Friday, January 14, 2011

Car Theft by Antenna

Car thieves of the future might be able to get into a car and drive away without forced entry and without needing a physical key, according to new research that will be presented at the Network and Distributed System Security Symposium next month in San Diego, California.

The researchers successfully attacked eight car manufacturers' passive keyless entry and start systems—wireless key fobs that open a car's doors and start the engine by proximity alone.

Srdjan Capkun, an assistant professor of computer science in the system security group at ETH Zurich in Switzerland, who led the work, says he was inspired to investigate the security of keyless entry and start systems after buying a car that had one. Capkun and Aurélien Francillon and Boris Danev, both researchers in the same institution, examined 10 car models from the eight manufacturers. They were able to access all 10 and drive them away by intercepting and relaying signals from the cars to their wireless keys. While they could relay the signals from the key back to the car as well, usually they did not need to because the key transmits its signals up to around 100 meters. The attack works no matter what cryptography and protocols the key and car use to communicate with each other.

Normally, when a wireless key is within a few meters of the right car, it detects a low-powered signal that causes it to issue a command that opens the car enable the ignition. The researchers used a pair of antennas to transmit these signals from the car to the key when the key was farther away, tricking the car into opening without the ordinary authorization. One antenna needs to be very close to the car, and one needs to be within eight meters of the key.

Monday, December 20, 2010

Samsung Mobile Secret Codes

These codes may be not applied to all old models of Samsung mobile, but you can try to all latest Samsung mobiles. You can display the hidden information of mobile sets and troubleshoot the routine problems using these codes.

Follow the list of latest Samsung codes list:
CodeFunction
*#9999#Use to display the mobile software version
#*3849#Use to reboot the Samsung handsets
*#06#To display the IMEI Number of the mobile
#*2558#To on/off the mobile time
#*7337#Use to unlock the latest Samsung set
#*4760#Use to activate and deactivate the GSM features
*#9998*246#To verify the memory and battery information
*#7465625#To verify the Lock status of mobile
*#0001#To display the Serial Number of the mobile
*2767*637#Use to unlock the mobile code
*#8999*636#To display the storage capacity of the mobile
#*2562#Use to reboot the Samsung handsets
*#8999*667#Use to run the mobile in Debug mode
*2767*226372#To fine-tune the camera settings
*#8999*778#Use to display the information about mobile SIM card
*2767*637#Use to unlock the mobile code
*7465625*28638#Use to make active the Network Lock
#*#8377466#To display the hardware version
*7465625*746*Code#Use to make active the SIM card lock
*#pw+15853649247w#Use to unlock the mobile code without SIM card
#*3888#To verify the Bluetooth information
*#9998*627837793#Uses to get extra parameter for unlock mobile settings
#7465625*28638#Use to unlock the Network Lock
#*7983# VoltageUse to regulate Frequency or Voltage
#7465625*746*Code#Use to unlock the SIM card lock
#*2834#Use to reset the handsfree options
#*5376#To delete all SMS in one command
*#4777*8665#Use to explore the GPSR tool list
#*2474#To verify the charging duration
*2767*688#Use to readjust the mobile TV options

Saturday, December 18, 2010

12 Commands Every Linux Newbie Should Learn

Look at some of the main commands any Linux user should know.

1] man
I begin with the "man" command because in many ways it's the most fundamental. This command is what you should use when you want to learn more about another command.

Essentially, "man" displays online manual pages to provide a basic introduction to the various other commands that are available. Using it can help you understand the functions of those commands as well as how to use them. You can even type "man man" to get the man page for "man" itself.

If you're ever unsure of a command you're about to use, try typing "man" along with the command to learn more about exactly what it does.

2] ls
Another fundamental command is "ls," which displays the contents of your current directory. For example, "ls ~" will show you the files in your home directory.

3] pwd
To find out which directory you're working in, type "pwd," which is short for "print working directory." Typed in the desktop directory, for example, this command will return "~/desktop."

4] cd
To change the directory you're in, use this command. To switch to the desktop directory, for instance, you'd type "cd desktop."

