Social Icons

Showing posts with label ban Pendrives. Show all posts
Showing posts with label ban Pendrives. Show all posts

Wednesday, February 03, 2010

CYBER GENOME PROJECT : U CAN BE TRACED BACK!!!!

1. The earlier mention on IP Spoofing and the pleothra of options and techniques available for attack,hack,sniff,crashing a network etc are well known for not reaching out to the origin of the person or hacker with the malaecious intention. DARPA (...please google or bing if u wish to know more on DARPA)has finally come out with the ‘Cyber Genome Program’ which will allow any digital artifact either in form of a document, or a piece of malware - to be poked into its very origins.

2. In in principle, it appears that almost any data fished from a relevant network, a computer, a pen drive, someone's phone or whatever is to be studied much as like a human genetic material. The code or document's relationships with other "digital artifacts" will be revealed, perhaps its origins, and other info of interest to a Pentagon admin defending military networks or a military/spook investigator tracing online adversaries.In other words, any code you write, perhaps even any document you create, might one day be traceable back to you - just as your DNA could be if found at a crime scene, and just as it used to be possible to identify radio operators even on encrypted channels by the distinctive "fist" with which they operated their Morse keys. Or something like that, anyway.

3. The concept is a cyber-equivalent of human finger-prints or DNA. The project will thus seek to develop a digital genotype as well as any inferred or observed phenotype in order to determine the identity of such digital artifacts and thus the users who left them behind.

4. DARPA is now looking for technologists to develop and use the cyber-equivalent of DNA to target the people behind cyber attacks. They are looking for geniuses in the fields of Cyber Genetics, Cyber Anthropology and Sociology and Cyber Physiology who can jointly work out the practical solutions to this project.The research involves creating lineage tree for digital artifacts, gaining better understanding of software evolution, and automatic analysis of social relationships between users and malware. Each of these researches will jointly develop the cyber equivalent of fingerprints or DNA.DARPA believes that this can identify the best-of-the-best hackers.

Tuesday, April 07, 2009

IRON KEY : World's Most Secure Pen Drives

1.         Pen drives are dangerous and have even been banned by few organizations including the prestigious armed forces after one scandal of security leak came to light few years back in navy.Is that the solution? Now it is like marta kya na karta wali baat….”i don’t have control over it so better ban it”.Good News for those who still desire to use pendrives in a much much safer way then available in the market.IRON KEYS have come to take care of the security issue of pendrives.What is IRON KEY? Read on…….. 


2.         The IronKey drives are very small, very portable, and very convenient. They come in configurations of 1Gb, 2Gb, 4Gb, and 8 Gb’s. IronKey’s Secure Flash Drive is similar to an iPod, as its hardware, software and online service all rolled into one product. The IronKey Cryptochip uses US government-approved AES, CBC-mode, 128-bit encryption at the hardware level. 


3.         All models come in a sleek, stainless-steel, waterproof case that is sturdier and heavier than other USB drives. The case has been injected with an epoxy compound that blankets the inner workings and keeps them dry and shock-resistant. Security-wise, the case would be extremely difficult to pry open without destroying what's inside. 

4.         IronKey has a password generator that can create passwords up to 99 characters in length at either normal strength with alphanumeric characters or stronger strength, which includes all keyboard characters. To use the IronKey flash drive, you need to activate an online account. This is a necessary step to enable certain services -- such as online password backup, device and software updates and to access IronKey's encrypted Web-surfing service, which uses Mozilla's Firefox. Besides creating an online username and password, you are asked to supply answers to three supplemental authentication questions that will verify your identity in case you ever lose your username or password. Failing to answer the questions accurately will lock you out of your account permanently. 

5.         IronKey e-mails an activation code that you must enter in a window to complete your online setup. IronKey allows you to change personal security information at any time by accessing account settings. If someone does happen to gain access to your flash drive and they fail to type in the correct password more than 10 times, IronKey will self-destruct, permanently locking out users and wiping out all the data on the drive. 

6.         From a speed standpoint, IronKey is fast. Hd Tach tests showed speeds well above the competition: IronKey's speed is 31MB/sec. burst speed; an average read rate of 29.6MB/sec., and a 6-millisecond random access rate. The CPU utilization rate is vastly higher than any other driver on the market by as much as 22%. SLC memory lasts about 100,000 write cycles and MLC memory lasts about 10,000 writes. 

7.         Special Solutions USA is an exclusive distributor of IronKey Secure USB flash drives for the Indian market. 

8.         More on https://www.ironkey.com/

Thursday, February 26, 2009

IT ostracized!!!!!

1.         Few days back a petition was filed at the Bombay High Court calling for a ban on Google Earth citing that terrorists used this mapping service to plan attacks on key emplacements in Mumbai, on 26/11. It reminded me of a similar instance of army wherein few years back Pen Drives were banned following some breach of security information.

2.         “ Mindset” comes as the key to such pudden-head and dullard bans. Such Mindset is linked to the low IQ and literacy level of such decision seekers. I have also read articles wherein similar bans were asked for WiFi connectivity at various places.Now moving on these lines I have a few sample bans which should also be taken care of to eliminate security breach:

a.         Why not ban manufacturing Vehicles in which the terrorists or the offender moved from the source          location to the destination location quickly?

b.         Why not ban mobile phones across India so that they cannot plan further?

c.         Why not ban manufacturing or accessing computers in this country owing to which all this is taking place?

d.         Why not ban manufacturing Guns/Rifles and ammunition?

e.         Why not simply ban INTERNET in India?

3.         So why just pendrives or google earth? It is indeed staggering the way decisions are being made and sought in this country. It wouldn’t come as a surprise to me if access to Google Earth is banned in this region in some time.

4.         What we actually need is to find a way out to tackle these…elimination is not the solution.

5.         The IT quotient of aam aadmi (which indeed hold the majority) needs to actually improve before it gets too late.Be it the defence or the civil.Till the time the defence General saab knows what can be more lethal then pen drive,till the time judge saab of the court knows what power IT holds today…what decision will he be able to make?However big they may be in terms of respectable positions and appointments,they would still form the TAO group(harayana wala) who still believe ke bhayaa ye computer shamputer kuch na karkey dega…karna sabko khud padega…………!!!!!!!

Powered By Blogger