IT LOVER

27/03/2009

The Importance of Strong Passwords

Filed under: Articles — टैग्स: — pankaj kuamr @ 7:39 पूर्वाह्न

Is Your Birthday Your Favorite Password?

With the recent news of Republican vice-presidential candidate Sara Palin’s email account being hacked, it’s time for all of us to take a close look at the passwords we have chosen to secure our online personal information.

It starts rather innocuously. We set up a free email account with Yahoo and when prompted for a password, we struggle to think of something that we won’t later forget. The first thing that pops into you head is your date of birth, favorite color or your pet’s name. Now, just in case you do forget your password, you’ll be able to answer a password “challenge” question so that your password can be released to you. Typically, you can choose from a variety of questions, such as your mother’s maiden name, the name of the street you grew up on, what high school you went to, etc. Done! You happily begin using your Yahoo email account.

What about shopping online? Banking online? Private newsgroups? Other email providers such as Gmail, Hotmail? Before long, you could easily have 25-50 different sites that you access with a unique user ID and password. You are using different passwords for these accounts, aren’t you?In the case of Palin, per Yahoo news, “The hacker guessed that Alaska’s governor had met her husband in high school, and knew Palin’s date of birth and home Zip code. Using those details, the hacker tricked Yahoo Inc.’s service into assigning a new password, “popcorn,” for Palin’s e-mail account, according to a chronology of the crime published on the Web site where the hacking was first revealed.”

The first thing I suggest you do is change all of your easy to guess passwords to a strong password.

From the Webopedia, the definition of a strong password is “A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary or parts of the user’s own name.”

We have a strong password tool on our site for this purpose, which we encourage you to use.

Now, no one is going to remember a password like ‘HEQ2vAMvu5iI46,’ but moreover, it’s not likely to ever be hacked either. So, use a local encrypted password storage tool (NEVER online) to record these, which might be as simple as password protected Excel spread sheet, or use a script such as Password Safe or KeePass Password Safe (both are available for free).

The Importance of Safety When Shopping on the Internet

Filed under: Uncategorized — टैग्स: — pankaj kuamr @ 7:37 पूर्वाह्न

The internet has opened up a whole world of trade without borders contacting and connecting with a world-wide consumer base has become more important than ever especially with the current global economic conditions. You can live in London and purchase items from Japan such as jewelry or watches or live in Madrid and buy clothing from America. This is an amazing concept and makes the world feel a lot smaller and it is so novel and exciting, but would you really purchase thing from around the globe using your credit card and potentially opening those details up to global levels of abuse? The chances of having you identity and your personal bank details or information stolen must be fairly limited but it still exists and you would not want to make a purchase only to find your bank account had been emptied the next day. With identity theft on the increase will people really feel happy taking the risk?

With many stories detailing how the government and even some banks have misplaced our most personal details and these are institution we implicitly trust how can we think about giving our details to people we have no reason to trust? Equally how can people set up an internet business and protect yourself and your customer from electronic pirates? As a business and a customer you must ensure these transactions have some kind of protection, so before you have entered any of your personal information especially those connected to bank or credit card details you must make sure that payment system has adequate protection in place. Any customers who frequently use the internet will be aware of a site that appears to have some protection in place and many potential customers will be aware of the SSL brand as one of the system which ensures the protection of their precious bank and personal details.

Secure Sockets Layer (SSL) is an encryption protocol that will scramble sensitive information from the browser to the server and allow only one person access to the information which provides security and data integrity. Most professional and secure payment gateways are usually protected by SSL.

This means that when you enter sensitive and personal information via protected website, there is a cryptographic key is generated. This key protects the information keeping it safe by encrypting the information which gives the information a unique key code for each authentic session. Only one transaction is being processed during authenticated session so that the information cannot be hacked or duplicated.

SSL Certificates are registered to companies who are secured properly and can be issued by certain providers who are also registered. If you are using a website with the SSL logo and are curious then simply click on to their logo for more information. It will give you details of who provides the certificate.

Does Every Business need an SSL Certificate?
If you are doing business in a global network or communicating via Internet you may need to invest in an SSL certificate to protect your customers and financial transactions. If you do not have an SSL Certificates this could potentially put off customers and mean that your business suffers. It can also mean that all of your sensitive information is made available to unscrupulous characters that will abuse the information. The SSL certificate serves as a guarantee of reliability and will secure your valid customers and show them that their safety is important to you.

