT, told The Daily Star that the related body has started working to get the sites back up.

He said the hackers broke into the system--apparently to get "secret information".

Lt Col Ziaul Ahsan, director intelligence wing of the Rapid Action Battalion, said, "We have been informed of the matter and are working to track down the hackers."

The government recently launched websites for 64 districts in a move to achieve Digital Bangladesh by 2021. Access To Information (A2I) project of Prime Minister's Office maintains the websites.

Too lazy to say Thanks or comment here? Why not too lazy to read my post?? If you like this post and want us to post similar articles, Pls give us a feedback and leave a comment here.

Under sea Optical Fiber Cables Pics: See How does Internet Come to your home: See how u r communicating now: Its Submarine Communications Cable

The below pics has been shared by our fellow members Mr.Amey Anekar.

A submarine communications cable is a cable laid beneath the sea to carry telecommunications between countries.

The first submarine communications cables carried telegraphy traffic. Subsequent generations of cables carried first telephony traffic, then data communications traffic. All modern cables use optical fiber technology to carry digital payloads, which are then used to carry telephone traffic as well as Internet and private data traffic. They are typically 69 millimetres (2.7 in) in diameter and weigh around 10 kilograms per metre (7 lb/ft), although thinner and lighter cables are used for deep-water sections.

As of 2003, submarine cables link all the world's continents except Antarctica.

Underwater cables, which cannot be kept under constant surveillance, have tempted intelligence-gathering organizations since the late 19th century. Frequently at the beginning of wars nations have cut the cables of the other sides in order to shape the information flows into cables that were being monitored. The most ambitious efforts occurred in World War I, when British and German forces systematically attempted to destroy the others' worldwide communications systems by cutting their cables with surface ships or submarines. During the Cold War the United States Navy and National Security Agency (NSA) succeeded in placing wire taps on Soviet underwater communication lines in Operation Ivy Bells.
A cross section of a submarine communications cable.
1 -
Polyethylene
2 -
Mylar tape
3 - Stranded
steel wires
4 -
Aluminium water barrier
5 -
Polycarbonate
6 - Copper or aluminium tube
7 -
Petroleum jelly
8 -
Optical fibers















For detailed information on this CLICK HERE
Newer Posts Older Posts Home