Headlines News :
    Showing posts with label News. Show all posts
    Showing posts with label News. Show all posts

    University of Illinois at Chicago Hacked.

    Some info about the site.
    Domain Name: UIC.EDU



    Registrant:
    University of Illinois at Chicago
    Computer Center M/C 135
    1940 West Taylor
    Chicago, IL 60612-7352
    UNITED STATES

    Administrative Contact:
    Edward Zawacki
    University of Illinois at Chicago
    ACCC (M/C 135)
    1940 W Taylor
    Chicago, IL 606127352
    UNITED STATES
    (312) 996-0658


    Technical Contact:
    Edward Zawacki
    University of Illinois at Chicago
    ACCC (M/C 135)
    1940 W Taylor
    Chicago, IL 606127352
    UNITED STATES
    (312) 996-0658


    Name Servers: 
    UIC-DNS1.UIC.EDU 128.248.2.50
    UIC-DNS2.UIC.EDU 128.248.7.50
    UIC-DNS3.UIC.EDU 128.248.171.50

    Domain record activated: 25-Feb-1988
    Domain record last updated: 25-Jun-2012
    Domain expires:



    http://f012.cuppa.uic.edu/                                                                 Site.
    http://www.hack-db.com/374589.html                                            Mirror 1
    http://www.freezepage.com/1366678529OQUKROKBBT             Mirror 2




    Source = Crackhackform

    Hacker in court for DDoS attacks on Oxford and Cambridge Universities


    The 21 British year-old hacker found guilty of a long string online crimes including distributing a keylogger Trojan disguised as a Call of Duty software patch, has pleaded guilty to launching DDoS attacks on the websites of Oxford and Cambridge Universities.

    According to police, Lewys Martin (or 'Sl1nk' as he was known) launched the 'hacktivist' attacks between 29 January and 1 February 2012, following this up the next day with a similar attempted DDoS on the website of Kent Police.
    In all three cases the disruption was temporary although Martin's alleged intent had been to compromise the websites as part of a politically-motivated campaign, which led to his arrest on 3 February, police said.
    The attacks would have been a relatively nave crime it is wasn't for previous attacks for which he has already been found guilty, including the Call of Duty keylogger attack and physical burglaries of computer equipment from two colleges in Kent while on bail.
    Martin was also accused by police of harvesting 300 credit cards during his keylogging campaign, which he sold to foreign criminals it was alleged.
    Martin was given an 18-month jail term last May, and could be facing a second stretch in jail when he is sentenced for the latest DDoS attacks on 13 May.
    'In this case, Martin was attacking not only large organisations, but individuals," said prosecutor Ken Goss from CPS South East Complex Casework Unit.
    'Both Oxford and Cambridge Universities estimate that around two weeks' worth of man hours were spent, dealing with the cyber-attacks. We would like to thank Cambridge and Oxford universities, who together with Kent Police and the victims, have supported this case to a successful conclusion.'

    Hackers Attack 90,000 WordPress Blogs




    Keeping the default settings on any Internet-connected service is just asking for trouble. It's easy enough to scoff at people whose brilliant "12345" password fell victim to hackers, but it's just as simple to target usernames. A number of WordPress bloggers discovered this the hard way, when their "admin" accounts became part of a hostile, exploitative botnet.
    The attacks began last week, and have affected more than 90,000 blogs so far. The hackers behind the attacks have combed through WordPress accounts and attempted to guess passwords via brute force.
    Their program cycles WordPress accounts through 1,000 common passwords. While this tactic is useless against savvy users, enough people utilize easy-to-guess passwords to make it worthwhile for the hackers.
    After the hack compromises a user's system, it drafts the blog into a botnet, a collection of compromised systems that communicate with one another and often come in handy for online attacks. Private blogs aren't too useful in this system, but blogs that are housed on Web servers are. Servers recruited into the botnet can attack a multitude of machines at once, and grow the system exponentially.
    The ultimate goal of the botnet is a mystery; having administrative access to a number of blogs is not that useful in and of itself. However, a network of more than 90,000 compromised machines can wreak all sorts of havoc, especially in denial-of-service attacks.
    Matt Mullenweg, a WordPress founder, took to his blog to provide some advice. He explained that hackers had been targeting users who never changed the "admin" username for their account — in retrospect, an obvious security risk. "If you still use 'admin' as a username on your blog, change it," he recommended. [See also: 5 Looming Threats That Keep Security Experts Up at Night]
    By using a strong password, turning on two-step authentication and updating to the latest version of WordPress software, users will "be ahead of 99 percent of sites out there and probably never have a problem," Mullenweg said.WordPress.com users would be wise to heed Mullenweg's words, especially when it comes to two-step authentication. This won't benefit the myriad bloggers who use WordPress software and host their work elsewhere, but Mullenweg's other tips will still help.
    If your blog has already been compromised, there's not much to do at this point except change your username and password, and hope for the best.

