Saturday, September 20, 2014

Type Of Servers And Which one u use?

 Type Of Servers And Which one u use?


1. Real-Time Communication Servers

Also known as chat servers or IRC, and sometimes known as instant messaging (IM) servers, these servers are meant to allow huge number users to exchange information instantly.


2. FTP Servers

This is one of the oldest of the Internet services available. The FTP or File Transfer Protocol allows the users to securely transfer one or more files of any size between two computers.


3. Collaboration Servers

In many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.


4. List Servers

List servers lets users better manage their mass mailing lists like open interactive discussions or one-way lists to deliver newsletters, announcements or advertising.


5. Telnet Servers

The Telnet server lets the users on to a host computer control and work on remote computers.


6. Web Servers

At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP.


7. Virtual Servers

A virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.


8. Proxy Servers

Proxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the users simplifies them and control their complexities.


9. Mail Servers

Mail servers help in moving and storing the e-mail over a network via LANs and WANs or across the Internet.


10. Server Platforms

Normally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives the server.


11. Open Source Servers

Similar to server platforms, Open source server are referred to the underlying open source operating system used in the IT infrastructures of the companies.


12. Application Servers

Application servers are a type of middleware which connects the database servers and the app users.

How to Trace Any IP Address

How to Trace Any IP Address

 
 
how to find friend ip adress & mac address

  you obtain this IP address, it is necessary to trace it back to the source. So, in this post I will show you how to trace any IP address back to its source.

How to Trace the IP Address Back to the Source?

In fact, tracing an IP address back to its location is a lot simpler than what many people imagine. There exists many online tools using which you can accomplish this job. One of my favorite site is IP2Location.com.
Just go to  http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address:
  • Country in which the IP is located
  • City to which the IP address belongs to
  • Latitude/Longitude of the IP’s location
  • Zip Code of the region to which the IP belongs to
  • Time Zone associated with the IP
  • Name of the ISP to which the IP address belong to
  • Internet Speed of the computer associated with the IP
  • Weather Station associated with the region of the IP
  • Domain name associated with the IP address
A sample snapshot of the results from ip2location.com is given below:

               how to trace any ip address

From :Convants Information Seurity

Thanks.


How To Make Hidden Account On Facebook

How To Make Hidden Account On Facebook 

hey friend today m guid you to how to make hidden Account on facebook.com Facebook account (Facebook timeline will not display when visited). This trick is amazing facebook timeline will not display when visited.

>> Steps To “Make Hidden Account on Facebook”







1. Create a New Facebook Profile

2. Active your email address and verify your mobile number to set a username.

3. Open Facebook Via “https://mbasic.facebook.com/username/


4. Enter spaces at the beginning of the username field.


4. Click check availability.

5. Click on set username, mostly the page will stay blank . but the trick works and we are done .

Share this Post !!

How to Hide IP Address Online


How to Hide IP Address Online

Cyber Security Training In Surat.

Website Based Proxy Servers:

if any website are block in your lepi and pc so u can open the website  from the all below site :

download & trying " tor " browser if not work any site in your pc it's a last chance to open 

The above websites provide a field to enter the URL of the target website that you want to visit anonymously. The downside of using these free services is that, some of them will not offer a secured connection (SSL) and you will often be presented with annoying ads and pop-ups during the course of your browsing.




Program Based Proxy Servers:


Most of these programs come with a free trial where you are required to pay once the trial period expires. The following are some of the popular program based web proxies:

VPN Services:

VPN services provide reliable ways not only to hide your IP address but also to protect your data and identity over the Internet. Here are a few examples of VPN services that you can try:
  • Hide My Ass VPN
  • VyprVPN                                                                                                                                                                                                                                                                                                                                                                                                                                              Https://www.convants.com


Thursday, September 18, 2014

How a Cell Phone User Can be Secretly Tracked Across the Globe
--------------------------------------------------------------------------------------------


Since we are living in an era of Mass surveillance conducted by Government as well as private sector industries, and with the boom in surveillance technology, we should be much worried about our privacy.

According to the companies that create surveillance solutions for law enforcement and intelligence agencies, the surveillance tools are only for governments. But, reality is much more disappointing. These surveillance industries are so poorly regulated and exceedingly secretive that their tools can easily make their way into the hands of repressive organizations.

Private surveillance vendors sell surveillance tools to governments around the world, that allows cellular networks to collect records about users in an effort to offer substantial cellular service to the agencies. Wherever the user is, it pinpoint the target's location to keep every track of users who own a cellphone — here or abroad.

We ourselves give them an open invitation as we all have sensors in our pockets that track our every move wherever we go.

