WELCOME...!

WELCOME TO MY EXP BLOG's

Wednesday, June 2, 2010

Deciphering Google's Wi-Fi headache (FAQ)

How did Google's Wi-Fi spying debacle get to this point?

As Google prepares to defend itself against allegations of Wi-Fi spying, it has said very little about exactly what kind of personal data it gathered as part of its Street View project. Last week, Google also declined to provide executives willing to speak on the record about how one of the most monumental oversights in its history occurred: the inadvertent gathering of "payload" data by Wi-Fi sniffers mapping hotspots while recording street scenes for Google Street View.


But Google finally did confirm a few additional details about the type of scanning procedure it used as well as the nature of the code first written by Google engineers back in 2006. It first took responsibility for the gaffe--which only came to light after detailed inquiries from German authorities--in a blog post on May 14, and ever since then, Google critics have delighted at the opportunity the incident has provided, with lawsuits and Congressional inquiries pending.

Let's take a look at what Google has said and some of the technology issues in question to get some more perspective on Google's Wi-Fi scanning problem.

What data does Google have?
Google admitted on May 14 that it had been "mistakenly collecting samples of payload data from open (i.e. non-password-protected) Wi-Fi networks" for three years. Payload data is distinct from a "header," which contains mostly benign information about the network itself: The payload is the actual data that is being transmitted over the network.

That sounds bad. Theoretically, it means that a Street View car stopped at a red light outside a coffee shop could have been sniffing its unsecured wireless access point and collecting data as it traveled over that unsecured network.

However, Google's store of personal data might not be quite the treasure trove it may seem. Data sent back and forth between encrypted Web sites (password logins, online banking, credit-card transactions, or anything with https:// in the URL) would not be collected. Mobile workers signed into VPNs would also not be affected.

In addition, it's not totally clear how much data Google would be able to capture with a Street View car moving at about 25 miles per hour along the streets of cities and towns around the world. Google said the data was "fragmented," implying that piecing together any coherent image from that data would be difficult.

A company with the algorithmic and computing resources of Google could theoretically make some sense of the 600GBs of fragmented data collected over the last three years. Google already knows a great deal about your online life if you're one of the two-thirds of Americans who regularly use its search engine, but data willingly provided to the company is different than data snatched out of thin air.

How did Google get the data?
Google confirmed it was using "passive" scanning techniques to discover Wi-Fi hotspots. That means there was the wireless equivalent of a big ear on the Street View cars that listened for any and all wireless signals. There's nothing inherently wrong with passive scanning, but most passive scanners are set to not record payload data.

Google Street View cars mapped Wi-Fi hotspots in addition to taking pictures: but went a little too far

(Credit: Google)

To avoid any possibility of collecting payload data, some other wireless mapping companies, such as Skyhook (which has gotten no shortage of free publicity from Google's screwup) use active scanning. This means Skyhook's scanning equipment sends out a probe signal to determine whether any access points are in range, and access points recognize that signal and return their own message that basically says "here I am, here's how to find me, and here's how fast I can send you the Internet." This is also how your computer or phone finds an available Wi-Fi network.

Active scanning is said to scale better, but passive scanning is more comprehensive and can't be detected by the network access point.

Scanning public Wi-Fi networks has been a hobby for wireless enthusiasts and criminal hackers for years. Back in the days when Wi-Fi was just getting off the ground, "wardrivers" would locate and map public hotspots as a service, while those bent on criminal activity could do the same thing to steal data or borrow a network to conduct something illegal.

All other issues aside, the incident is yet another reminder that operating an unsecured wireless access point is like leaving your front door wide open with your jewelry on the doormat.

How could Google have let this happen?
We don't really know.

Google confirmed it uses the open-source Kismet wireless scanning software as the base of its Wi-Fi mapping program. But additional code was written by Google engineers to discard any encrypted payload data captured as part of the scanning, Google said Friday.