Oliver is a avid web security analyst who loves to promote the correct ways to secure corporate websites. Oliver works for ssl247.co.uk who specialise in SSL certs as well as having informative guides on installing geotrust ssl certificates on your web server.

Internet Privacy, IP Address and Proxy

Filed under: Uncategorized — टैग्स: — pankaj kuamr @ 7:33 पूर्वाह्न

What is an IP address?

A string of numbers assigned to you by your Internet Service Provider whenever you connect online.

Can I be traced through my IP address?

Your IP address reveals only the location and name of your ISP. Your ISP itself may have records of your computer using their service at such and such a time, but an ISP will usually not disclose this information without a search warrant / court order.

How long does an ISP keep logs of user IP addresses?

No one knows, but it could be anywhere from months to a few years. This is necessary to monitor bandwidth usage.

Someone online has threatened they can find me through my IP address. Can they do this?

Most likely they’re bluffing. Unless you run your own server or live in the same building as your ISP’s office, a stranger can’t find you using just your IP address.

Can someone find out my username or password based in my IP address?

No. Your ISP is the only one that knows these details.

Do my emails display my IP address?

Yes. To send email anonymously, you’ll want to use an anonymous remailer or an anonymous proxy.

What is a proxy server?

A third party server used as a go-between by a client computer that doesn’t want to connect directly to the Internet.

Can a proxy server give me internet privacy?

Not if it’s just a proxy server. A mere proxy server will announce to cyberspace that it’s acting as a proxy for such and such IP address user (your computer), so you can still be traced through it.

What type of proxy server should I use to be able to surf anonymously?

You need an anonymous proxy server that’s secure, reputable and reliable. You will most likely have to pay a fee.

How can an anonymous proxy server protect me?

Mainly by hiding your real IP address and blocking malicious scripts and programs from entering your system. You may get a different IP address each time you use the proxy. Additionally, some anonymous proxies claim they can’t disclose your data even if subpoenaed (court ordered) since they don’t store user logs.

How much does it cost to get an anonymous proxy server?

Could be $19.95, or $29.95 or $99.95. It all depends on the server and the service features. Go check out the anonymous proxy server’s website and compare their product services.

Are free proxy servers safe to use?

Not if you’re serious about your security and privacy. Many free proxies are either incorrectly set up, or owned by malicious people who want to use your data for their own ends. Beware of using free proxies and anonymous proxy servers that don’t allow secure connections. And no matter what server you use, always encrypt private data

Basic Ways to Protect Your Computer From Hackers

Filed under: Articles — टैग्स: — pankaj kuamr @ 7:31 पूर्वाह्न

Your computer have important information that don’t want other person to see it? Do you feel there always have someone looking at the data in your computer?

Nowadays, There have more than 70% of people in the world using computers. People don’t save their data on paper anymore, they use their computer to save all the data, like company documents, photos, files, chatting history…etc… But do you know the data in your computer are watching by someone else? Your information may be already in someone’s hand.. I am going to introduce some basic ways to protect your computer from the Hackers.

1. Using Anti virus software Remember to use Anti virus software to search your computer every week, and turn on the Anti virus software every time you turn on your computer. That can helps stop unauthorized access on your computer, prevents virus infection, and “cloaks” your data ports against a hacker scanning for openings.

2. Be careful Email Attachment Never open or download the attachment in your Email, unless you know what is it for , or you know the person that sent to you. There have chance that virus is hiding inside the attachment.

3. Be careful what you download in the internet You have to be careful what you download in the internet. There have a lot of program can spy on your computer after you download. Those program can get the information from your computer, the information when you searching on the internet back to the creator of the program. It is a big deal actually, why? Because when you and searching on the internet, there have some important information will pass out (Like your Credit card number, or your social security number). You do not want to give out those information. There have some ways that you can protect your computer from those spy, one of them are the anti-spyware Program, it can protect your personal information from being taken without your permission.

4. Make sure your computer OS and softwares are up to date Hackers are always looking for the security Gaps to hack into someone’s computer. The first things they look for are the operating system, web browser and software that install in your computer. So make sure everything in your computer are up to date.

