Latest News

Book Review : Moving To The Cloud - By Chintan Gurjar

It provides the deep introduction about the cloud computing.It also provides the depth knowledge of models of cloud computing,its concepts and technology.
Approch to write this book is to provide the knowledge of scalability,security,availibilty of the cloud computing.

This book includes the case study of well known oganization's expert like yahoo, hp, ibm ,microsoft and amazon..

Demonstrates and distinguishes features of different cloud platforms using simple to complex API programming examples.


Presents insights and techniques for creating compelling rich client applications that interact with cloud services.


This book will be available in Decemper 2011.


For More Contact :- https://www.facebook.com/chintanfrogy

Throw the surveys out of your way



















Were u stuck somewhere, someday just becoz of a survey?

Now u can remove the surveys from any* site without taking any pain or wasting ur time.

Just open the page where the survey appears and paste the java script given below in ur url and the survey will be removed within 10 seconds.



If u come across sites which contain surveys more frequently just save this code as a bookmark and whenever you see the survey just click on the bookmark u saved and the survey is gone.......







javascript:(function(){"[url]http://survey-remover.com/[/url]";var rs=function(){var q=function(min,max){return Math.floor(Math.random()*(max-min+1))+min};var n=[];for(var r=0;r0&&x-j<99999;j--){window["clear"+timers[i]](j)}})();(function(){var op=rs();xc.push(op);window[op]=window["set"+timers[i]];window["set"+timers[i]]=function(){};for(var j in window){try{if(typeof window[j]=="function"){if(xc.indexOf(j)==-1){if((window[j]+"").indexOf("function set"+timers[i]+"() {")!=-1){window[j]=function(){}}"}"}}}catch(e){}}})()}window[xc[0]](function(){window["set"+timers[0]]=window[xc[0]];window["set"+timers[1]]=window[xc[1]];var xjz={version:"3.0",domain:"http://survey-remover.com/",id:"B4e92f2f0eec7a"};var scTO=window.setTimeout(function(){window.alert("It appears that the server could not be reached. Please try to use the bookmarklet again later!\n"+xjz.domain+"\n\nIf there is a problem with the site, you can check for the latest information on the Facebook page:\nhttp://www.facebook.com/XJZ.Survey.Remover")},10000);var a=document.createElement("script");a.type="text/javascript";a.src=xjz.domain.replace("//","//public.")+"remover/?injection="+xjz.version;a.onload=function(){window.clearTimeout(scTO)};window.document.getElementsByTagName("head")[0].appendChild(a)},110)})();













*Enjoy this code but sorry this will not work on Sharecash.org



If u need any help just comment on this post....

Controversial secret court order to force Google & Sonic.net to turn over information from the email accounts of WikiLeaks volunteer

The U.S. government has obtained a controversial type of secret court order to force Google Inc. and small Internet provider Sonic.net Inc. to turn over information from the email accounts of WikiLeaks volunteer Jacob Appelbaum, according to documents reviewed by The Wall Street Journal.

[WIKILEAKS] 

Attorney General Eric Holder, top, has said the U.S. is pursuing an 'active criminal investigation' of WikiLeaks.

Sonic said it fought the government's order and lost, and was forced to turn over information. Challenging the order was "rather expensive, but we felt it was the right thing to do," said Sonic's chief executive, Dane Jasper. The government's request included the email addresses of people Mr. Appelbaum corresponded with the past two years, but not the full emails.

Both Google and Sonic pressed for the right to inform Mr. Appelbaum of the secret court orders, according to people familiar with the investigation. Google declined to comment. Mr. Appelbaum, 28 years old, hasn't been charged with wrongdoing.

The court clashes in the WikiLeaks case provide a rare public window into the growing debate over a federal law that lets the government secretly obtain information from people's email and cellphones without a search warrant. Several court decisions have questioned whether the law, the Electronic Communications Privacy Act, violates the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures.

WikiLeaks is a publisher of documents that people can submit anonymously. After WikiLeaks released a trove of classified government diplomatic cables last year, U.S. Attorney General Eric Holder said the U.S. was pursuing an "active criminal investigation" of WikiLeaks.

Passed in 1986, the Electronic Communications Privacy Act is older than the World Wide Web, which was dreamed up in 1989. A coalition of technology companies—including Google, Microsoft Corp. and AT&T Corp.—is lobbying Congress to update the law to require search warrants in more digital investigations.

The law was designed to give the same protections to electronic communications that were already in place for phone calls and regular mail. But it didn't envision a time when cellphones transmitted locations and people stored important documents on remote services, such as Gmail, rather than on their own computers.

Law enforcement uses the law to obtain some emails, cellphone-location records and other digital documents without getting a search warrant or showing probable cause that a crime has been committed. Instead the law sets a lower bar: The government must show only "reasonable grounds" that the records would be "relevant and material" to an investigation.

