Category Archives: Technology

BoxTv: Times Internet launches new online video-streaming site


New Delhi: Times Internet Ltd (TIL) launched video service BoxTV, which will provide access to movies and short films.

“Based on a freemium model, BoxTV will make some content available on an ad-supported free-to-user basis, while others will be available on a monthly subscription model,” TIL CEO Satyan Gajwani told reporters.

The service, currently available through invitation basis, will be made available to users at large in India, the UK and the US in next few months, he added.

The monthly subscription fee for users in India would Rs 199, while it is $4.99 in the US and £4.99 in the UK.

BoxTv screengrab of site.

The website seems targeted at NRIs will full- length movies in English, Hindi, Tamil, Telegu and Kannada. Other languages like Bengali, Punjabi and Gujarati will also be introduced.

TIL said it has a library of over 3500 full-length movies, 500 short films and 2,000 TV episodes.

The company however declined to comment on investments made or targetted revenues saying “it is still too early to talk about the numbers”.

BoxTV representative say that they have partnered with companies like Sony Pictures, UTV, Shemaroo and Rajshri for content and is in discussion with 30-40 firms globally for expanding its content portfolio.

Asked if the paid model would work in India, Gajwani said though initially it would be difficult, but users would eventually move to the paid platform.

“We have a strong (content) portfolio and once people use and see the quality of service, I’m sure they would sign on. However, we see a majority of paid users coming from the UK and US now as the paid model is more established in these countries, but India should also reach there soon,” he added.

No ‘Facebook Smartphone’ Says Mark Zukerberg


Facebook founder Mark Zuckerberg has denied that the firm is planning to develop a phone, saying doing so ‘would be the wrong strategy’ for the social networking giant.

Zuckerberg’s remarks came during a conference in San Francisco organized by TechCrunch.

There had been intense speculation that Facebook was planning to release a phone as early as next year.

Zuckerberg, however, pointed out that that building a Facebook phone would not attract a considerable enough number of users to make the venture worthwhile, the Telegraph reports.

The 28-year-old founder of the website, however, promoted the importance of mobile in Facebook”s strategy.

Zuckerberg said that users of Facebook”s new iOS app are reading twice as many feed stories as before, suggesting a future boom in advertising revenue.

Zuckerberg said that the company”s mistake was relying too heavily on HTML5 for its app rather than using native apps.

According to the report, he also said that native Android app is the third prong of its mobile strategy after iOS and mobile web, and users can expect one before too long.

  JBOSS Exploitation: http://resources.infosecinstitute.com/jboss-exploitation/
 

EC-Council Certification: http://www.infosecinstitute.com/certifications/ec-council.html#ceh

Google launches music discovery site


Google has a new feature it hopes will keep Music Beta users tuned in.

The Web giant today launched Google Magnifier, a new feature to help users of its online music-storage service discover and obtain new music. In addition to free music tracks, the site has videos of live performances, artist interviews, and a chance to explore music genres.

The move is an effort by Google to distinguish its Music Beta service from competitors such as Amazon’s Cloud Music and Apple’s forthcoming iCloud service, which is expected to launch in the fall. Google’s music-storage service, which launched in May, lets people upload their music libraries and replay them on PCs and mobile devices.

Google is kicking off the service by giving away two tracks by Grammy-nominated indie rock band My Morning Jacket to Music Beta users.

How Small Our Earth Is In This Universe


Here is an image from NASA showing the small size of our planet earth as compared to other planets and stars.

Buy Earphones Worth $1150


When I first learned the price of JH Audio’s 16 PRO earphones, it was all I could do to not do a spit take. A THOUSAND DOLLARS? No, actually it was $1,149, but close enough. Could such a obscene price actually be worth it? The company was kind enough to send me a pair to find out.

First, full disclosure: Every pair of these earphones is customized to the shape of the owner’s ear canals, so when I say “try out,” it means JH Audio created a pair of earphones specifically for my ears. They also sent them with a rock-hard protective case emblazoned with the DVICE logo, which you can see in the gallery below. Cute.

