Every one of you out there is aware of the Metro UI of Windows 8. Microsoft recently released their Windows 8 Developers to give a sneak peek of their newer version. This version of Windows 8 is actually meant for developers to test out their applications. So until Microsoft launches the final release of Windows 8, you can get almost all the UI features of Windows 8 with Windows 8 UX Pack.

Windows 8 UX Pack gives you the entire Windows 8 UI interface with no changes to your system settings. You are even offered with Windows 8 themes and application to make your system look more like Windows 8. Another good feature about this application is that it changes aero glass effect according to your wallpaper.
In the beginning of the installation you are prompted to choose from three interfaces Metro, M3, and developer preview. Same goes for the themes.
You can even configure your aero settings from the Aura icon in your system tray.

Note: This application do use a lot of memory at startup, so if your PC starts a little slower than usual, don’t worry much about it. Another fact about this application is that it uses more that normal CPU resources.

As you can see in the above image, CPU usage increased from 1-5% (normal) to 5-16%. So if you are not a power user, this application will not affect your PC usage in any ways.
Some Key Features of Windows 8 UX Pack:
• M3 user interface for installation/configuration
• One-click installation/configuration
• Ux Style memory patching
• Windows 8 Aero Glass or Lite theme
• Instant M2 and M3 wallpaper/logon screen customization
• User Tile with current user/wallpaper auto configured on login

Use the following Link to Download Windows 8 UX Pack 3.5
http://www.softpedia.com/get/Desktop-Enhancements/Windows-8-UX-Pack.shtml

Windows 7 Service Pack 1 was released few months ago. It was a standalone package which could be installed on existing operating system. We had to install it separately to upgrade Windows 7 to SP 1 though, one could create custom DVD integrating Service Pack 1 with Windows 7 DVD.
Here I am sharing the direct links to download Windows 7 DVD with SP1.

Windows 7 Ultimate x86 SP1

Windows 7 Ultimate x64 SP1
Specially suited for those lazy ones who want to install Windows integrated with Service Pack 1 without taking manual efforts. The links point to Windows 7 Ultimate SP1 DVD ( 32 Bit and 64 Bit versions). ISO downloaded can be directly burned to DVD and it’s bootable.

Windows 7 Service Pack 1 was released few months ago. It was a standalone package which could be installed on existing operating system. We had to install it separately to upgrade Windows 7 to SP 1 though, one could create custom DVD integrating Service Pack 1 with Windows 7 DVD.
Here I am sharing the direct links to download Windows 7 DVD with SP1.

Windows 7 Ultimate x86 SP1

Windows 7 Ultimate x64 SP1
Specially suited for those lazy ones who want to install Windows integrated with Service Pack 1 without taking manual efforts. The links point to Windows 7 Ultimate SP1 DVD ( 32 Bit and 64 Bit versions). ISO downloaded can be directly burned to DVD and it’s bootable.

Call it as an answer by Facebook against the Google+’s Hangout or whatever, Facebook now integrates Video Chat. And this is what Facebook co-founder and CEO Mark Zuckerberg mean by the statement that his company would be announcing “something awesome” last week.

The Facebook Chat window got an overhaul with a new clean look. A video-call button on the top and a button for full screen view for the text chat that’s the Facebook message.

Besides the video chat Facebook also throwing in all new group-chat, this will allow you to have conversation with multiple people at the same time. Facebook has worked on their chat to make is more stable and better to hold good with most of the browsers out there. To sum up Facebook will have smarter sidebar, group chat, and integrated video conferencing.

Facebook with the help of Skype gives a better video chat service than that Google+ offers as of now. Rumors on Facebook’s video chat service started with the launch of Google+ Hangouts, a service that allows users to video chat with more than ten friends at a time.

All you need is to install a small app once and you’re ready to party.

Get started now: Enable Facebook Video Chat Now

Facebook Hacked Again: Facebook Leaked millions of user credentials

App bug overrides user privacy settings

Facebook has leaked access to millions of users’ photographs, profiles and other personal information because of a years-old bug that overrides individual privacy settings, researchers from Symantec said.

The flaw, which the researchers estimate has affected hundreds of thousands of applications, exposed user access tokens to advertisers and others. The tokens serve as a spare set of keys that Facebook apps use to perform certain actions on behalf of the user, such as posting messages to a Facebook wall or sending RSVP replies to invitations. For years, many apps that rely on an older form of user authentication turned over these keys to third parties, giving them the ability to access information users specifically designated as off limits.

The Symantec researchers said Facebook has fixed the underlying bug, but they warned that tokens already exposed may still be widely accessible.

“There is no good way to estimate how many access tokens have already been leaked since the release [of] Facebook applications back in 2007,” Symantec’s Nishant Doshi wrote in a blog post published on Tuesday. “We fear a lot of these tokens might still be available in log files of third-party servers or still being actively used by advertisers.”

While many access tokens expire shortly after they’re issued, Facebook also supplies offline access tokens that remain valid indefinitely. Facebook users can close this potential security hole by changing their passwords, which immediately revokes all previously issued keys.

The flaw resides in an authentication scheme that predates the roll out of a newer standard known as OAUTH. Facebook apps that rely on the legacy system and use certain commonly used code variables will leak access tokens in URLs that are automatically opened by the application host. The credentials can then be leaked to advertisers or other third parties that embed iframe tags on the host’s page.

“The Facebook application is now in a position to inadvertently leak the access tokens to third parties potentially on purpose and unfortunately very commonly by accident,” Doshi wrote. “In particular, this URL, including the access token, is passed to third-party advertisers as part of the referrer field of the HTTP requests.”

A Facebook spokeswoman said there is no evidence the weakness has been exploited in ways that would violate the social network’s privacy policy, which steadfastly promises: “We never share your personal information with our advertisers.” Facebook on Tuesday also announced it was permanently retiring the old authentication routine.