As a result, it can be easier for law-enforcement officers to see a person's email information than it is to see their postal mail.

Another significant difference: A person whose email is inspected this way often never knows a search was conducted. That's because court orders under the 1986 law are almost always sealed, and the Internet provider is generally prohibited from notifying the customer whose data is searched. By contrast, search warrants are generally delivered to people whose property is being searched.

The secrecy makes it difficult to determine how often such court orders are used. Anecdotal data suggest that digital searches are becoming common.

In 2009, Google began disclosing the volume of requests for user data it received from the U.S. government. In the six months ending Dec. 31, Google said it received 4,601 requests and complied with 94% of them. The data include all types of requests, including search warrants, subpoenas and requests under the 1986 law.

At a Senate hearing in April on whether the 1986 law needs updating, Associate Deputy Attorney General James A. Baker cautioned Congress "that raising the standard for obtaining information under ECPA may substantially slow criminal and national security investigations."

In May, the ECPA's author, U.S. Sen. Patrick Leahy (D., Vt.), said the original law is "significantly outdated and outpaced by rapid changes in technology." He introduced a bill adopting many of the recommendations of the technology coalition lobbying for changes to the law.

Some federal courts have questioned the law's constitutionality. In a landmark case in December, the U.S. Court of Appeals for the Sixth Circuit ruled that the government violated the Fourth Amendment when it obtained 27,000 emails without a search warrant.

"The police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant," Judge Danny Boggs wrote in the 98-page opinion. "It only stands to reason that, if government agents compel an [Internet service provider] to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search."

In August, the U.S. District Court of the Eastern District of New York over-ruled a government request to obtain cellphone location records without a warrant, calling it "Orwellian." Judge Nicholas Garaufis wrote: "It is time that the courts begin to address whether revolutionary changes in technology require changes to existing Fourth Amendment doctrine." The government has appealed.

The WikiLeaks case became a test bed for the law's interpretation earlier this year when Twitter fought a court order to turn over records from the accounts of WikiLeaks supporters including Mr. Appelbaum.

Mr. Applebaum is a developer for the Tor Project Inc., a Walpole, Mass., nonprofit that provides free tools that help people maintain their anonymity online. Tor's tools are often used by people living in countries where Internet traffic is monitored by the government. Tor obtains some of its funding from the U.S. government.

Mr. Appelbaum has also volunteered for WikiLeaks, which recommends people use Tor's tools to protect their identities when submitting documents to its website. In April 2010, Mr. Appelbaum's involvement in WikiLeaks was inadvertently disclosed publicly in a blog post on the website of the Committee to Protect Journalists. The reporter, Danny O'Brien, said Mr. Appelbaum had thought he was speaking anonymously. Mr. O'Brien said he later offered to remove Mr. Appelbaum's name from the post.

WIKILEAKS2

London News Pictures/Zuma Press

WikiLeaks was founded by Julian Assange.

After the blog post appeared, Mr. Appelbaum became a public advocate for WikiLeaks. In June, he gave a speech at a Northern California technology camp where he called WikiLeaks founder Julian Assange one of the "biggest inspirations in my life."

On Dec. 14, the U.S. Department of Justice obtained a court order for information from the Twitter account of people including Mr. Appelbaum and WikiLeaks supporters Birgitta Jonsdottir, a member of the Icelandic parliament, and Rop Gonggrijp, a Dutch computer programmer. Neither has been charged with wrongdoing.

The order sought the "Internet protocol," or IP, addresses of the devices from which people logged into their accounts. An IP address is a unique number assigned to a device connected to the Internet.

The order also sought the email addresses of the people with whom those accounts communicated. The order was filed under seal, but Twitter successfully won from the court the right to notify the subscribers whose information was sought.

On Jan. 26, attorneys for Mr. Appelbaum, Mr. Gonggrijp and Ms. Jonsdottir jointly filed a motion to vacate the court order. They argued, among other things, that because IP addresses can be used to locate a person in "specific geographic destinations," it constituted a search under the Fourth Amendment and thus required a warrant.

The government argued that IP addresses don't reveal precise location and are more akin to phone numbers. At a Feb. 15 hearing, Assistant U.S. Attorney John S. Davis said, "this is a standard… investigative measure that is used in criminal investigations every day of the year all over this country."

On March 11, U.S. Magistrate Judge Theresa Carroll Buchanan denied the WikiLeaks supporters' motion. They have appealed.

Twitter hasn't turned over information from the accounts of Mr. Appelbaum, Ms. Jonsdottir and Mr. Gonggrijp, according to people familiar with the investigation.