That additional code is what is giving Google executives a headache. Without having any inside information, Lauren Weinstein, a longtime networking expert and co-founder of People for Internet Responsibility, believes this is the heart of the debacle: Someone at Google forgot to modify the software before it left a testing environment and entered a production one.

Inside the friendly confines of the Googleplex, logging all publicly available wireless data--including payload data--would be a normal way to test whether the system will function normally as data streams into the application, Weinstein said. "You want to make sure you're not going to crash things. When you're in your own environment, it's your data; you can do what you want with it," he said.

And discarding the encrypted code makes sense in that environment, because the encrypted code is recorded as gibberish that can't be used to run network diagnostics.

However, if this was what happened, code should not have been allowed out of the labs without modifying it to dump all data gathered, not just encrypted data. "A procedural breakdown of this sort shouldn't occur," Weinstein said.

Was it really a simple mistake?
Your answer to that question depends on whether you trust Google.

Those who follow the Internet industry have been noticing a troubling trend over the past several years: one in which Internet companies push the boundaries of user privacy and data collection and apologize once they're found out or the backlash can't be ignored, only to start pushing once again after the hubbub dies down.

Likewise, Google has been willing to push in areas of law that haven't necessarily anticipated the effects of the Internet and digital technology, such as it did when it decided to scan copyright-protected books under the belief it had the fair-use right to do so, rights that in that situation are not explicitly granted nor explicitly barred under copyright law.

It's not illegal to inadvertently capture public wireless data under federal electronic privacy laws, but it is illegal to intentionally do so. All of Google's public statements to this point have characterized the data gathering process as accidental. The developer of Kismet appeared to find such a basic error entirely plausible and human, and posted a playfully chastising blog item to that effect last week, pointing out how easy it would have been to change the code to make sure the software didn't log payload data.

But as the late Ronald Reagan liked to say, "trust, but verify." Google could go a long way toward clearing up any confusion by publishing a much more detailed technical explanation of how this came to be, and by publicly allowing a third party to review the code and data as promised in its May 14 blog post.

Most of this will probably come out in court hearings and congressional testimony anyway. Until then, some will think Google looks like it has something to hide.

Wednesday, March 10, 2010

Hati-Hati,Charger Baterai Bisa Disusupi Trojan Backdoor !


Charger baterai ada trojan backdoor-nya?

United States Computer Emergency Response Team (US-CERT) telah member peringatan bahwa software yang ada di charger baterai Energizer DUO USB mengandung sebuah backdoor yang memudahkan orang lain untuk melakukan akses system komputer yang tidak sah dari jarak jauh. US-CERT mengingatkan bahwa installer untuk software Energizer DUO akan membawa file UsbCharger.dll di directory aplikasi dan file Arucer.dll di directory Windows system32.

Ketika software Energizer UsbCharger dieksekusi, maka akan membuka komponen UsbCharger.dll untuk menyediakan komunikasi USB. UsbCharger.dll akan mengeksekusi Arucer.dll via mekanisme Windows rundll32.exe, dan juga mengkonfigurasi Arucer.dll secara otomatis ketika masuk Windows dengan membuat tanda di registry HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

Resiko yang ada seperti penyusup dapat mengontrol system dari jarak jauh, termasuk mengirim file atau eksekusi program. Menurut US-CERT, komponen backdoor di software Energizer UsbCharger dapat dihapus dengan menghapus file Arucer.dll file dari directory Windows system32. Oleh karena backdoor dijalankan oleh rundll32.exe, maka file akan tetap berjalan sekalipun, software sudah di-uninstal, maka Windows perlu di-restart sebelum file tersebut dapat dihapus. User yang sudah terkena backdoor ini juga harus memblokir port TCP 7777 agar tidak menyebar ke jaringan.Hal ini bisa dilakukan karena backdoor dalam software tersebut tidak otomatis menambah penghambat Windows Firewall untuk port 7777 atau aplikasi backdoor. Oleh karena itu, pertama kali Energizer UsbCharger ditancapkan, maka user akan diberi tahu soal “Run a DLL as an APP” yang sudah diblokir oleh Windows Firewall.

