Posts

Showing posts from December, 2011

Robots that Help Patients Walk Again

Image
Robots will be standing by to help paralyzed patients and the elderly walk. Toyota unveiled four such robots in Tokyo. The robots, designed to provide support in nursing and health care, are expected to be available for sale in 2013. They include sensors that detect the user's posture, grasp and holding strength, and high-precision motor control technology to facilitate the patient's desired motion. The first of the robots – the Independent Walk Assist – is a computerized leg brace that is mounted onto a paralyzed leg and helps the knee bend as the person walks. It can support the patient’s weight, and it adjusts as the patient develops more strength. The second robot uses similar technology but focuses on retraining those who are walking-impaired. The Walk Training Assist robot detects movements in the hips through sensors located at the foot and thigh of the computerized brace and supports the return to natural walking. The Balance Training Assist

10 Handy commands

Image
Some linux handy commands for everyday use. 1)Convert Youtube videos to MP3: youtube-dl -t --extract-audio --audio-format mp3 YOUTUBE_URL_HERE 2)Get your external public IP: curl ifconfig.me 3)Get a list of IP Addresses that have failed to login via SSH: cat /var/log/auth.log | grep -i "pam_unix(sshd:auth): authentication failure;" | cut -d' ' -f14,15 | cut -d= -f2 | sort | uniq 4)Background a wget download: wget -b http://dl.google.com/android/android-sdk_r14-linux.tgz 5)Transfer files with rsync over ssh on a non-standard port.: rsync -P -e 'ssh -p PORT' SRC DEST 6)Open a file explorer on a split screen inside your vim session: :Sex 7)Change file time stamp: touch -t [[CC]AA]MMJJhhmm[.ss] 8)Tunnel a MySQL server listening on a UNIX socket to the local machine: socat TCP-LISTEN:5500 EXEC:'ssh user@remotehost "socat STDIO UNIX-CONNECT:/var/run/mysqld/mysqld.sock"' 9)Create .pdf from .doc: wvPDF test.doc test.pdf

Hack facebook accounts on your network-2

Image
Hey! Im back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer.Next, we have to capture their facebook cookies through wireshark. So How do you go about doing that? It’s very simple actually. Open up wireshark Goto capture – > Interfaces in the top menu and select your interface. It’s usually the one which has an IP address and  a certain number of packets flowing through it. Next goto capture and click on start.. It should look something like this. This window has all the packets sent from the victim’s/victims’ computer to the router and all the packets sent from the router to the victim. Next in the filter type  “http.cookie contains datr”.  You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the victim’s cookies, we can login to his account as then facebook

Hack facebook accounts on your network -1

Image
Hello frnds, In this post I am going to show you a way you can hack the facebook accounts(any online account also)  of all the people who are on your network (LAN or wifi ) . I have tried this and believe me it works..This is really the best way to hack facebook accounts. Its much easier than installing RATs, Keyloggers or making phishing sites. Ok so here we go! You will need 3 programs for this Cain and abel : http://www.oxid.it/cain.html Wireshark : http://www.wireshark.org/download.html Web developer add-on for firefox : https://addons.mozilla.org/en-US/firefox/addon/web-developer/ So what exactly happens when you type in http://www.facebook.com and login with your username and password. First download the web developer addon for firefox and then login to facebook. After you log in view the cookies in the web developer toolbar. Ok now if you click on view cookie information, you will be able to see all the cookies which facebook has transmitted to your

Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy

Image
Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy     Microsoft has released a detailed taxonomy or detailed summary of Dark Comet RAT. Dark Comet AT is categorized as Backdoor:Win32/Flynloski.A. Read this full story to for detailed information about Microsoft's release. In the quest to compromise users' systems, malware has always employed different and resourceful techniques to achieve its goals. From using social engineering methods, to abusing legitimate software and its features, to using a design familiar to the user, malware has used every dirty trick in the book to achieve its malicious purpose. As a case study for such behavior we'll take a look at Backdoor:Win32/Fynlonski.A and how this malware uses any means necessary to gain access to the compromised system and hide its presence from a security solution. Taxonomy of Backdoor:Win32/Fynlonski.A We have received more than 35,000 samples of Fynloski.A with varying disguises, which we discuss in the following classif

The Kilobots are coming....!!!!

Image
Computer scientists and engineers at Harvard University have developed and licensed technology that will make it easy to test collective algorithms on hundreds, or even thousands, of tiny robots. Called Kilobots, the quarter-sized bug-like devices scuttle around on three toothpick-like legs, interacting and coordinating their own behavior as a team. A June 2011 Harvard Technical Report demonstrated a collective of 25 machines implementing swarming behaviors such as foraging, formation control, and synchronization. Once up and running, the machines are fully autonomous, meaning there is no need for a human to control their actions. The communicative critters were created by members of the Self-Organizing Systems Research Group led by Radhika Nagpal, the Thomas D. Cabot Associate Professor of Computer Science at the Harvard School of Engineering and Applied Sciences (SEAS) and a Core Faculty Member at the Wyss Institute for Biologically Inspired Engineering at Harvard. Her team als

