PayPal Merchant Services

Sign up for PayPal and start accepting credit card payments instantly.

Tuesday, July 27, 2010

Tribute to Kitaro

Yanni - The Storm

Yanni - Nostalgia - Royal Albert Hall, London

Tina Arena - Heaven Help My Heart

musicVid - chains

Baldwin IV.

Purpose of Expert Witness..

Expert Witness

The function of an expert witness is to assist the Court in coming to a conclusion. It is not the function of an expert witness to be biased one way or another.
He should be an expert in his field and prepared to give his opinion dispassionately - no matter who is paying his fee.
The expert witness should be able to act either for the Plaintiff or the Defendant being there merely to put forward the facts to allow the Court to come to its own conclusion based on those facts.

What is Computer Forensic?

computer forensic

Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.

Computer Forensic

computer forensic

Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.

Forensic Investigations....

Importance of Digital Forensics in Public Sector

The digital age has brought many advantages to individuals and businesses alike since it started. However, it has also brought a whole host of problems with it as well. More people can tap into technology for fraudulent or criminal means, which has, of course, made business far more vulnerable than it ever has been before. This is why the idea of using digital forensics in the public sector has become more and more prevalent over the past few years.
Specialists in digital forensics can determine whether any incident of misuse or criminal activity has taken place on a computer which enables the company and the police if necessary to take the appropriate action. Outsourcing such work is actually more cost effective than running internal departments.
It is not just employers that may benefit from digital forensics in the public sector today though. It may also help employees to prove their innocence in terms of an allegation that has been made and has essentially been reason for the termination of employment.

Tiffany Page - On Your Head

Wednesday, July 21, 2010

Friday, July 16, 2010

Phishing Attack

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

Wednesday, July 14, 2010

Cryptography is the secret writing art or science of transmission and storage the data through
the insecure network. Cryptography has a long history, in twentieth century cryptography
were most significant tools to protect the military, the diplomatic service and government and
protect national secrets and strategies. “The most striking development in the history of
cryptography came in 1976 when Diffie and Hellman published New Directions in
Cryptography. In 1978 Rivest, Shamir, and Adleman discovered the first practical public-key
encryption and signature scheme, now referred to as RSA” (Alfred J., 1996) The RSA
method is based on hard mathematical problem, the intractability of factoring large integers.
RSA application of a hard mathematical difficulty to cryptography revitalized hard work to
find more competent methods to factor. “The 1980s saw major advances in this area but
none which rendered the RSA system insecure. Another class of powerful and practical
public-key schemes was found by ElGamal in 1985” (Alfred J., 1996) these are also based on
the discrete logarithm problem. Some algorithm works good in some area and other protocol
and algorithm another, are used to communicate securely over an insecure network. The most
important security goal is secrecy or confidentiality of data. Cryptography is method of
Encryption and Decryption. Cryptology stands for combination of Cryptography with
Cryptanalysis.
RSA is a public key cryptography; where key is the challenging issue which to be
considering selecting a protocol for securing a computer system. Public-key cryptography is
use of asymmetric key algorithms instead of or in addition to symmetric key algorithms. An
asymmetric key algorithm does not require a secure initial exchange to both sender and
receiver. The asymmetric key algorithms are used to produce a mathematically related key
pair and published secret private key as a public key. This is a protection of the authenticity
of a message and creating of a digital signature for message with the public key. This can be
verified using the private key and also allows protection of the privacy and integrity of a
message, the message can only be decrypted using the private key.
In difference, the symmetric-key algorithms which have been used for some thousands of
years using a single secret key shared for both sender and receiver and kept private for both
encryption and decryption. In symmetric encryption scheme, the sender and receiver must
securely share a key in progress. As because symmetric key algorithms are practically always
much less computationally intensive and common to exchange a key using a key-exchange
algorithm, transmit the data using that key and a symmetric key algorithm.
Encryption:

Computer network have lots of vulnerabilities and threads, a hacker can log into computer
remotely and destroy the information and malicious program can wipe out data on hundreds
of computer causing huge loses. That’s why Computer system needs to be encrypted by
encrypted protocol to protect from unauthorised access. The selection of encryption key and
protocol has criteria’s by which a computer system can be protected properly. These are the
key criteria describe bellow.

