Friday, September 28, 2012

Topology in Network Design | Sedulity Groups

In computer networking, topology refers to the layout of connected devices. Network topologies are categorized into the following basic types:
Bus, Star, Tree, Ring, Mesh & More complex networks can be built as hybrids of two or more of the above basic topologies.

Bus Topology
Bus network uses a common backbone to connect all devices. The backbone functions as a shared communication medium that devices attach into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.

Tuesday, September 25, 2012

Pirate Bay co-founder arrested on hacking charges | Sedulity Groups

A co-founder of BitTorrent tracker The Pirate Bay has been arrested in Sweden over allegations he was involved in hacking a contractor to the country's tax authority.
Sweden's public prosecutions authority suspected Gottfrid Svartholm to be one of three involved in continued breaches of a core database held by contractor Logica over a two-year period.
The hacks, which began in 2010 and continued until April this year, reportedly involved accessing the database containing civic registration numbers for people with protected identities, with thousands of such numbers copied by the three over the breach period.

Virgin Mobile Users Personal Details Hacked by crackers | Sedulity Groups

Users of virgin mobile must pay attention as the data in your mobile phones is not safe anymore. Your phone number is the main key to your personal information. According to Kevin Burke, who warned Virgin Mobile USA customers about a conspicuous security hole in the phone company's account login protocol said, "If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn’t like you."

USA users of Virgin Mobile manage their account by logging in through an online portal, which requires a mobile number and a 6-digit pin. Once inside, customers can check their call records, change the handset associated with their number, and update their personal details

Sunday, September 23, 2012

An Introduction to Cloud Computing | Sedulity Groups

Introduction 
Cloud computing means using the computing resources both hardware and software, that are delivered as a service over Internet. In other words, computer and software services necessary for computing works provided via the internet is called cloud computing.

When we think about the need of IT, cloud computing comes into focus like the requirement of a way to increase or add capabilities on the fly without investing in new infrastructure, training new personnel, licensing new software etc. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Friday, September 21, 2012

Ways of Improving Communication | Sedulity Groups

Think before speaking - This is not something new, but however often we hear it, we forget to apply it. To think before speaking means to show consideration to the other and then we say the right thing, at the right time, in the right way. 

Listen with both ears - We should be an active listener by tuning in fully and being present fully with the person and with the moment. If I am not, I listen through one ear and let it out of the other, or I only half listen, which finally creates misunderstandings.

Thursday, September 20, 2012

CYBER CRIME - A major problem in cyber space | Sedulity Groups

The concept of cyber crime is not totally different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the permit of the state.

Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.” The hallmark of criminality is that, it is breach of the criminal law. 

Monday, September 17, 2012

Android OS – Boom in Mobile Operating System | Sedulity Groups

Android is a Linux-based operating system for mobile devices such as smartphones and tablet computers, developed by Google in conjunction with the Open Handset Alliance. It had a worldwide smartphone market share of 59% at the beginning of 2012, and as of year 2012 there were 500 million devices activated and 1.3 million activations per day.

There are a host of advantages that Android OS has like Open Platform/ License Free, Robust OS Kernel, Innovative Library Packages, Easy Application Development, Rapid Improvement, etc.
The advantages are listed below:-

Friday, September 14, 2012

How to Keep your computer virus free

Is your computer speed is similar to the speed of a tortoise? Is your computer drives contain double the number of folders that you have created? Do you often get mysterious error messages? Is your computer hangs every time; you open 2 or 3 applications simultaneously? 

Well if you are facing any of the problems listed above then your computer is infected with ‘Viruses’.

What is Open Source? | Sedulity Groups

Open source Open Source Open Source!

Today, there is a lot of hype about open source in the IT Industry.

But the Question is that what is OpenSource?

Some People Say that opensource means free software i.e. the software which is said to be open source software will be freely available to the masses.

Other says that if the software is open source software then the “sourcecodeof the software i.e. the programming instructions are also available.

Actually, the above said things about open source are true but the actual power of open source is even more than this.

Wednesday, September 12, 2012

Steps to regain access to your Hacked Facebook Account | Sedulity Groups

Today facebook is one of leading social networking site. It was launched in February 2004, owned and operated by Facebook, Inc. Today facebook has millions of users, which is a milestone for any company plying its trade on the Internet.

