Tuesday, December 28, 2010
Sunday, December 05, 2010
Thursday, November 04, 2010
3. Another easy way is to simply take a screen shot of the image and paste it in paint brush.But this would be cumbersome to do when the images are in bulk quantity.To download JHEAD...click here
Tuesday, November 02, 2010
- February 2010 saw Microsoft announcing discontinuation of "Xbox Live service for original Xbox consoles and games.
- April 2010, Microsoft confirmed stopped working on tablet project, codenamed Courier which was touted to be an Apple iPad rival.
- September 2010, Microsoft announced that the Windows Live Spaces blogging service will be Terminate gradually in favour of WordPress.com.
- May 2010, Microsoft announced halt on the Response Point phone system.
- June 2010 saw Microsoft announcing discontinuation its new generation of smartphones.
- September 2010, Microsoft announced closure of Vine, a service built to help keep friends and family in touch during emergencies.
Monday, November 01, 2010
- Users of computers with viruses from this network will receive a notice of at the time of next login with information on the degree of infection.
- Bredolab, known for spreading spam and rogue antivirus, is thought by some experts to have infected at least 30 million computers.
- Spread via drive-by attack websites and spam email attachments.
- Infecting machines with a backdoor that downloads additional malware without the victim's knowledge.
- Sends out spoofed password reset messages to Facebook users in an attempt to spread malware and infect users of the social network.
- Has the power to obtain information on the user's computer including the ability to copy, change or delete files and other information,"
- Pushdo botnet uses Facebook to spread malicious email attachment: A phony message warns users that their Facebook password has been reset.
- Majority of infections are in the U.S. and the U.K. and many Western European countries.
- Discovered by the Dutch High Tech Crime Team in the late summer.
- Capable of infecting 3 million computers a month. The botnet network used servers hired in the Netherlands from a reseller of LeaseWeb, which is the largest hosting provider in the Netherlands, and one of the largest hosts in Europe.
- Able to constantly change its appearance to avoid detection by traditional antivirus signatures. Like other botnets, the Trojan communicated with the command-and-control server using encrypted messages.
Sunday, October 31, 2010
JPEGSNOOP.Simple to download,very small size and great analysis report.....
Tuesday, October 26, 2010
Wednesday, October 20, 2010
Tuesday, October 19, 2010
Monday, October 18, 2010
Saturday, October 16, 2010
- Password re-use: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account.
- Malware: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.
- Phishing: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password.
- Brute force: You use a password that’s easy to guess, like your first or last name plus your birth date (“ujjwal3008”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “dosa” for “What is your favorite food?”
Friday, October 15, 2010
Tuesday, October 12, 2010
Monday, October 11, 2010
Friday, October 08, 2010
Thursday, October 07, 2010
Thursday, September 30, 2010
Sunday, September 19, 2010
Saturday, September 18, 2010
Thursday, September 16, 2010
Wednesday, September 15, 2010
1. Not all information-based evidence is the same! Evidence can be organized into an “order of volatility” meaning how long it will stick around for you to collect until it automatically is lost.
2. Dan Farmer & Wietse Venema created the below table of evidence volatility, which is commonly referenced by forensic professionals. For example, information stored on a CD-R or some optical storage media can last for about 10-100 years depending on the brand used. Information stored in a computer’s main memory, by contrast, will last for only tens of nanoseconds before it is wiped out by the computer’s normal processing.
TYPE OF DATA
Registers, peripheral memory, caches, etc.
Nanoseconds or less
Floppies, backup media, etc.
CD-ROMs, printouts, etc.
Tens of years
3. Very critical from forensics point of view.....most people would want to turn a computer off (or at the very least unplug it from the network) when they realize an incident has occurred. However, as noted in the chart above, one will lose evidence in main memory and “network state” information (which other systems the computer is connected with and what information they are exchanging) with such an approach. Even shutting down a computer the “normal” way (Start / Turn Off Computer / Turn Off in Windows XP) can delete evidence, as Windows performs a number of housekeeping tasks in the shutdown process, such as closing opened files and clearing out the temporary disk cache.
4. Thanks Peter C. Hewitt (Read from Browser Forensics).