Doshi, who was assisted by fellow researcher Candid Wueest, said there’s no way to know precisely how many apps or Facebook users were affected by the glitch. They estimate that as of last month, almost 100,000 applications were enabling the leakage and that over the years “hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties.”

Facebook over the years has regularly been criticized for compromising the security of its users, which now number more than 500 million. The company has rolled out improvements, such as always-on web encryption, although users still must be savvy enough to turn it on themselves, since the SSL feature isn’t enabled by default.

As indicated above, all previously issued access tokens can be cleared by changing your Facebook password. Readers who aren’t sure if they’re affected might want to err on the side of security and update their password now.

http://www.songs.pk Hacked: Biggest Pakistani Songs website FTP broken.

The hacker who hacked this is from Pujab, India. He used some custom exploit to break into the FTP. Songs.pk’s three-month global Alexa traffic rank is 799. About 81% of visitors to the site come from India, where it has attained a traffic rank of 60. Now just imagine how much huge traffic this website is getting.

After Death, Osama Bin Laden Hacked Windows & MAC Users

Warning from Sophos to both Windows and Mac users

Mac users targeted by poisoned SEO in Google, DIY hacking kit

Web underworld launches DIY hacking kit for Mac

IT security company Sophos has issued a warning to both Windows and Mac users saying that a massive SEO poisoning attack has hit Google, which could in turn infect their computers.

The SEO poisoning has been found for numerous key words ranging form global warming to Osama bin Laden’s death.

The results for the SEO poisoned searches lead users to a fake anti-virus program, which prompts users with a JavaScript-based fake scanner that shows an infected Windows XP computer. This is seen even in the case of Mac computers.

On clicking or closing the fake scanner page, users are asked to download a .zip file with a filename such as “BestMacAntivirus2011.mpkg.zip”, which infects the computer.

The malware then shows numerous fake warning messages and ask users to pay for non-existent threats to be removed, said the company.

Meanwhile, secret cyber criminal forums have announced the the first do-it-yorself (DIY) malware targeted at the Mac OSX operating system.

Usually DIY malware kits have been designed to attack the Windows platform, but with the new kit, Weyland-Yutani bot, users with little knowledge can create their own malware and use it to control another computer, thereby creating a botnet in the process.

Danish IT security firm CSIS Security Group wrote in its blog that it discovered the availability of the DIY malware kit for Macs. The company has also warned that DIY kits for iPads are underway.

CSIS Security Group security specialist Peter Kruse said, “The kit is being sold under the name Weyland-Yutani bot, and it is the first of its kind to hit the Mac OS platform.”

“Apparently, a dedicated iPad and Linux release is under preparation as well.”

INDIATIMES.COM is vulnerable to cross site scripting attack (XSS Attack)

Types of Cyber Crimes

Posted: March 21, 2011 in Uncategorized

1.0 CYBER CRIME
1.1 Cyber Crime is an evil having its origin in the growing dependence on computers in modern life.
A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. Defining cyber crimes, as “acts that are punishable by the information Technology Act” would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as e-mail spoofing, cyber defamation etc.

1.2 TYPES OF CYBER CRIME
Cyber Crime refers to all activities done with criminal intent in cyberspace. These fall into three slots.
• Those against persons.
• Against Business and Non-business organizations.
• Crime targeting the government.
Let us examine the acts wherein the computer is a tool for an unlawful act. This kind of activity usually involves a modification of a conventional crime by using computer. Some examples are;

1.2.1 Financial Claims: This would include cheating, credit card frauds, money laundering etc.
Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.)
Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications.
Online gambling: There are millions of websites, all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.
Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc.
E-Mail spoofing: A spoofed email is one that appears to originate from one source but actually has been sent from another source. This can also be termed as E-Mail forging.
Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc., can be forged using sophisticated computers, printers and scanners.
Cyber Defamation: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that person’s friends.
Cyber Stalking: Cyber stalking involves following a person’s movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim.
Let us examine some of the acts wherein the computer or computer Network is the target for an unlawful act. It may be noted that in these activities the computer may also be a tool. This kind of activity is usually out of the purview of conventional criminal law. Some examples are:

1.2.2 Unauthorized access to computer system or network: This activity is commonly referred to as hacking. The Indian Law has however given a different connotation to the term hacking.
Theft of information contained in electronic from: This includes information stored in computer hard disks, removable storage media etc.
E-Mail bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in the victims’ e-mail account or mail servers.
Data diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

View More

Norton 360 v5 is a complete Security software designed for your computer offering some extra security features like PC Tune-up, 2GB of Automated backup, etc. and interestingly 90 days / 3 months promotional License to everyone.

The interface of Norton 360 is based around the four features of the software: protection against viruses and other threats, protecting transactions (anti-phishing), backing up data online on a secure space of 2 GB and performance, computer optimization (defrag, clean the cache, etc).

Once installed, Norton 360 is supposed to perform all tasks of analysis, optimization and upgrade, when your computer does not work. Some tasks can be scheduled or run manually, but the software is openly designed which do not require configuration.

Another impressive feature is Norton Safe Web Social Media Scanner which lets you check your Facebook Wall and News Feed for bad links and other threats from your Norton Control Center.

In every version, the software has been enriched by new features of Norton Internet Security . Thus, the latest version 5.0 has improvements made to its reputation technology files, which now includes downloads by mail or instant messaging, or warnings about the software that mobilizes the resources of Windows. The party also sees consolidated backup and boasts performance improvements.

Personally, I am using Norton Internet Security 2011 so i have not tried this installer myself. But I am sure it will work, as it is the official promotion in association with Microsoft.

Download Norton 360 (90 days)