JH Audio markets its earphones to audio pros — especially sound engineers. But after using them for over a month, I think they have appeal that goes beyond that niche group, assuming you have the cash to burn. These earphones are the best I’ve ever used in three key ways:

1. Noise Isolation with No Tradeoffs

The first time I put on the earphones, I was surprised about how much they cut outside noise. I was on a busy New York City subway platform, and I could hear the music from my iPhone with shocking clarity, and at low volume. You usually have to go to an empty room (and turn off the air conditioning) to hear so precisely (JH Audio rates the noise isolation at –26 dB). Sure you could just buy headphones with active noise cancellation, but those have issues, too — namely bulkiness and the need for recharging. These fit in your pocket and are ready to go anytime.

2. Truly Amazing Sound Quality

The 16 PROs are said to be the only earphones in existence with eight 16 drivers total, four eight for each ear. Most loudspeakers don’t have nearly that many. They also have “precision-balanced armatures” and a “triple bore” design, meaning each set of frequencies gets to your eardrum via a different canal. Impressive.

The idea of putting this kind of audio technology in a pair of earphones may sound a little absurd, but think about it: portables like iPods and cellphones are the main way we listen music today. It makes complete sense to focus sound engineering on the way people actually listen to music. (One could argue that all that tech is pointless if all you’re listening to is compressed music, but that’s another debate.)

OK, all that stuff sounds great on a spec sheet, but do the damn things sound good? Yes. To get a feel for just how good, I ripped a ton of WAV files from various CDs of different music styles, paying close attention to individual instruments and especially bass. One of the albums was Radiohead’s OK Computer, and all the complexity of “Paranoid Android” was in full force: I could hear every guitar pluck and every drum beat perfectly. The crescendo near the end, which can become quite smushed with lesser earbuds, came through with excellent clarity.

A couple of other examples: The horns, voices, drums, and other instruments on the fast-paced Mighty Mighty Bosstones tune “Sugar Free” were all discernable. During their solo, the horns felt particularly punchy, as if they were in the room with me. As for bass, I decided to really put the 16 PROs to the test, listening to recordings of plane engines from Round Sounds. A flyby of a Boeing B-29 and the startup of a Martin 404 engine gave plenty of kick. The 16 PROs kept all the revs and clicks nice and clear, even at high volumes (sorry, ears).

Speaking of volume, the extra bonus with these earphone is that you don’t have to listen very loudly. A little sound goes a long way with these babies, and your portable’s battery won’t run down as quickly.

 

3. Earphones That Fit Pefectly

I was extremely gratified to finally — finally! — have a pair of earphones that don’t just pop out or fall off my ears when I move my head suddenly. The individualized shells slip into the ear, and they stay there. It’s actually a bit tricky to get them in your ear canal properly, but once they’re in they just feel… right. The experience was slightly disconcerting at first (using them in public made me fear them getting pulled out suddenly), but once you start listening you’re fine. To be fair, though, JH Audio is far from the first company to offer isomorphic earphones.

In my experience, the JH Audio 16 PROs are the best earbuds money can buy. If you value great sound — I mean really value it — these are the earphones you want. They give you fantastic sound and the tradeoffs are few. However, they do suffer from the problem that afflicts all small gadgetry with a high price tag: You’ll constantly be terrified you’re going to lose them.

source: http://dvice.com/archives/2010/07/3-reasons-you-m.php

Turn an FM Transmitter into a Micro Pirate Radio


Corporate radio is preprogrammed junk. But don’t curse the DJ; seize the airwaves! With a soldering iron and a cheapo FM transmitter — the kind used to play an iPod through a car radio — you can transform your humble Honda into a Radio Free Civic that can broadcast your tunes up to … 100 feet. 

Step 1. Pry open the transmitter’s case with a putty knife and remove the internal antenna (often labeled ant).

Step 2. In its place, solder a telescoping antenna or a piece of copper wire — no more than 35 inches long for broadcasting within the standard FM transmission spectrum.

Step 3. The transmitter may have a resistor, typically marked with an r, to limit the power of the signal. Replace it with copper wire to boost the transmission.

Step 4. Slap a bumper sticker on your ride advertising your station’s frequency. You’ll soon build a grateful audience of fellow commuters suffering through that traffic jam.

Contributed by Mathew Honan

How SmartPhone Changed Your Life


check how SmartPhones effect your life

Could Quantum Computing A Threat To Copyright?


The basis of copyright law is individuality and creativity. Yet ever increasing computing power and storage space could mean that in just a few short years, computing could throw copyright into chaos.

The relationship between technology and law is a difficult one. Law attempts to put rigid walls around society, to define can and cannot. Technology, on the other hand, attempts to turn cannot into can.