Facebook has evolved rapidly from a raw social networking website into a billion dollar company in a short span of time.

Facebook hosts valuable data of all its active users, which pertains to their personal details, contact details, geographic details, and other information related to interests, hobbies, and favourite hangouts.

Ankit Fadia site again Hacked and Suspended | Sedulity Groups

Ankit Fadia has been in the news for being one of India’s first ethical hackers. He has been recognized by a number of software companies. Fadia was also seen on several TV shows, recently as a host offering tech and security advice to his viewers. At the same time, there have been a bunch of other activities, such as writing security books, that have been published in the market. He’s also known to give talks and speak in seminars on security related topics. There have also been reports that books written by Ankit Fadia contain plagiarised content. 

Tuesday, September 11, 2012

Sunday, September 9, 2012

Al Jazeera SMS service Hacked, Fake messages spread by Hackers

Al-Jazeera says hackers have targeted the Qatar-based TV satellite channel for the second time in a week, sending out false news reports on its mobile sms service. Al Jazeera confirm the hack in a tweet,"We'd like to inform our subscribers that Aljazeera sms sevice is being compromised by pirates and they've sent fake news news with no basis"

The story claiming that the Prime Minister (Sheikh Hamad bin Jassem) has been the target of an assassination attempt in the royal palace is completely false and was a result of hacking of the service,” the channel said in breaking news.

Friday, September 7, 2012

"Al Jazeera" News Network website Hacked | Sedulity Groups

The official website of one of the biggest Arabic-language news network "Al Jazeera" got hacked just now by Pro-Assad hackers called "Al-Rashedon". If your miss the deface page, please have a look to mirror of it Here.

Deface page designed with Dark color as shown in image and have some message in Arabic language, in English its "In response to your attitude against Syria, ( Syrian people and Government ) and your support to the Terrorist & Armed Groups, and sharing Fake news, your site has been hacked and this is our response to you. ( Al Rashedon hakcker group.)"

Wednesday, September 5, 2012

Antisec Hackers hack FBI laptop and leak 12 Million Apple Device Records | Sedulity Groups

The hacker group AntiSec released a file of a million and one UDIDs unique device identifiers which it claims to have hacked it off an FBI computer via a Java vulnerability. UDIDs are unique IDs for iPhone, iPad and iPod Touch devices. They said they obtained the file in March by hacking into the laptop of a Federal Bureau of Investigation agent in the bureau’s New York field office.

In an unusually lengthy note on Pastebin, a member of AntiSec said the group had culled some personal data such as full names and cell numbers from the published data. Instead, the group said it published enough information such as device type, device ID and Apple Push Notification Service tokens to let users determine whether their devices are on the list.

Monday, September 3, 2012

Sony Mobile website hacked by NullCrew | Cyber Times

Another Cyber attack on Sony this year, Hacking group called "NullCrew" hack into one of the biggest site of Sony mobile website (www.sonymobile.com) and leak complete database on Internet. Nullcrew releasing their hack dumps from their official twitter account @OfficialNull.

The dump of database released on Pastebin with a small note from Hackers as given below:
Sony, we are dearly dissapointed in your security.
This is just one of eight sony servers that we have control of.
Maybe, just maybe considering IP addresses are available.
Maybe, just maybe it’s the fact that not even your customers can trust you.
Or maybe, just maybe the fact that you can not do anything correct technologically



Critical buffer overflow vulnerability in Photoshop CS6 | Sedulity Groups

Adobe has released an update for Photoshop CS6 that closes a critical heap-based buffer overflow vulnerability (CVE-2012-4170) in its popular graphics editing program. Both the Mac and Windows versions of Photoshop CS6 (aka Photoshop 13.0) contain a critical vulnerability that could allow an attacker to take control of affected systems.

Furthermore, company officials say Adobe is unaware of any attacks against this vulnerability.That said, the Photoshop 13.0.1 update contains 75 other bug fixes, including 31 for problems known to cause crashes, 18 pertaining to 3D features, and 15 for drawing and graphics features.