5] mkdir
To create a new directory, this is the command you'd use. For example, "mkdir pictures" will create a directory called "pictures."

6] find and locate
To search for a file, you can use either "find" or "locate," both of which are very similar.

7] cp
This is the command to use when you want to create a copy of a file with a new name. Type "cp cats dogs," for instance, and you'll get an exact copy of "cats" named "dogs"; the file "cats" will still be there too.

8] mv
With "mv," you can change the name of a file or move it to another directory--or both. Typing "mv cats dogs" will rename the file "cats" to "dogs," for example, while typing "mv cats ~/desktop" will move the file "cats" to the desktop directory without renaming it.

9] more
The "more" command allows you to see the contents of a file one screen at a time.

10] kill
When you want to stop an application, there's no more efficient way to do it. Typically "kill" is used after "ps," which lets you find out the process ID of what you want to kill.

11] sudo
Part of the reason Linux is so secure is that only the root user has the privileges needed to install or remove applications and make other big changes. To install an application as a regular user, the sudo command can give you those root privileges temporarily. You will, however, have to enter your password.

12] passwd
Need to change your password? Then just type this command at the prompt, and it will ask you to type the current password and then a new one.

Wednesday, December 15, 2010

Spammers Were Offering $2K For The Gawker Database. Now They Have It For Free.

In the modern media equivalent of a Greek myth, the Gawker empire was hit hard over the weekend when it was revealed that a hacker group had infiltrated its commenter database via a vulnerability in its source code, exposing the user names and encrypted passwords for over 1.3 million commenters. To further drive the moral of this story home, the group, which goes by the name Gnosis, pulled a dictionary attack and unencrypted about 188K of the easiest ones like “password” or “qwerty” releasing the whole database and source code package in a torrent on Pirate Bay.

Apparently the Gawker data breach was no secret on the Internet (reports had been circulating for about a month) and people offered Gnosis money for the Gawker database before the release. According to a Gnosis representative who gave details to TechCrunch, the group received several offers all in the vicinity of 2K, mostly from spammers and re-salers, “certainly not for good.”

Already Internet nogoodniks are taking advantage of the exploit. A hack-related Twitter attack on Sunday forced users to tweet about the Acai berry diet. TechCrunch Senior Editor Erick Shoenfeld fell prey to what looks like the second iteration of the Acai attack this morning. The New York Post reports that one woman had her entire life “turned upside down“ when her social media accounts were taken over and used to post anti-Semitic messages. Behemoths LinkedIn, Yahoo and World Of Warcraft have all taken measures to protect against further attacks.

Because many people use the same password across multiple sites, this spammer’s delight is going to get worse before it gets better. Especially if the attacks spread from social media to financial services. It’s time to get an entirely new password if you’ve ever commented on Gawker, for everything, even if your password (like both of mine) is still encrypted in the full_db.txt file. You can check if your information has been exposed here.

Saturday, November 20, 2010

Global wireless traffic up 160 percent per month in 2010


According to Cisco Systems’ 2010 Visual Networking Index Forecast, for this year alone, it is now estimated that global wireless traffic has increased an estimated 160 percent to about 91 petabytes per month. This surpasses even the most optimistic predictions that were made at the end of 2009, and now Cisco is saying that the trend for 2011 looks even more compelling. So when will this peak and reach a ceiling you may ask? Not anytime soon it seems.

But it’s certainly challenging for wireless carriers to keep up with all this growth in traffic. Each new generation of mobile networking technology is able to push far more data bits through the same amount of spectrum than its predecessors, and emerging offload techniques such as femtocells and Wi-Fi repeater antennas provide new options for distributing the traffic burden even more.

But there is just so much that even the best technology can do as wireless carriers, just like any ISPs or other service providers are limited by just how much data and voice signals you can squeeze on mobile radio frequencies.

Today's mobile service operators need access to more wireless spectrum not only to just keep up with customer demand, but also to help accelerate innovation. Governments would be hard-pressed to find an industry that’s more ready, willing and able to spend tens of billions of dollars immediately on upgrading mobile networks.