5. set up a password for your Wireless Network Make sure you set up a password on your wireless router. A lot of wireless router are set to no password require when you first install it. Be sure you do that, at least set up a basic security on your wireless network, or else everyone can access to the computers in that Wireless Network.

Those are the basic tips to protect your computer from the hackers. There also have many others advance ways to stop the hackers, but at least do the things that I mention above first. Then you can get into more advance ways to protect your computer. Hope this information will help some of you.

26/03/2009

Some Useful Articles

Filed under: Articles, computer zone, Uncategorized — टैग्स: , , , , — pankaj kuamr @ 11:05 पूर्वाह्न

(more…)

Some Thing about VOIP

Filed under: voip — pankaj kuamr @ 10:47 पूर्वाह्न

VOIP -> What is VOIP? (more…)

GPRS Network Features

Filed under: GPRS ZONE — pankaj kuamr @ 10:41 पूर्वाह्न

GPRS -> Network Features

PACKET SWITCHING GPRS involves overlaying a packet based air interface on the existing circuit switched GSM network. This gives the user an option to use a packet-based data service. To supplement a circuit switched network architecture with packet switching is quite a major upgrade. However, as we shall see later, the GPRS standard is delivered in a very elegant manner- with network operators needing only to add a couple of new infrastructure nodes and making a software upgrade to some existing network elements. With GPRS, the information is split into separate but related “packets” before being transmitted and reassembled at the receiving end. Packet switching is similar to a jigsaw puzzle- the image that the puzzle represents is divided into pieces at the manufacturing factory and put into a plastic bag. During transportation of the now boxed jigsaw from the factory to the end user, the pieces get jumbled up. When the recipient empties the bag with all the pieces, they are reassembled to form the original image. All the pieces are all related and fit together, but the way they are transported and assembled varies. The Internet itself is another example of a packet data network, the most famous of many such network types. SPECTRUM EFFICIENCY Packet switching means that GPRS radio resources are used only when users are actually sending or receiving data. Rather than dedicating a radio channel to a mobile data user for a fixed period of time, the available radio resource can be concurrently shared between several users. This efficient use of scarce radio resources means that large numbers of GPRS users can potentially share the same bandwidth and be served from a single cell. The actual number of users supported depends on the application being used and how much data is being transferred. Because of the spectrum efficiency of GPRS, there is less need to build in idle capacity that is only used in peak hours. GPRS therefore lets network operators maximize the use of their network resources in a dynamic and flexible way, along with user access to resources and revenues. GPRS should improve the peak time capacity of a GSM network since it simultaneously: allocates scarce radio resources more efficiently by supporting virtual connectivity migrates traffic that was previously sent using Circuit Switched Data to GPRS instead, and reduces SMS Center and signaling channel loading by migrating some traffic that previously was sent using SMS to GPRS instead using the GPRS/ SMS interconnect that is supported by the GPRS standards. INTERNET AWARE For the first time, GPRS fully enables Mobile Internet functionality by allowing interworking between the existing Internet and the new GPRS network. Any service that is used over the fixed Internet today- File Transfer Protocol (FTP), web browsing, chat, email, telnet- will be as available over the mobile network because of GPRS. In fact, many network operators are considering the opportunity to use GPRS to help become wireless Internet Service Providers in their own right. The World Wide Web is becoming the primary communications interface- people access the Internet for entertainment and information collection, the intranet for accessing company information and connecting with colleagues and the extranet for accessing customers and suppliers. These are all derivatives of the World Wide Web aimed at connecting different communities of interest. There is a trend away from storing information locally in specific software packages on PCs to remotely on the Internet. When you want to check your schedule or contacts, instead of using something like “Act!”, you go onto the Internet site such as a portal. Hence, web browsing is a very important application for GPRS. Because it uses the same protocols, the GPRS network can be viewed as a sub-network of the Internet with GPRS capable mobile phones being viewed as mobile hosts. This means that each GPRS terminal can potentially have its own IP address and will be addressable as such. SUPPORTS TDMA AND GSM It should be noted right that the General Packet Radio Service is not only a service designed to be deployed on mobile networks that are based on the GSM digital mobile phone standard. The IS-136 Time Division Multiple Access (TDMA) standard, popular in North and South America, will also support GPRS. This follows an agreement to follow the same evolution path towards third generation mobile phone networks concluded in early 1999 by the industry associations that support these two network types.