Friday, December 25, 2009

Pemakaian Produk Elektronik Semakin Tinggi Setelah Energy Star 4.0 Keluar

Computer terbaru akan menyandang sistem power Energy Star 5.0. Sistem Energy Star 5.0 akan mulai diterapkan pada notebook computer dan desktop awal bulan depan. Monitor dibawah 30 inch sudah dapat menerapkan pada 30 Oktober. Sedangkan 30 sampi 60 inch baru akan diberlakukan pada 30 Januari 2010.

Setiap computer yang ingin menyandang Energy Star 5.0 harus mampu lulus uji standar baru tersebut. Computer misalnya harus memiliki sistem Idle, Sleep, Standby, Power supply dan sistem pengaturan power dari listrik yang dipakai.

Computer misalnya harus masuk ke mode Sleep bila melewati 30 menit tanpa aktifitas, dan 16 menit untuk notebook

Energy Star 5.0 juga mengharuskan konsumsi desktop hanya berkisar 148 sampai 234kWh pertahun atau kurang. Notebook dibatasi sampai 40 - 88.5kWh pertahun atau kurang.

* Category A (All non-category B, C, D, computers and notebooks)—148 kWh desktops/40 kWh notebooks.
* Category B (2 physical cores and 2GB or more system memory)—175 kWh desktops/53 kWh notebooks.
* Category C (More than two physical cores and 2GB or more system memory or a discrete GPU (graphic processing unit)—209 kWh desktops/88.5 kWh notebooks.
* Category D: Four or more physical cores and 4GB or more system memory or a discrete GPU with frame buffer width greater than 128-bit—234 kWh desktops.

Power supply misalnya harus mampu mengkonversi power AC ke DC dalam 85%.
Pemakaian 50% power harus mampu dikonversi sampai 82%
Pemakaian 20% power harus mampu dikonversi sampai 100%
Sehingga energi yang terbuang harus semakin kecil dengan standar Energy Star 5.0. harus ke posisi stand-by.

Saturday, September 5, 2009

Compact Camera Canon EOS 500D, Sensor 15.1MP


Camera Canon EOS 500D merupakan produk terbaru dari line DSLR dan memiliki posisi range EOS 3 digit. Canon EOS 500D memiliki resolusi 15.1MP, sehingga dapat memproduksi image dengan ukuran 4752x3168 piksel atau seukuran A3 dengan kedalaman 300dpi. Camera Canon EOS 500D juga dilengkapi fitur processor DIGIC 4 dan didesain untuk menangani ukuran image yang besar dengan frame shooting 3.4 frame per second (fps) untuk 170 image format JPEG atau Raw. Camera Canon EOS 500D akan secara otomatis membersihkan sensor camera dengan mengetarkan sensor agar debu hilang. Sensor dapat dibersihkan setiap saat ketika camera ini mati atau menyala, dan hanya dalam waktu beberapa detik, dengan mulai setengah menekan tombol penutupnya atau disabled via system menu.

Camera Canon EOS 500D memiliki fitur LiveView yang dapat digunakan untuk meng-cover 100 persen image di layar LCD, dengan refresh dalam waktu 30fps. Focus camera ini dapat dilakukan secara manual, dengan menggunakan cincin focus di lensa, dan image dapat diatur akurasinya lima hingga 10 kali. Fitur lainnya berupa autofocus, face detection dan quick focus, juga mampu menampilkan overlay grid dan histogram.