Encryption key criteria:
1) Confidentiality: confidentiality or privacy keeping data, information and massage secret
from all but those who are authorized to have it. Confidentiality is a term identical with
secrecy and privacy. There are many approaches that are providing confidentiality, physical
protection to mathematical algorithms which data making no sense.
2) Data integrity: Data integrity ensures the information has not been altered, damaged or by
unauthorized or unidentified and unknown access. This is a service which addresses the
illegal modification of data. To assure data integrity is done by detecting data manipulation
by unauthorized accesses. There are types of data manipulation such as insertion, deletion,
and substitution.
3) Authenticity: “Entity authentication or identification corroboration of the identity of an
entity (e.g., a person, a computer terminal, a credit card, etc.)” (Alfred J., 1996)
Authentication is a service related to recognition or identification. That is means; it applies in
both area of authentication. When entering into a communication should identify each other
and Information passes over a channel should be authenticated as to origin, date of origin,
data content, time sent etc. Cryptography is usually divided into two categories; entity
authentication and data origin authentication. Data origin authentication unconditionally
provides data integrity.
4) Non-repudiation: Non-repudiation prevents the rejection of earlier commitments or
procedures. When disagreement occurs due to an entity denying actions were taken to resolve
the state is necessary. “For example, one entity may authorize the purchase of property by
another entity and later deny such authorization was granted. A procedure involving a
trusted third party is needed to resolve the dispute” (Alfred J., 1996)
Key criteria of cryptography are to sufficiently address these four areas in both theory and
practice for prevention of malicious activities and detection of cheating.
Nanotechnology will be the opportunity to the future for human beings on Earth. The technologies and science developed with nanotechnology lead to monumental step forward such as extensive quality of life, entrance to quality food and water for all, the end of most diseases, or access to abundant energy sources. Everyone will have the access to a large quantity of information via very powerful computers that can done by artificial intelligence. In factories robots and computer will produce goods and products. Using nanotechnology settle other global settings like space stations, the moon or beyond and many things...
Nanotechnology

Nanotechnology is the knowing and control of matter at dimensions of approximately 1 to 100 nanometres, where unique facts enable new applications. “The prefix of nanotechnology derives from ‘nanos’ – the Greek word for dwarf. A nanometer is a billionth of a meter, or to put it comparatively, about 1/80,000 of the diameter of a human hair (Salib, 2008).” The nanoscale science, engineering and technology, nanotechnology involves with imaging, measuring, modeling, and manipulating matter at this nanometers length scale. Nanotechnology also engages the structure of circuits and devices from single atoms and molecules. The nanotechnology has the ability to measure which is branch of engineering. Nanotechnology is an umbrella term used to describe a diversity of techniques to fabricate materials and devices. Nanotechnology deals with microchip implants, biomedical solutions, diagnostics, drug delivery, bionics, transhumanism, artificial intelligence, robots, cyborgs (Salib, 2008).

TATLI ISKENCE - Baba sevgisi böyle birsey olmali

Wednesday, July 7, 2010

Avenged Sevenfold - MIA (300 Music Video)

Lily Allen - He Wasn't There

Evanescence My Immortal Live @ David Letterman Show

SAHARA Tyalee ORIGINAL Dance R&B version - made by COSTI.RO

EUROVISION ROMANIA 2009 - ELENA GHEORGHE - The balkan girls (Official Vi...

Inna-hot [official video]

Paul E Paul - Girl In The Club

Inception

Inception

Lily Allen - Not Fair (HD)

Lily Allen - The Fear

Shakira - Waka Waka (This Time for Africa) (The Official 2010 FIFA ...

Shakira - She Wolf

Romantic Hindi song

Tu Hi Haqeeqat -Tum Mile Song 2009 [HD]

Open Your Own PayPal Account

Sign up for PayPal and start accepting credit card payments instantly.