Saturday, February 26, 2011

What is Cloud Computing ?


“Cloud Computing” word come through cloud symbol which is used to signify the internet. In simple words we can say “Cloud computing is using the internet to access someone else’s software running on someone else’s hardware in someone else’s data centre while paying only for what you use”. Cloud Computing has some characteristics like it is used on demand of any time, a user can use more or little services according to requirements, and all services provided by third party so user need only computer and internet access.

Three services come under the Cloud Computing. First one is Infrastructure-as-a-Service (IaaS) like Amazon which make available virtual server to access and configure for data storage. Second, Platform-as-a-Service (PaaS) provides only infrastructure as a set of software and product development tools over the internet. For instance: - salesforce.com, googleApps.  And last is Software-as-a-Service (SaaS) which provide the hardware & software infrastructure, and give information how interacts as a front end view. 

Two types of cloud computing:
·         Public /External Cloud: When the resources such-as applications and data storage is provided by the third party with full security features on the risks. The Third party handle with advanced web applications/ services through the internet.
·        Private/Internal Cloud: When all features of public cloud are provided by a company/organization to their own clients is described as Internal Cloud. The security of financial statements, client’s personal information etc. is secure behind a firewall. 

More addition, some engineers referred that community cloud and hybrid cloud are also types of Cloud Computing. The Layers are used in Cloud Computing to reach at destination like Client -->Applications -->Platform -->Infrastructure -->Server. 

Monday, February 14, 2011

Types of Malware

Malware is a kind of application or program that is designed by hackers to attack the security system of any computer. These kinds of software secretly enter in the computer without the knowledge of vendor, and destroy everything. Use advance upgraded antivirus to protect your system from malware attacks. 

Some malware types are given below:

1.    Virus: A virus is a program that attempts to damage a computer system and replicate itself to other computer system. For example stoned, Michelangelo, Melissa, I love you etc.
2.    Worms: A worm is a self replicating program that can be designed to do any number of things, such as delete files or send documents via e-mail. A worm can negatively impact network traffic just in the process of replicating itself. For example: code red, daprosy worm etc.
3.    Trojan horse programs: A Trojan program is a combination of two or more executable into one file and wrap or bind with some things to cover itself. In this situation we can say all shining things are not gold so be careful while using internet and download anything. For example: sinowal Trojan.

Wednesday, February 9, 2011

Some Top Names of Hackers

White Hat Hackers
White hat hackers that persons which are hired by government, organization to protect their own systems from the hacking attacks of outside the world. everyone respect these members are government pay for this kind of works its called white hat hackers/ following are the some examples of good hackers which are popular in all over the world.


·         Stephen Wozniak
·         Tim Berners-Lee
·         Linus Torvalds
·         Richard Stallman
·         Tsutomu Shimomura

Black hat Crackers
But crackers are not hired by any company they just delete the data or destroy the system rather than to just take the access of the system or steal the confidential data. following are the some names of crackers which are famous all over the world as a name of "black hat" crackers.
 
·         Jonathan James
·         Adrian Lamo
·         Kevin Mitnick
·         Robert Tappan Morris
·         Shawn Fanning
·         VallaH
·         Gordon Lyon / Fyodor
·         The Mentor
·         Karl Koch / August Diehl
·         Electron / Richard Jones
·         Kevin Poulson / Dark Dante

Note: if you want to know about these hackers in detail then you can search  on the any search engine. and take the knowledge whats kinds of techniques, methods, procedures  are used to hack the systems by these hackers. or what kind of vulnerability has found recently.

Tuesday, February 8, 2011

Metasploit


It is an advance tool which is used for penetration testing of the secure network system or any particular PC.  Network may be Local Area Network, Wide Area Network, Metropolitan Area Network or internet. Metasploit can be used in the security research development and Intrusion detection Systems signatures research. It was created by HD moore in 2003 with the help of perl scripting language. But the famous framework was rewritten in the Ruby programming language. It is an open source project which can be used for penetration testing, research as a legally.

Products of metasploit
1.       Metasploit framework
·         Choosing the exploit
·         Configuring the exploit
·         Check is there any risk while attack
·         Choosing payload
·         Configuring payload
·         Modify the payload according to requirements.
·         Execute the exploit
2.       Metasploit Express
3.       Metasploit Pro
4.       NeXpose

Thursday, February 3, 2011

What is AAA


It describes the three steps in computer security system to granting access to network system and the network devices. The brief description is given below:

1.    Authentication: it’s refers to the verification of the user, data, message, commands of the system etc. there are various types of methods used to authenticate the user. Mostly username and password are used to authenticate but sometimes multifactor authentication is provided, it involves three things:
o   Something you know – password
o   Something you have – token cards
o   Something you are - biometrics
Radius, Kerberos and Tacacs+ are the example of authentication servers.

2.    Authorization: after the authentication, the security system has to authorize the users that what kind of resources, applications, and services can use. Because hackers become successful to break the username and password but cannot access the full services without authorization. This function of the system security is handled by the ACL (Access Control List). 

3.    Accounting: accounting is used to keep the records of the user’s activities which have done after the authentication and authorization. It is very advance technology that is also used to verify the failure services, how much time user has been used by clients. Basically log systems are used to define the resources and services of the users and operating system.