    Evernote Hacked: All 50 Million Users' Passwords Reset


    LONDON -- Online note-taking service Evernote Corp. says it has been hacked and is resetting all its 50 million users' passwords as a precaution.
    The Redwood City, California-based company said in a post published late Saturday that an attacker had been able to access sensitive customer information and that every user would have their account reset "in an abundance of caution."
    In a follow-up email sent Sunday, the company said it believed the attack “follows a similar pattern of the many high profile attacks on other internet-based companies that have taken place over the last several weeks” — an apparent reference of recent breaches at Facebook Inc., Twitter Inc., and Apple Inc.
    However the company said the attack did not appear to be linked to Java, a commonly used computer programming language whose weaknesses have been used as springboards for other recent hacks.
    Evernote said the attack, which it described as “sophisticated,” was able to compromise an unspecified number of customers’ encrypted passwords. Decoding such passwords can be difficult but possible.
    The company said it has seen no evidence that any customer data had been tampered with or that any payment information had been compromised.

    Google 'Inactive Account Manager' Lets Users Plan For Their 'Digital Afterlife



    What happens to your online data after you die?
    It sounds morbid, but as more of our lives moves online it's becoming increasingly important to consider.
    Now Google has become the first major internet company to offer users an easy way to decide how their email, social networking and online photos are dealt with when they become - in the parlance of the net - 'inactive'.
    The new feature allows users to choose to delete their data after a certain period of inactivity, or send details of how to access it to specific people.
    In a blog post the search giant admitted the Inactive Account Manager was "not a great name" but that it would "make life easier for your loved ones after you're gone".
    "Not many of us like thinking about death -- especially our own. But making plans for what happens after you're gone is really important for the people you leave behind. So today, we're launching a new feature that makes it easy to tell Google what you want done with your digital assets when you die or can no longer use your account."
    "For example, you can choose to have your data deleted -- after three, six, nine or 12 months of inactivity. Or you can select trusted contacts to receive data from some or all of the following services: +1s; Blogger; Contacts and Circles; Drive; Gmail; Google+ Profiles, Pages and Streams; Picasa Web Albums; Google Voice and YouTube. Before our systems take any action, we'll first warn you by sending a text message to your cellphone and email to the secondary address you've provided."
    Now users of Facebook, Twitter and other big social networking sites are calling for similar options so they can decide what happens to their online self after the inevitable occurs.

    Two Most Famous Hackers Who Committed Suicide

    Who is an Hacker?
    A Computer adept someone who enjoys working with computer and testing the limits of  system an enthusiastic or fast programmer.

    According to me, we can call hackers as Heroes of computer evolution , Hackers are who break computer security systems unlawfully.


    Two Most Famous Hackers Who Committed Suicide

    Jonathan James (12-12-83 to 18-5-2008)

    Two Most Famous Hackers Who Committed Suicide



    Jonathan Joseph James was an American black hat hacker. Jonathan James also known as "c0mrade" He was the first guy of America who sent prison for cyber crime activity. At the age of 15 years old [In 1999] Jonathan James hacked into Bellsouth and Miami-Dade school network. James also hacked NASA computers and downloaded source code worth 1.37 million [ Downloaded source code to know How the International Space Station is worked.                                                                                                                                                                                                                     In 2000 James house raided by US local police, Jonathan James was sentenced 6 months house arrest and banned from using Computer.

    On may 18th James Committed suicide, He wrote "I honestly, honestly had nothing to do with TJX" in his suicide note.