Kelebihan camera Canon 500D : Layar LCD beresolusi tinggi, video HD, range ISO, bentuk compact
Kekurangan : Noise motor AF di mode Movie, tidak ada update AF, harga terlalu mahal

Spesifikasi hardware camera Canon EOS 500D :

  • Bobot : 480g
  • Dimensi : 128.8 x 97.5 x 61.9mm
  • Output : 4752 x 3168 piksel
  • Sensor : 15.1MP
  • LCD : 3in TFT, approx. 920k dots
  • CMOS sensor : 22.3x14.9mm
  • File Format : JPEG, Raw, Raw+JPEG
  • Memory Card : SD, SDHC
  • Max Flash Sync 1/200th/sec
  • Connectivity : high speed USB, HDMI mini
  • Power LP-E5 li-ion Built-in
  • Dust Reduction : Yes
  • Drive Mode : Single, Continuous, Self-timer (2sec, 10sec, delay)
  • Live Mode: Yes
  • Focusing Modes : One-shot AF, A1 Servo AF, A1 Focus AF, Manual
  • AF Points : 9-point TTL secondary image-registration, phase detection
  • Built-in Flash : Yes
  • Cable Release : Yes
  • ISO : Auto, 100-3200 (expanded to ISO 6400 or 12,800)
  • Harga perkiraan : $1,423

VISIT THE ADMIN SITE http://mydesignedweb.wordpress.com

ASSASSIN CREED IMAGE

DOWNLOAD NOW :

http://rapidshare.com/files/184207456/lick.it.up.part01.rar
http://rapidshare.com/files/184234290/lick.it.up.part02.rar
http://rapidshare.com/files/184262784/lick.it.up.part03.rar
http://rapidshare.com/files/184292707/lick.it.up.part04.rar
http://rapidshare.com/files/184325397/lick.it.up.part05.rar
http://rapidshare.com/files/184360461/lick.it.up.part06.rar
http://rapidshare.com/files/184387696/lick.it.up.part07.rar
http://rapidshare.com/files/184413681/lick.it.up.part08.rar
http://rapidshare.com/files/184439279/lick.it.up.part09.rar
http://rapidshare.com/files/184464923/lick.it.up.part10.rar
http://rapidshare.com/files/184489896/lick.it.up.part11.rar
http://rapidshare.com/files/184514554/lick.it.up.part12.rar
http://rapidshare.com/files/184540185/lick.it.up.part13.rar
http://rapidshare.com/files/184561333/lick.it.up.part14.rar
http://rapidshare.com/files/184581507/lick.it.up.part15.rar
http://rapidshare.com/files/184599848/lick.it.up.part16.rar
http://rapidshare.com/files/184616293/lick.it.up.part17.rar
http://rapidshare.com/files/184631749/lick.it.up.part18.rar
http://rapidshare.com/files/184646407/lick.it.up.part19.rar
http://rapidshare.com/files/184659421/lick.it.up.part20.rar
http://rapidshare.com/files/184670877/lick.it.up.part21.rar
http://rapidshare.com/files/184683119/lick.it.up.part22.rar
http://rapidshare.com/files/184708244/lick.it.up.part23.rar
http://rapidshare.com/files/184725189/lick.it.up.part24.rar
http://rapidshare.com/files/184745315/lick.it.up.part25.rar
http://rapidshare.com/files/184768963/lick.it.up.part26.rar
http://rapidshare.com/files/184795087/lick.it.up.part27.rar
http://rapidshare.com/files/184822764/lick.it.up.part28.rar
http://rapidshare.com/files/184854897/lick.it.up.part29.rar
http://rapidshare.com/files/184893256/lick.it.up.part30.rar
http://rapidshare.com/files/184926925/lick.it.up.part31.rar
http://rapidshare.com/files/184951652/lick.it.up.part32.rar
http://rapidshare.com/files/184983508/lick.it.up.part33.rar
http://rapidshare.com/files/185007766/lick.it.up.part34.rar
http://rapidshare.com/files/185031712/lick.it.up.part35.rar
http://rapidshare.com/files/185055270/lick.it.up.part36.rar
http://rapidshare.com/files/185079933/lick.it.up.part37.rar
http://rapidshare.com/files/185108350/lick.it.up.part38.rar
http://rapidshare.com/files/185140090/lick.it.up.part39.rar
http://rapidshare.com/files/185166571/lick.it.up.part40.rar
http://rapidshare.com/files/185197403/lick.it.up.part41.rar
http://rapidshare.com/files/185221938/lick.it.up.part42.rar
http://rapidshare.com/files/185242260/lick.it.up.part43.rar
http://rapidshare.com/files/185254505/lick.it.up.part44.rar
http://rapidshare.com/files/185266522/lick.it.up.part45.rar
http://rapidshare.com/files/185279299/lick.it.up.part46.rar
http://rapidshare.com/files/185293697/lick.it.up.part47.rar
http://rapidshare.com/files/185311932/lick.it.up.part48.rar
http://rapidshare.com/files/185331085/lick.it.up.part49.rar
http://rapidshare.com/files/185352063/lick.it.up.part50.rar
http://rapidshare.com/files/185373760/lick.it.up.part51.rar
http://rapidshare.com/files/185396658/lick.it.up.part52.rar
http://rapidshare.com/files/185420992/lick.it.up.part53.rar
http://rapidshare.com/files/185445284/lick.it.up.part54.rar
http://rapidshare.com/files/185486094/lick.it.up.part55.rar
http://rapidshare.com/files/185512529/lick.it.up.part56.rar
http://rapidshare.com/files/185537833/lick.it.up.part57.rar
http://rapidshare.com/files/185562332/lick.it.up.part58.rar
http://rapidshare.com/files/185586688/lick.it.up.part59.rar
http://rapidshare.com/files/185611644/lick.it.up.part60.rar
http://rapidshare.com/files/185636294/lick.it.up.part61.rar
http://rapidshare.com/files/185659731/lick.it.up.part62.rar
http://rapidshare.com/files/185682123/lick.it.up.part63.rar
http://rapidshare.com/files/185702022/lick.it.up.part64.rar
http://rapidshare.com/files/185719735/lick.it.up.part65.rar
http://rapidshare.com/files/185735734/lick.it.up.part66.rar
http://rapidshare.com/files/185745050/lick.it.up.part67.rar