Making it even harder is the reality that laws tend to lag about a decade behind technology. It took 10 years for the legality of the video cassette to be decided, and even now new laws are being written to deal with P2P, a decade after BitTorrent was first debuted.

While these two technologies have caused problems for copyright owners, by disrupting the status-quo around distribution, the incredibly fast growth in both computing power and storage could soon lead to a fundamental shake-up in copyright.

As it stands in US law (and remember, US law rules throughout the world,  even if it’s legal, or you’ve not been there in decades) the creator of a picture is the copyright holder. Even if you drop the resolution, or reduce the number of colours to simpler shades, it is still considered by many to be under the original copyright.

So, what if you could create every possible picture? What if you took a fairly low resolution (say 500×500) and a reasonably low colour mix (say 256 colours) and tried to create every single image? What then would be the state of copyright? It’s the visual equivalent of the infinite monkey theorem.

If you could do it, then the project would own all the copyrights, to every image not already copyrighted. Furthermore, since it’s an independent creation with no outside reference to draw upon, works and images similar to those already copyrighted are not infringing.

There is that word though – ‘if‘. 500×500 with 256 colours might seem like a small, grainy picture now, but it’s a massive field of data. 250,000 pixels, each with 256 possible shades comes to 9.802 *10602059 and that’s a large number; 9 with six hundred thousand zeros after it!

“You would pretty much need a quantum computer and massive storage space for this to become even slightly feasible,” says Stephen Brooks, head of the Muon1 DPAD project based at the RAL near Oxford.

The problem is clear. At present the distributed.net RC5-72 brute force effort has been going on for 8½ years, and is only 1.7% done.

“Creating an image is faster than cracking an RC5 key but not that much, and there’s still space issues,” says Brooks. “You could easily fill 1Gb per hour, per user.”

However, while it’s not feasible now, 20 years down the line it may well be possible. Already some strong progress has been made towards quantum computing and with technological progress as rapid as ever in this field, it’s a question of sooner, rather than later.

In a very real sense, technology might kill copyright in our lifetime.

Evolution Of Programming Languages


here is a photo showing the evolution of programming languages in the computer world.

How To Create And Utilize An SMS Flooder


Creating and utilizing an SMS flooder

by Halla

This was a topic I wasn’t going to cover, being that I think it to be a potentially serious problem (an opinion shared by several people I have discussed it with) however by the time I release this tutorial I have taken every possible step toward alerting the pertinent authorities to this vulnerability and its potential effects. This being said lets continue.

As many of you know, most people with a cell phone have a plan that includes SMS / text messaging. It is possible to send a phone a message via email providing that you know the target phones full 10-digit phone number and their provider. You send an email to the number at the particular providers predetermined address and Voila! The phone gets the message. If you were to send several messages, the phone would receive these as well, and this is where we come into the potential for attack.

Obviously this service being not only free, but also incredibly easy to perform constitutes and even welcomes the potential for abuse. This article will cover how to create such an attack locally (one target) and also discuss the theoretical implications of a wide area attack.

Obviously anonymity is the key.
As you may or may not know there are several ways to send an email anonymously and many programs are available that already have the feature or can be modified to preform this function automatically. By sending the targets phone either a predetermined or even an endless loop of emails, they will receive that same number of text messages. How quickly this attack is initiated seems to be dependent on the provider/service and method used in the attack.

There are many ways to stage an attack, yet the principal is the same.

Method one:
Create an email account that does not require confirmation for forwarding of messages. I will use Gmail as a working example for the time being. Be sure to create and access this account as anonymously as possible utilizing proxies, war driving combined/w MAC spoofing, public terminals/w attention to cameras, sign-ins and terminal seating placement/arrangement, as well as any other measures you may take to protect your identity. Ideally a combination of methods should be used. Once the account is created, simply set it up to receive as many emails as possible. This can be accomplished by signing up to various daily mailings, alerts, groups, etc. Be creative. Once you are happy with the amount of traffic being generated simply forward the account to the target.

Settings > Forwarding and POP > Forward a copy of incoming mail to >
Obviously enter the targets address in the field provided.
Example: (5551235555@cellprovidersaddy.net)
This methods effectiveness is dependent solely on the amount of traffic you can generate in the mail accts inbox and the speed in which it is done.

