Malware attack attempts to steal your Facebook login credentials, install malware on your computer,and even get your home address.
U.S. Department of Defense
Office of the Assistant Secretary of Defense (Public Affairs) in his immidiate news releas published Secretary of Defense Robert M.Gates announced today Army Gen. Keith B. Alexander’s appointment as the first U.S. Cyber Command commander, officially establishing the initial operating capability for the new command. The announcement comes immediately following Alexander’s promotion to receive his fourth star during a ceremony at Fort Meade, Md.
Given our increasing dependency on cyberspace, this new command will bring together the resources of the department to address vulnerabilities and meet the ever-growing array of cyber threats to our military systems,” said Gates.
One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying to fix that, with a new effort to develop the “cyber equivalent of fingerprints or DNA” that can identify even the best-cloaked hackers.
Facebook is a social networking website Users can add friends and send them messages, and update their personal profiles to notify friends about themselves.
A few weeks ago Facebook had more visitors than Google! If you don’t have Facebook account you’re in the minority.
Facebook is about sharing your information with firends,friends of friends or everyone, you can customize your settings by going to Account menu on Facebook
Basic Directory Information:
Certain information is visible to everyone because it's essential to helping people find and connect with you on Facebook.
- Name and profile picture are visible to everyone so real-world friends can recognize you, and so we can display them when you write on someone's Wall.
- Gender is public so we can correctly display your gender (for example, "Add her as a friend.")
- Networks are visible to everyone so you can see who else is part of your network (and will have access to your information) before choosing "Friends and Networks" for any of your privacy settings.
Other information in this section, including hometown and interests, is visible by default to help friends and other people you have things in common with connect with you.
Iranian Revolutionary Guards Army Commander Ebraham Jabari while reporting of activities and programs of gurad in Qom said: We have the second cyber army corps in the cyber world!
Commander pointed out during his briefing with Ayatollah Alavi Gorgan the enemies trying to hit the Islamic Iran in different ways and one is Cyber attaks.
Jabari said we witnessed today that the Iranian Revolutionary Guards are the in various fields active and the iranian revolutionary gaurd have the second Cyber Army in the world!
Cyber war is the war that requires military recruitment, training and maintenance of effective military forces, wondering who has the first Cyberspace Army.
Dutch Judiciary and the Supreme Court of the Netherlands published on her website about openning of Cybercrime Research Centre and from April 2010 knows the Judiciary in the Netherlands' Knowledge Cybercrime.New Centre brings expertise on Cybercrime law together.
The Cybercrime Research Centre collects and manages information and knowledge about cybercrime in all courts and courts in the Netherlands.
The Knowledge Cybercrime is part of the Court in The Hague.After a preparatory phase that began last year, in April the Centre for Cybercrime in Hague court officially launched.
It provides legal expertise and practical knowledge about cybercrime and basic information about computer technology for judges, judges and court officials in the Netherlands.
This will include a single site with legal information, such as jurisprudence in the area of cyber crime at home and abroad available.
Encryption is the process of converting data into a format that cannot be read by others. You can use EFS to automatically encrypt your data when it is stored on the hard disk.You can encrypt files only on volumes that are formatted with the NTFS file system.EFS, the Encrypted File System, is a feature native to Windows XP that can be used to encrypt(or encode) sensitive files so that only you are able to see and access them. Encryption is the strongest form of protection that Windows provides.The EFS feature is not included in Microsoft Windows XP Home Edition.EFS does support file sharing between multiple users on a single file.
The use of EFS file sharing in Windows XP provides another opportunity for data recovery by adding additional users to an encrypted file.Although the use of additional users cannot be enforced through policy or other means, it is a useful and easy method for enabling recovery of encrypted files by multiple users without actually using groups, and without sharing private keys between users.
How to Encrypt a File
You can encrypt files only on volumes that are formatted with the NTFS file system. To encrypt a file:
Netsh is a command-line scripting tool that allows you to display or modify the network configuration of a computer running Windows XP. Netsh supports various networking components through a context, a series of commands that is specific to the component.To configure the IPv6 Internet Connection Firewall (ICF) provided with the Advanced Networking Pack for Windows XP, you must use commands in the netsh firewall context.
In response to the continuous compromise of networks, multiple countries have begun developing secure platforms and operating systems. Computer companies, university researchers, defense R&D contractors and militaries around the world recognize the criticality of networks and embedded processors within their equipment. They also recognize how vulnerable they are and that’s why so much attention is being given to building in security at every level of the system including the operating system.
As discussed here, China’s Trusted Computing Platform (TCP) program has been underway for some time now and can be traced back to the early 2000s. The Chinese TCP includes multiple layers of built-in security, as well as trusted computing components at the chip operating system level and the machine operating system level.
Early in 2009 a Dutch university was awarded a grant for $3.3 million from the European Research Council to fund 5 more years of work on a Unix derivative version operating system called Minix. This research effort is designed to be more resilient and secure than either Linus or Windows. The most impressive feature in Minix is said to be its self healing feature. This is believed to be the first operating system with the capable of fixing itself when a bug is detected.
Increasing cyber warfare attacks by individuals, crime organizations and governments regarding espionage or malicious software programs that damage and disrupt processes of critical infrastructure assets and processes have grown considerably in the last several last years.Threats coming from terrorist attacks, private or state-sponsored hackers and (transnational) criminal organizations, the vulnerability of the different sector infrastructures has also increased because they are now much more linked with each other - due to the rapid spread of information technologies.