    For more about James 

    Aaron Swartz (8-11-1986 to 11-1-2013)

    Two Most Famous Hackers Who Committed Suicide                                                                                                              
    Aaron swartz was an American programmer and hacker, Co-founder of Reddit & Founder of RSS . At the age of 13 years old he was participated in ArsDigita [ArsDigita is event or competition who create education, useful non commercial websites] and he won the ArsDigita prize. Aaron swartz was worked in W3C,  MarkDown and Wikipedia. In 2012 Aaron protested against SOPA

    In 2011 Aaron was arrested by federal agent for stealing academic journals from JSTOR, before his suicide Aaron faced penalty of upto 35 years in prison. After he was released under $100,000 bail. 


    On 1/11/2013 Aaron committed suicide by hanging

    Source Wikipedia

    Why Are You Still Using Windows XP

    If you are still using Windows XP – or you know somebody who does – Microsoft would like you to remember that you only have 365 more days before the company will end all support for the operating system it launched in New York on October 25, 2001. Both Windows XP SP3 and Office 2003 will go out of support on April 8, 2014, and XP users will stop receiving any new security updates, hotfixes and support (free or paid) from Microsoft. Worldwide, just under 40 percent of all desktops and laptops still use XP today, according to the latest data from Net 




    Why is Microsoft ending support Windows XP and Office 2003?


    In 2002 Microsoft introduced its Support Lifecycle policy based on customer feedback to have more transparency and predictability of support for Microsoft products. As per this policy, Microsoft Business and Developer products, including Windows and Office products, receive a minimum of 10 years of support (5 years Mainstream Support and 5 years Extended Support), at the supported service pack level.
    Thus, Windows XP SP3 and Office 2003 will go out of support on April 8, 2014. If your organization has not started the migration to a modern desktop, you are late. Based on historical customer deployment data, the average enterprise deployment can take 18 to 32 months from business case through full deployment. To ensure you remain on supported versions of Windows and Office, you should begin your planning and application testing immediately to ensure you deploy before end of support.

    What does end of support mean to customers?

    It means you should take action. After April 8, 2014, there will be no new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates.
    Running Windows XP SP3 and Office 2003 in your environment after their end of support date may expose your company to potential risks, such as:
    • Security & Compliance Risks: Unsupported and unpatched environments are vulnerable to security risks. This may result in an officially recognized control failure by an internal or external audit body, leading to suspension of certifications, and/or public notification of the organization’s inability to maintain its systems and customer information.
    • Lack of Independent Software Vendor (ISV) & Hardware Manufacturers support: A recent industry report from Gartner Research suggests "many independent software vendors (ISVs) are unlikely to support new versions of applications on Windows XP in 2011; in 2012, it will become common." And it may stifle access to hardware innovation: Gartner Research further notes that in 2012, most PC hardware manufacturers will stop supporting Windows XP on the majority of their new PC models.
    Get current with Windows and Office. This option has upside well beyond keeping you supported. It offers more flexibility to empower employees to be more productive, while increasing operational efficiency through improved PC security and management. It also enables your organization to take advantage of latest technology trends such as virtualization and the cloud.

    How do I begin my migration?


    Enterprise Customers: Microsoft offers large organizations in-depth technical resources, tools, and expert guidance to ease the deployment and management of Windows, Office and Internet Explorer products and technologies. To learn more about migration and deployment programs, please contact your Microsoft sales representative or Certified Microsoft Partner. Learn how to pilot and deploy a modern desktop yourself, download the free Microsoft Deployment Toolkit and begin your deployment today.
    Small to Medium Business: There are many options for small and medium businesses considering moving to a modern PC with the latest productivity and collaboration tools. Small to mid-size organizations should locate a Microsoft Certified Partner to understand the best options to meet their business needs. If your current PC meets the system requirements for Windows 7 or Windows 8, you can buy Windows 7 Professional or Windows 8 Pro from a local retailer or Microsoft Certified Partner. If your PC does not meet system requirements, consider purchasing a new business PC with Windows 8 Pro.

    Resource = Microsoft




    Samsung to Launch Galaxy SII Jelly Bean Update in Febuary

    Just over a week ago, Samsung announced the details surrounding the upcoming Galaxy S II Jelly Bean update, but didn't mention an exact date when for the start of its rollout. 


    Today a company spokesperson has told CNET the update for the former Android flagship is coming in the beginning of February in Singapore, with the rest of the markets to follow
    The update will be downloadable only via the Samsung Kies app and not over-the-air, because of its extra large size. 