---------------------------------------------------------------------------------------------
WHAT WENT WRONG
---------------------------------------------------------------------------------------------
The tracking technology takes advantage of the SS7, a global network, which is unfortunately vulnerable.

SS7 or Signaling System Number 7 is a protocol suite used by most telecommunications operators throughout the world to communicate with one another when directing calls, texts and Internet data. It allows cell phone carriers to collect location information from cell phone towers and share it with each other. A United States carrier will find its customer, no matter if he or she travels to any other country.

The Washington Post published an awesome article on surveillance technology that can track cell phone users anywhere in the world. Surveillance vendors also now have access to SS7, so that their customers can home in on somebody’ locations as precisely as within a couple of city blocks (or in rural areas, a couple of miles).

These systems are so effective that it can even detect how fast a person on a city street is walking, or the speed a person’s car is traveling!

"The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say," explains the post.

"All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems."

---------------------------------------------------------------------------------------------
SS7 TRACKING SYSTEM PAIRED UP WITH ‘CATCHERS’
---------------------------------------------------------------------------------------------
It is believe that dozens of countries have bought or leased this surveillance technology in the last few years. Having a close look at such tools, it has been discovered that some of the companies that sell SS7 tracking system are advising their customers to pair them with “IMSI catchers” or StingRays.

StingRays are common surveillance devices that allow law enforcement to mimic a cell phone tower, and track users position who connect to it, and sometimes even intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations.

“What's interesting about this story is not that the cell phone system can track your location worldwide,” said Bruce Schneier, a senior security researcher. “That makes sense; the system has to know where you are. What's interesting about this story is that anyone can do it.”

Privacy advocates are not only worried by governments getting their hands on these systems, but also about hackers and criminal gangs using it.

Tuesday, September 16, 2014

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users
---------------------------------------------------------------------------------------------


A Serious vulnerability has been discovered in the Web browser installed by default on a large number (Approximately 70%) of Android devices, that could allow an attacker to hijack users' open websites, and there is now a Metasploit module available to easily exploit this dangerous flaw.

The exploit targets vulnerability (CVE-2014-6041) in Android versions 4.2.1 and all older versions and was first disclosed right at the start of September by an independent security researcher Rafay Baloch, but there has not been much public discussion on it.

The Android bug has been called a "privacy disaster" by Tod Beardsley, a developer for the Metasploit security toolkit, and in order to explain you why, he has promised to post a video that is "sufficiently shocking."

    “By malforming a javascript: URL handler with a prepended null byte, the AOSP, or Android Open Source Platform (AOSP) Browser) fails to enforce the Same-Origin Policy (SOP) browser security control,” Tod Beardsley of Rapid7 said in a blog post.

    "What this means is any arbitrary website - say, one controlled by a spammer or a spy - can peek into the contents of any other web page," Beardsley said. "[If] you went to an attackers site while you had your webmail open in another window, the attacker could scrape your email data and see what your browser sees.”

    "Worse, he could snag a copy of your session cookie and hijack your session completely, and read and write webmail on your behalf."

Baloch also found the AOSP browser installed on Android 4.2.1 is vulnerable to Same Origin Policy (SOP) bypass that allows one website to steal data from another. He then tested his findings on numerous devices, including Qmobile Noir, Sony Xperia, Samsung Galaxy S3, HTC Wildfire and Motorola Razr and found that it works on all.

But, anyone running the latest release, Android 4.4, is not affected, which means that as many as 75 per cent of Android devices and millions of Android users are vulnerable to the attack, according to Google’s own statistics.

Baloch explained that an SOP bypass occurs when one website makes it way to access the properties, such as cookies, location, response etc, of the other site. “Due to the nature of the issue and potential impact, browsers have very strict model pertaining it and a SOP bypass is rarely found in modern browsers. However, they are found once in a while,” Baloch said in a blog post.

As a responsible security researcher, Baloch reported the issue to the Google and they responded positively by assuring him that they are working on a “suitable fix.” But when it came to reward this bug hunter, they replied “We are unable to reproduce this issue though. Its possible that your OEM has modified the browser in a manner that has created this issue,” said Josh Armour of Android Security team.

    “Android does not currently have a Vulnerability Rewards Program. As far as publicly crediting for the vulnerability we have started to maintain a list of acknowledgements here. Given that this was published before we had a chance to provide patches, this specific report would not qualify.”

The problem is that all the versions except Android 4.4 are affected by this issue and a large number of users still are on the older versions. Worst is the creation of a module for the Metasploit penetration testing platform, which would make the exploitation of the vulnerability much easier.

It all resides in the BROWSER of the Android devices, which can't be uninstalled because it's usually part of the operating system in-build feature. So, in order to protect yourself, just Disable the BROWSER from your Android devices by going to Settings > Apps > All and looking for its icon. By opening it, you’ll find a DISABLE button, Select it and disable the Browser.