GPRS User Features

Filed under: GPRS ZONE — टैग्स: — pankaj kuamr @ 10:40 पूर्वाह्न

GPRS  User Features

GPRS has several unique features which can be summarized as:

 

IMMEDIACY

GPRS facilitates instant connections whereby information can be sent or received immediately as the need arises. No dial-up modem connection is necessary. This is why GPRS users are sometimes referred to be as being “always connected”. Immediacy is one of the advantages of GPRS (and SMS) when compared to Circuit Switched Data. High immediacy is a very important feature for time critical applications such as remote credit card authorization where it would be unacceptable to keep the customer waiting for even thirty extra seconds.

SPEED

Theoretical maximum speeds of up to 171.2 kilobits per 

second (kbps) are achievable with GPRS using all eight timeslots at the same time. This is about three times as fast as the data transmission speeds possible over today’s fixed telecommunications networks and ten times as fast as current Circuit Switched Data services on GSM networks.

NEW APPLICATIONS, BETTER APPLICATIONS

GPRS facilitates several new applications that have not previously been available over GSM networks due to the limitations in speed of Circuit Switched Data (9.6 kbps) and message length of the Short Message Service (160 characters). These applications, described later in this white paper, range from web browsing to file transfer to home automation- the ability to remotely access and control in-house appliances and machines.

SERVICE ACCESS

To use GPRS, users specifically need:

  • a mobile phone or terminal that supports GPRS (existing GSM phones do NOT support GPRS)

  • a subscription to a mobile telephone network that supports GPRS

  • use of GPRS must be enabled for that user. Automatic access to the GPRS may be allowed by some mobile network operators, others will require a specific opt-in

  • knowledge of how to send and/ or receive GPRS information using their specific model of mobile phone, including software and hardware configuration (this creates a customer service requirement)

  • a destination to send or receive information through GPRS. Whereas with SMS this was often another mobile phone, in the case of GPRS, it is likely to be an Internet address, since GPRS is designed to make the Internet fully available to mobile users for the first time. From day one, GPRS users can access any web page or other Internet applications- providing an immediate critical mass of

25/03/2009

GPRS Limitations

Filed under: GPRS ZONE — टैग्स: — pankaj kuamr @ 1:37 अपराह्न

GPRS  Limitations

It should already be clear that GPRS is an important new enabling mobile data service which offers a major improvement in spectrum efficiency, capability and functionality compared with today’s nonvoice mobile services. However, it is important to note that there are some limitations with GPRS, which can be summarized as:

Limited Cell Capacity for All Users
GPRS does impact a network’s existing cell capacity. There are only limited radio resources that can be deployed for different uses – use for one purpose precludes simultaneous use for another. For example, voice and GPRS calls both use the same network resources. The extent of the impact depends upon the number of timeslots, if any, that are reserved for exclusive use of GPRS. However, GPRS does dynamically manage channel allocation and allow a reduction in peak time signalling channel loading by sending short messages over GPRS channels instead.

RESULT: NEED FOR SMS as a complementary bearer that uses a different type of radio resource.

Speeds Much Lower in Reality
Achieving the theoretical maximum GPRS data transmission speed of 172.2 kbps would require a single user taking over all eight timeslots without any error protection. Clearly, it is unlikely that a network operator will allow all timeslots to be used by a single GPRS user. Additionally, the initial GPRS terminals are expected be severely limited – supporting only one, two or three timeslots. The bandwidth available to a GPRS user will therefore be severely limited. As such, the theoretical maximum GPRS speeds should be checked against the reality of constraints in the networks and terminals. The reality is that mobile networks are always likely to have lower data transmission speeds than fixed networks.

RESULT: Relatively high mobile data speeds may not be available to individual mobile users until Enhanced Data rates for GSM Evolution (EDGE) or Universal Mobile Telephone System (UMTS) are introduced.

 

Support of GPRS Mobile Terminate by Terminals is Not Ensured
At the time of writing, there has been no confirmation from any handset vendors that mobile terminated GPRS calls (i.e. receipt of GPRS calls on the mobile phone) will be supported by the initial GPRS terminals. Availability or not of GPRS MT is a central question with critical impact on the GPRS business case such as application migration from other nonvoice bearers.