    Launched with Android 2.3 Gingerbread back in 2011, Samsung has been taking good care of its former flagship upgrading it to Android 4.0 Ice Cream Sandwich and now to Android 4.1 Jelly Bean. More than 40 million people have bought the device paving the company's road to the throne as the biggest smartphone manufacturer out there. We'll continue to follow the news surrounding the update in the coming weeks. 

    Source : [GSMArena]

    Samsung Announces Windows 8 Phone, PC and Tablet


    Samsung Electronics Co., Ltd., announced a new line of Windows 8-based devices under the ATIV brand Wednesday, including the first publicly-revealed Windows Phone 8 smartphone. The company said the lineup will include an 11.6-inch Samsung ATIV Smart PC and ATIV Smart PC Pro, a 10.1-inch ATIV tablet and ATIV S smartphone weighing 8.7mm, and a 4.8-inch HD Super AMOLED display.
    The announcements were made during a webcast at the IFA trade show in Berlin,where the Samsung Galaxy Note II was also unveiled. ATIV is the reverse order of VITA, which means life in Latin, Samsung said.
    "With our leadership in design and technology and Microsoft's leadership in operating systems, together we are able to provide customers with a full range of ATIV devices for cross-category convergence," said Seong Woo Nam, executive vice president of IT Solutions Business at Samsung Electronics, in a statement.
    The Intel-based ATIV Smart PC and ATIV Smart PC Pro will feature a detachable keyboard docking system, giving users the ability to switch between a clamshell notebook PC and a tablet PC form factor. Both will also come with a 10-finger multi-touch screen, giving users the ability to do pinch-to-zoom, rotate images and scroll through pages, Samsung said. The devices will also be equipped with front and rear-facing cameras, an S Pen for writing and drawing capabilities and an S Player for playback of images and videos in any format. Both will have an 11.6-inch Full HD LCD display. The ATIV Smart PC is 9.9mm thick and has a battery life of up to 13.5 hours. The Smart PC Pro weighs 11.9mm and has a battery life of up to eight hours.
    The ATIV Tab is equipped with an 8,200 mAh battery, a 1.5GHz dual-core processor and HSPA+42 connectivity.
    The ATIV S has a 1.5Ghz dual-core processor, 1GB of onboard RAM, and an 8MP autofocus rear camera and 1.9MP front-facing camera. It will be available with either 16GB or 32GB of storage, a MicroSD slot and a 2300mAh battery.
    Samsung did not reveal pricing information or a release date for the devices, but some rumors suggest T-Mobile may get the initial release due to the HSPA+ support and lack of LTE connectivity.
    News of more Windows Phone 8 devices is expected next week when Microsoft and Nokia will hold an event in New York where the Finnish phone maker is expected to unveil its first Lumia phones based on the OS.

    Ubuntu now primed and ready for tablets


    Canonical, the company behind Ubuntu, has announced a tablet version of the popular open-source operating system. Canonical has said that the new variant of the OS is part of its overall strategy of rolling out Ubuntu across multiple categories of devices such as televisions, mobile phones, tablets and PCs.

    An exhaustive post on the official Ubuntu website explains that the OS will work on tablets with the help of a new interface designed for larger, touch displays. It will also be optimized to work on multiple hardware configurations but will require a minimum of 2GB RAM, a dual core Cortex A9 processor (or equivalent), 8GB of storage and a multi-touch display. The post further explains that the same OS will run on all platforms and the only differing factor between them will be the interface.
    Canonical has stated that it is in talks with its PC OEM partners to push Ubuntu on mobiles and tablets and that the first tablets running Ubuntu will be out by the end of the year. However, Canonical hasn't revealed any tentative pricing details, only stating that the tablets will be priced “competitively.”
    If you were expecting to run Android apps on Ubuntu tablets, you're in for disappointment. Canonical explains that since Ubuntu is a completely separate OS, you will not be able to run Android apps on it. However, Canonical claims to have made it easy for developers to republish Android apps for Ubuntu, especially if apps have been developed for either iOS or Android using HTML5. Canonical has also released an SDK for developers interested in creating apps for Ubuntu.

    Source: PC World
     
    Support : Worldwide Solution | Intense Dealz | Your Link
    Copyright © 2013. Students Friend - All Rights Reserved
    Website maintained by Ankit Jain And Akhil Dadhich
    Proudly powered by WWS INDIA