Method two:
Create a yahoo account. Again, be sure to create and access this account as anonymously as possible as I previously mentioned. When setting up this account, be sure to add the targets email address as the secondary email address. Log in and go to alerts.yahoo.com or the alerts setup page. At this point your goal is to activate as many alerts as possible to the account so use the alerts you think will yield the most traffic. I have found keyword auction alerts to be particularly effective when using keywords like “of”, “an”, “be”, “ship”, “my” etc. Be sure to set these alerts to “Immediate Delivery” for maximum effect. I would think that 15 to 20 common keywords ought to constitute a significant attack.

Method three:
Using telnet or another similar means to send an anonymous email is also a possibility however this methods effectiveness hasn’t been as good as the other methods I’ve covered so far. This may have something to do with the SMTP servers I’ve been using in my proof of concept testing so I’m going to cover my ass and say that results will vary. Its very simple to do, and automation of this process is also relatively standard though for general security and convenience reasons I wont be posting code or where to get code for an anonymous mail bomber but I should however comment that there are many existing programs out there that can either be modified or utilized in a particular way as to make them anonymous. (Update – When using reliable SMTP servers, this method is just as effective as the others mentioned.)

Method four:
Many chat clients offer the option of forwarding IM/PMs to a mobile device. (AIM for example has no confirmation at all… just pop in the number and flood away) Some chat clients however require a confirmation from the cell phone user to activate. While this would seem to be a secure way to ensure that no abuse of the system or attacks as we are speaking about takes place, we seem to have a general lapse in security. Let me explain.

Using yahoo messenger as an example, when setting up the account to forward all messages to a mobile device it requires you know the provider/service of the phone number and also sends the phone a 5-digit numerical confirmation number. This number must be entered into the form for the changes to take place. However, for some strange reason there is no brute forcing protection on this entry field so its only matter of running through 5 numerical characters… a feat that would take a program/w the proper dictionary file no time at whatsoever. In any case, once the confirmation number has been entered, it is simply a matter of sending as many IM/PMs to that ID as possible, and again there are many existing programs out there that can be modified to be used anonymously and effectively or already are and if nothing else are easy enough to create.

Enough methods. If you’ve read any of my other articles you know that there’s more than one way to do any and everything. I’m sure you can use these examples to perform your own proof of concept tests and will come up with a few other methods I didn’t mention or perhaps never thought of. Now let’s move on and discuss the implications of applying this attack to broader targets.

If you live in the North Eastern US (possibly other locations as well) and were trying to use your cell phone during the terrible attacks of 9-11 you may have noticed that the network was busy, and the phones didn’t work the whole time, if at all. This was due to the unusually large volume of calls going out at once which the towers weren’t ready to handle. The towers were flooded, and therefore basically experienced a DDOS attack through legitimate traffic. The same principal would apply theoretically if one were to uses this SMS attack method on a wide scale, say every number in a particular area code and across a variety of providers. (Obviously this is all speculation because I don’t see the point of potentially shutting down cellular service in an area just for a proof of concept.) In any case lets say one were to launch an attack on a scale of that size or larger (several or all area codes in an area ranging from a few towns to the continental United States) of 750,000 messages. This would result in one of the following:

1. Every phone with txt/sms messaging service will receive 750,000 messages.
2. The local cellular towers become overwhelmed by the traffic and emulate a DDOS attack.

The least destructive possibility is that the person initiating the attack would overwhelm the cellular provider’s servers and cause them to fail. Also, obviously if one were to make a list of every possible number in a particular range not all of them will be valid phone numbers and will bounce back with “delivery not sent” messages. Removing potential invalid numbers from the list would prove tedious if not maddening. If one were to use a mail server that allowed forwarding without confirmation to do this (for example Gmail) this person could use this forwarding flaw to their advantage and initiate a completely separate simultaneous attack using the hundreds of thousands of bounce backs to flood another mail server, particular account, etc.

Some interesting bonus info on these types of attacks includes the following:
1. The target may not be able to make any calls while the flooding is taking place
2. The target may be forced to delete each message manually depending on the type of phone they have.
3. The target is charged for every message received over their plan limit, and in some cases when initiated from email it is considered data not txt/sms so there is a completely different (and usually higher) billing rate.

As you can see, these types of attacks can be incredibly destructive and at the least incredibly annoying. If no change is made to the system I foresee these types of attacks becoming more common, especially due to their simplicity.

Link: http://www.informationleak.org/viewtopic.php?f=46&t=5210#47886