Wednesday, September 10, 2014

Nearly 5 Million Google Passwords Leaked on Russian Site
--------------------------------------------------------------------------------------------


Russian hackers have leaked the email IDs and passwords of as many as 4.93 million Google accounts. The same Google account password is used across all Google products, such as Gmail, Drive, Plus, YouTube, Maps etc.

The International Business Times reports that data for 4.93 million Google accounts of English-, Spanish- and Russian-speaking users was leaked and published on a Russian-language Bitcoin security online forum. The posters said about 60% of the accounts were active.

According to Russian news service RIA Novosti, this leak followed another large hack of Russian email accounts. Several million accounts of Russia-based email services were also posted in a Bitcoin security forum.

The account details have been posted on bitcoin forum btcsec.com by a user named Tvskit. On the forum, Tvskit has said that approximately 60% of the passwords are still active.

Google in a blog post, however, refuted the claim and said that only 2% of the passwords still work and also said that its automated anti-hijacking systems would have blocked many of the login attempts.

In a statement sent to TIME, Google said it had “no evidence that our systems have been compromised.”

“The security of our users’ information is a top priority for us,” the statement reads. The company said that whenever it is alerted that accounts may have been compromised, “we take steps to help those users secure their accounts.” Email users are encouraged to utilize two-step verification when logging into accounts, as well as to create strong passwords.

Tuesday, September 9, 2014

Malicious Ad Network "Kyle and Stan" serves Windows and Mac Malware

Cyber Criminals have been placing malicious ads on a number of popular websites including YouTube, Yahoo that serves malicious software. The campaign also targets Mac users.

The malicious network, uncovered by Cisco Researchers comprise of over 700 domains. They observed nearly 10,000 connections to the malicious domains.

The operation has been dubbed "Kyle and Stan" because most of the domains used in this campaign for distributing malicious software contain "kyle" and "stan" strings in the sub-domain name.

The users website who visit the websites containing malicious ad will be redirected to another website. Users will then be redirected to another page that will serve mac or windows malware based on their user agent.

"The attackers are purely relying on social engineering techniques, in order to get the user to install the software package. No drive-by exploits are being used thus far" Armin Pelkmann, Cisco researcher, wrote in a blog post.

Fake Flappy Bird App Planted by Hackers to Steal Photos from Device.

As far, you have probably heard about the biggest digital exposure of private and very personal photographs of as many as 100 female celebrities including Jenny McCarthy, Kristin Dunst, Mary E Winstead, and Oscar winner Lawrence and Kate Upton, that was surfaced on notorious bulletin-board 4chan, and anonymous image board AnonIB over the weekend.

It was believed that the group of hackers allegedly taken celebrities photos from their Apple iCloud backups after their iCloud accounts were compromised, but users of devices running Google's Android could have been targeted too.

A forum post on anonymous image board AnonIP shows that the group of hackers may have used a cloned Flappy Bird app to steal and collect the naked photos of females from their Android devices and then send them to remote servers.

Experts believe that the group may have been stealing and trading very personal photos of more than 100 female celebrities for more than two years, gathered on the “stolen” forum on image board AnonIB.

The developer of fake Flappy Bird app took advantage of the user's "carelessness" of granting the permissions to Android apps.

The post on a hackers' forum, written in late July this year, was discovered by security consultant Nik Cubrilovic. It detailed how the supposed developer had developed a malware-ridden “clone” of Flappy Bird app for Android devices that would exploit app permissions granted during installation in an effort to steal the photos.

“I am a genius [sic]… Hear me out. I.. modded… the app,” the developer explained in the post. “It now secretly downloads all of the phones pictures to my server when the game is running. Note: this app will only work for android,” he added.

The developer want to release a copy of cloned Flappy Bird app on the Google’s Play Store but he didn’t want to risk his developer license, as the app violates Google play’s terms. But, to solve the problem, he was searching for a second developer account, specifically created for the purpose of stealing pictures from infected Android devices.

He also asked for financial support from his fellow anons in order to make a second Google Play developer account and promises to “post any wins [stolen photos] obtained in this thread.” A new developer licence cost $20.

All game is based on the users’ negligence to check the permissions of mobile apps they granted without even knowing of the fact that any app is asking access to your device’ stored photographs. It is extremely phishy, but many of you don’t even pay attention to these details and accept those permissions blindly.

Flappy Bird, developed by a 29-year old, Dong Nguyen, was one of the top free gaming apps on Google’s Play Store. But after the developer of Flappy Bird pulled the gaming app from both the Apple and Google app stores, it led to the creation of dozens and dozens of Flappy Bird clones, out of which many identified as malicious.