See it...

System Requirements

Supported OS: Windows XP / Vista (only)
Processor: Dual core processor 2.6 GHz Intel Pentium D or AMD Athlon 64 X2 3800+ (Intel Core 2 Duo 2.2 GHz or AMD Athlon 64 X2 4400+ or better recommended)
RAM: 2 GB (3 GB recommended)
Video Card: 256 MB DirectX 10.0–compliant video card or DirectX 9.0–compliant card with Shader Model 3.0 or higher (512 MB video card recommended) (see supported list)*
Sound Card: DirectX 9.0 or 10.0 compliant sound card (5.1 sound card recommended)
DirectX Version: DirectX 10.0 libraries (included on disc)
DVD-ROM: DVD-ROM dual-layer drive
Hard Drive Space: 12 GB
Peripherals Supported: Keyboard, mouse, optional controller (Xbox 360 Controller for Windows recommended)

*Supported Video Cards at Time of Release:
ATI RADEON X1300-1950 / HD 2000 / 3000 series
NVIDIA GeForce 6600-6800 / 7 / 8 / 9 series

Laptop versions of these cards may work but are NOT supported. These chipsets are the only ones that will run this game.


PLEASE GIVE COMMENT AND THE ADMIN GIVE 4 MONTH


TO REQUEST FILM/PC GAMES/SOFTWARE/WINDOWS for FREE


JUST 4 MONTHS ONLY from 1 SEPT - 1 DEC after that WE'LL PROTECT THIS PAGE [GET DO YOU WANT !]


THANKS YOU..... FOR VISITING THIS SITE

Search This Blog