By originating the GPRS session, users confirm their agreement to pay for the delivery of content from that service. This origination may well be performed using a Wireless Application Protocol (WAP) session using the WAP microbrowser that will be built into GHPRS terminals. However, mobile terminated IP traffic might allow unsolicited information to reach the terminal. Internet sources originating such unsolicited content may not be chargeable. A possible worse case scenario would be that mobile users would have to pay for receiving unsolicited junk content. This is a potential reason for a mobile vendor NOT to support GPRS Mobile Terminate in their GPRS terminals.

However, there is always the possibility of unsolicited or unwanted information being communicated through any media, but that does not mean that we would wish to preclude the possibility of any kind of communication through that means altogether. A network side solution such as GGSN or charging platform policing would be preferable rather than a non-flexible limitation built into all the GPRS handsets.

When we asked Nokia about this issue, it commented: “Details of the Nokia GPRS terminals are not available at this time. It is too early to confirm whether MT will be supported in the first Nokia GPRS terminals”. The company’s policy is not to make details available about products before they are announced. Readers should contact the GSM Association, Mobile Lifestreams Limited and/or the vendors directly to encourage them to incorporate support for GPRS MT in their initial terminals.

RESULT: GPRS usability and therefore business case is threatened if GPRS MT is not supported by GPRS terminals.

Suboptimal Modulation
GPRS is based on a modulation technique known as Gaussian minimum-shift keying (GMSK). EDGE is based on a new modulation scheme that allows a much higher bit rate across the air interface – this is called eight-phase-shift keying (8 PSK) modulation. Since 8 PSK will also be used for UMTS, network operators will need to incorporate it at some stage to make the transition to third generation mobile phone systems.

RESULT: NEED FOR EDGE.

Transit Delays
GPRS packets are sent in all different directions to reach the same destination. This opens up the potential for one or some of those packets to be lost or corrupted during the data transmission over the radio link. The GPRS standards recognise this inherent feature of wireless packet technologies and incorporate data integrity and retransmission strategies. However, the result is that potential transit delays can occur.

Because of this, applications requiring broadcast quality video may well be implemented using High Speed Circuit Switched Data (HSCSD). HSCSD is simply a Circuit Switched Data call in which a single user can take over up to four separate channels at the same time. Because of its characteristic of end to end connection between sender and recipient, transmission delays are less likely.

RESULT: NEED FOR HSCSD.

No Store and Forward
Whereas the Store and Forward Engine in the Short Message Service is the heart of the SMS Center and key feature of the SMS service, there is no storage mechanism incorporated into the GPRS standard, apart from the incorporation of interconnection links between SMS and GPRS.

WHAT IS GPRS

Filed under: GPRS ZONE — टैग्स: — pankaj kuamr @ 1:32 अपराह्न
The General Packet Radio Service (GPRS) is a new non-voice value added service that allows information to be sent and received across a mobile telephone network. It supplements today’s Circuit Switched Data and Short Message Service. GPRS is NOT related to GPS (the Global Positioning System), a similar acronym that is often used in mobile contexts.

 

Enabling GPRS on a GSM network requires the addition of two core modules, the Gateway GPRS Service Node (GGSN) and the Serving GPRS Service Node (SGSN). As the word Gateway in its name suggests, the GGSN acts as a gateway between the GPRS network and Public Data Networks such as IP and X.25. GGSNs also connect to other GPRS networks to facilitate GPRS roaming. The Serving GPRS Support Node (SGSN) provides packet routing to and from the SGSN service area for all users in that service area.

In addition to adding multiple GPRS nodes and a GPRS backbone, some other technical changes that need  to be 

added to a GSM network to implement a GPRS service. These include the addition of Packet Control Units; often hosted in the Base Station Subsystems, mobility management to locate the GPRS Mobile Station, a new air interface for packet traffic, new security features such as ciphering and new GPRS specific signalling.

GPRS will provide a massive boost to mobile data usage and usefulness. That much seems assured from its flexible feature set – its latency and efficiency and speed. The only question is how soon it takes off in earnest and how to ensure that the technical and commercial features do not hinder its widespread use

Older Posts »

WordPress.com पर ब्लॉग.