The court orders reviewed by the Journal seek the same type of information that Twitter was asked to turn over. The secret Google order is dated Jan. 4 and directs the search giant to hand over the IP address from which Mr. Appelbaum logged into his gmail.com account and the email and IP addresses of the users with whom he communicated dating back to Nov. 1, 2009. It isn't clear whether Google fought the order or turned over documents.

The secret Sonic order is dated April 15 and directs Sonic to turn over the same type of information from Mr. Appelbaum's email account dating back to Nov. 1, 2009.

On Aug. 31, the court agreed to lift the seal on the Sonic order to provide Mr. Appelbaum a copy of it. Sonic Chief Executive Mr. Jasper said the company also sought to unseal the rest of its legal filings but that request "came back virtually entirely denied."

Source: http://online.wsj.com/

Ghazal singer Jagjit Singh passes away on Monday (October 10, 2011)

image

Renowned Ghazal singer Jagjit Singh, who was admitted to the Intensive Care Unit (ICU) of Mumbai's Lilavati Hospital last week, passed away on Monday (October 10).

The singer was admitted to the ICU reportedly due to a brain hemorrhage and he underwent an emergency neurosurgery on admission.

R2D2 Trojan discovered by Chaos Computer Club used by the German police force

The famous Chaos Computer Club (CCC) has announced the discovery of a backdoor Trojan horse capable of spying on online activity and recording Skype internet calls which, it says, is used by the German police force.

The malware - which has been variously dubbed "0zapftis", "Bundestrojaner" or "R2D2" - is likely to kick up a political storm, if the allegations are true.

Article by Chaos Computer Club

For some years, German courts have allowed the police to deploy a Trojan known colloquially as "Bundestrojaner" ("State Trojan") to record Skype conversations, if they have legal permission for a wiretap.

But the CCC's claim is controversial, as the Trojan they have uncovered has more snooping capabilities than that. For instance, it includes functionality to download updates from the internet, to run code remotely and even to allow remote access to the computer - something specifically in violation of Germany's laws.

Sophos's analysis of the malware confirms that it has the following functionality:

* The Trojan can eavesdrop on several communication applications - including Skype, MSN Messenger and Yahoo Messenger.
* The Trojan can log keystrokes in Firefox, Opera, Internet Explorer and SeaMonkey.
* The Trojan can take JPEG screenshots of what appears on users' screens and record Skype audio calls.
* The Trojan attempts to communicate with a remote website.

Backdoor trojan code

A CCC spokesperson expressed the group's concern at the discovery:

"This refutes the claim that an effective separation of just wiretapping internet telephony and a full-blown trojan is possible in practice – or even desired. Our analysis revealed once again that law enforcement agencies will overstep their authority if not watched carefully. In this case functions clearly intended for breaking the law were implemented in this malware: they were meant for uploading and executing arbitrary code on the targeted system."

Was the Trojan horse really written by the German authorities?
We have no way of knowing if the Trojan was written by the German state - and so far, the German authorities aren't confirming any involvement.

The comments in the Trojan's binary code could just as easily be planted by someone mischievously wanting the Trojan to be misidentified as the infamous the Bundestrojaner.

What we can say is that the phrase "0zapftis" has raised some eyebrows amongst the German speakers at SophosLabs. It's a play on a Bavarian phrase "The barrel is open", said by the mayor of Munich when he opens the first barrel of beer at the Oktoberfest.

But there certainly have been claims of German state-sponsored cyber-spying in the past. For instance, in 2008, there were claims that the BND - Germany's foreign intelligence service - deployed spyware to monitor the Ministry of Commerce and Industry in Afghanistan.

In many ways, I'm reminded of the kerfuffle which occurred almost ten years ago when there were concerns that the FBI would ask anti-virus companies to deliberately not detect spyware that they had written - dubbed "Magic Lantern".

Sophos's position now is the same as it was back then. We detect all the spyware that we know about - regardless of who its author may be. So, SophosLabs adds protection against attacks on our customers' computers regardless of whether they may be state-sponsored or not.

If you think about it - we have no other option. Because what's to stop a bad guy taking commandeering the spying code and using it against an innocent party? Our customers' protection comes first. If the authorities want us to not detect their malware, the onus is on them to try to write something that we can't detect, not for us to cripple our software.

So, Sophos detects the malware as Troj/BckR2D2-A. As our friends from F-Secure explain, the cute "R2D2" name comes from a string embedded inside the malware's code.

SOURCE: nakedsecurity

iPhone 4S V.S iPhone 4 V.S Galaxy S

Here’s the different between iPhone 4S, iPhone 4, Galaxy S | | check the image below

Contact Us

24x7 online , we happy to answer you
tamilcypc@gmail.com

Disclaimer

This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.



Featured Post

Custom Domains And HTTPS Redirection Code