Cloud Computing Concerns

Image
  This is the forth post in the cloud computing series, in this post we will be discussing further about cloud computing. The previous posts related to cloud computing are listed as follows: The power of cloud (Introduction to Cloud Computing) The architecture of cloud computing. Cloud computing Applications   Perhaps the biggest concerns about cloud computing are security and privacy . The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information under lock and key. The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. It's in their interest to employ the most advanced techniques to protect their clients' d

Install Nagios On CentOS in 20 minutes

Image
Nagios is an open source host, service and network monitoring program. An introductory post  to Nagios have has been published before. So lets continue that a with instructing the installation of Nagios on CentOS. Introduction This guide is intended to provide you with simple instructions on how to install Nagios from source (code) on CentOS and have it monitoring your local machine inside of 20 minutes. No advanced installation options are discussed here - just the basics that will work for 95% of users who want to get started. These instructions were written based on a standard CentOS 5.5 Linux distribution. What You'll End Up With If you follow these instructions, here's what you'll end up with: Nagios and the plugins will be installed underneath /usr/local/nagios Nagios will be configured to monitor a few aspects of your local system (CPU load, disk usage, etc.) The Nagios web interface will be accessible at http://localhost/nagios/ Prerequisites Du

Cloud Computing Applications

Image
The applications of cloud computing are practically limitless. With the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system. Why would anyone want to rely on another computer system to run programs and store data? Here are just a few reasons: Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet . Data wouldn't be confined to a hard drive on one user's computer or even a corporation's internal network. It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn't need to buy the fastest computer with the most memory, because the cloud system would take

Access your PC anywhere with desi iTwin

Image
Chennai: Four years ago, when Chennai-born Lux Ananthraman, then a researcher specializing in cryptography and security at a government-run lab in Singapore, lost his USB drive with all his data, he decided to do something about it.     “In spite of all the security work I was doing, I suddenly felt helpless,” says Anantharaman. This experience led to the creation of iTwin, a pair of identical USB drives that share data exclusively between them over any connection without being accessible to any other system.     It’s a device that lets you access the hard disk of your computer from anywhere in the world by just inserting one USB drive in the home PC and carrying the other with you. It’s cable-less cable, says proud iTwin creator Chennai: Chennai-born Lux Ananthraman has created iTwin, a pair of identical USB drives that share data exclusively between them over any connection. The procedure is insert the USB drive you are carrying in any computer and youcanaccessal

What Linux newbies Need to Know

Image
"Linux is like that classic muscle car, in that if you are willing to put in the hours and don't mind spending your weekends under the hood, you'll have yourself a sweet ride at the end of the day and the knowledge you built and tweaked it with your own two hands," said Slashdot blogger hairyfeet. "But if you aren't willing to put in the work, all it is gonna do is make you frustrated." Just Google It ! "Every newbie, to be deemed worthy, must possess the Two Virtues of the Linux Acolyte: Patience and Curiosity," "Patience, because sometimes things are just different enough to throw you off, and curiosity to keep you motivated when your patience wears thin like a cheap rug from everyone saying, 'Just google it, n00b!' Also, "please don't handicap yourself by making your first experience be on some old oddball hardware that will be so slow that it turns you off the whole experience," 'Go for the

Windows 8 now includes touch gesture to close Metro style apps

Image
Microsoft’s latest Windows 8 pre-beta builds include a touch gesture to close Metro applications. The gesture allows touch based Windows 8 systems to quickly close off running apps. Microsoft’s Windows 8 developer preview does not include such a feature and relies on the task manager to close applications. The new touch gesture was demonstrated in a video. The feature appears to work for Metro “immersive” applications only and looks to be the first of many gestures that Microsoft is planning for Windows 8. The software maker is also building in a zoom feature for the Start Screen to allow users to organize their applications into groups and move items around the screen easily. Images of Microsoft’s improved Windows 8 Charms Bar were released on Saturday too. The images show off a translucent Charms Bar. Microsoft has enabled support for automatic updates to Internet Explorer 10. Windows 8 users can enable the feature from the about dialog box in Microsoft’s latest brow

Microsoft bids Yahoo for half the rate !..

Image
Bloomberg reported that the Silver Lake consortium - which includes Microsoft - has offered $16.60 per share for a minority stake in Yahoo, much lower than the $31 per share tender made in 2008. "Silver Lake, working with Microsoft Corp., venture-capital firm Andreessen Horowitz and Canada Pension Plan Investment Board, offered to buy convertible preferred securities equal to a 10 percent to 15 percent stake for as much as $3 billion, said one of the people, who asked not to be identified because the bids made this week are private," Bloomberg stated. The offer is about 6 percent higher than Yahoo's current stock price. Another potential buyer, TPG Capital has offered more. Bids are lower than what recent Yahoo investors must have been expecting. The company was expected to discuss the offers yesterday. Alibaba, which Yahoo owns a 40 percent interest in, have indicated a desire to buy the entire company and are waiting to see how the partial stake offers are

Cloud Computing Architecture

Image
When talking about a cloud computing system, it's helpful to divide it into two sections: the front end and the back end . They connect to each other through a network , usually the Internet . The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system. The front end includes the client's computer (or computer network) and the application required to access the cloud computing system. Not all cloud computing systems have the same user interface. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox . Other systems have unique applications that provide network access to clients. On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video ga