As the investigation into the leak of college entrance exam results rolls on, prosecutors said yesterday that the computer server at the Korea Institute for Curriculum and Evaluation, which administers the exam, had been hacked over 200 times. Not only the test results but also the institute’s internal information was stolen.
According to prosecution and police sources, a manager at a public relations firm called Inuni Co. whose surname is Kim accessed the institute’s server over 200 times between August 2007 and December 2008.
A detention warrant was filed against Kim on charges of breaking information and network laws but it was rejected by the court.
Kim easily broke into the server. In August 2007, he accessed an employee’s e-mail account at the institute. Kim obtained the e-mail ID from a press release, and the password was the same as the ID.
Kim tried to log in to e-mail accounts of other institute employees over 50 times. One of his successes was with the account of someone in the institute’s administrative office. The employee used a password identical to the romanized spelling of his name.
One of the employee’s e-mails contained an attached file containing the passwords of five other employees at the institute. The employee temporarily managed the other employees’ e-mail access information because he dealt with changes in the institute’s server. Their passwords were identical to the last seven digits of their residential identification numbers.
In this way, Kim downloaded 16 types of internal information from the institute. Among the materials downloaded were plans to grade answer sheets from the 2009 College Scholastic Ability Test, scoring schedules and the number of students who missed the test.
“Kim could look at the Korea Institute for Curriculum and Evaluation’s internal information by accessing the e-mail of seven employees,” a prosecutor said.
Kim passed the information on to VisangEdu, a private education company. VisangEdu made the CSAT score analysis public on Dec. 9, a day before the CSAT results were announced.
Kim accessed the institute’s server four times on Dec. 10 after the institute requested a probe into this case.
As the investigation closed in on him, Kim destroyed a memo containing the IDs and passwords of the seven employees. Prosecutors plan to decide what kinds of charges they will file against Kim and a VisangEdu director whose surname is Jin this week.
source:click here
Hacker opens gaping holes in CSAT score security
3 Ways a Twitter Hack
"It appears someone gained access to the tools Twitter uses to control its millions of accounts," explained Graham Cluley, a senior technology consultant at security firm Sophos PLC. "Internal tools used by the tech support team were compromised. It's not clear if it was an inside job, or outside hacker. Twitter does say they think it was an individual."
The hack, according to Cluley, is much more serious than the earlier phishing attack because it was compromise of the system that potentially exposed all Twitter users to the following dangers.
Fraudalent password use If you gain access to someone's Twitter account, you might be able to gain access to their password, said Cluley.
"We know that 41 percent of people admit to using the same password on every web site and account that they access," he said.
Hackers, while gaining access to something seemingly simply like a username and password to one account may very well be able to use the information to gain access to more important information, such as your bank account.
Malware Infection Twitter officials said 33 accounts had been attacked in the latest hack, including high-profile users such as Britney Spears and Barack Obama. The hackers used their temporary access to send offensive messages. CNN journalist Rick Sanchez found his account had been hacked with a message that read "i am high on crack right now might not be coming to work today."
The damage could have been much worse, said Cluley, if the hacker had decided to take a different approach.
"Imagine if instead, in the case of Britney Spears account for example, that the hacker had posted a link that said: 'Here's my new video. Click on this link.' Imagine how many people would have clicked on that and it could have pointed to malware? And Barack Obama is one of the most followed people on Twitter. If he said: 'I've just made a new speech. Check it out.' a lot of people would click on that link and get infected."
source:network world
How To Identify Fonts Being Used In Images
Have you ever encountered problems in identifying what fonts is being used in an image? Of course fonts being used in popular movie banners can be found easily because you have the keyword but what if you found a free template and the font is not included? You either recreate the buttons with your own fonts replacing the original, or try posting in forums and hope that someone would have seen that font before and let you know what is the font name. There are so many fonts, maybe hundred of thousands fonts available on the internet and to identify an unknown font is definitely NOT an easy task!
Identifont, a free service offered to help you identify fonts by answering a series of simple questions about its appearance.
Finally, if WhatTheFont system is unable to give you a good match of the font you’re looking for, you can then submit your image to WhatTheFont Forum to have your image viewed by font geeks the world over.
Creates Auto-Starting Installer CDs for Any Applications
Windows only: Free app Install-It puts a small auto-starting application on any removable drive that makes installing applications a double-click affair.
After downloading the Install-It package, you'll want to extract its files to somewhere you can reach, like your desktop, and open up the Install.ini
file in your favorite text editor. This file is simply a list of program descriptions and the locations of their installer files. If you're creating a disc full of useful installers, just replace the default examples with your chosen verbiage for each app and the location/names of the setup files. You separate those two items with a comma, using slashes where necessary, and end each line with a semi-colon.
Here's an example Install.ini
I made for a supposed Windows XP re-installation:
Copy all your installer files and Install-It's files into a CD-burning app, such as CDBurnerXP, and fire away.
Now you've got a CD that, on most computers, will pop up with a list of programs that can be installed without anyone having to guess which icon or cryptic filename means. If a computer isn't set to auto-start when it detects an autorun.inf
file, though, you'll have to point the computer to install.exe
—not a problem, though, if you've put each application in its own directory.
Install-It is a free download for Windows systems only.
Install-It [via The Red Ferret Journal
Lock ID Yahoo Messenger: How to Unlock your Locked ID?
Lock ID means that your ID of Yahoo Messenger cannot be used anymore caused by someone who lock your ID. When you ID got locked, you will never be able to join or login to yahoo messenger. It mean, when you try to type your ID and type your password in chat client such as official chat client of yahoo messenger the error message will arise. Usually the error told that your password or username is incorrect.
You are being in chat room. Than suddenly, your got disconnected. When you try to login with your password and ID, the error that I told above appear. It may be you got locked. Lock ID work to lock you ID or username because you have a weak password, so whit a little iterations your password got locked. However, you will never got locked if you never online or login to yahoo messenger. Lock ID usually working if you are online.
How to unlock your ID if you got locked? You can find or search the software or tool to unlock your password again. However, if the ID or username not online, it usually the software not working that mean the unlocking doesn’t work.
For that reason, I will not share or give a link of download unlock ID software because, I am not guarantee the software work well. The best attempt to unlock your ID is, try to login not by yahoo messenger, but by mail of yahoo which has a same user name and password that been locked. Sometime, this step worked, but make sure after your login to yahoo mail and success, you have to change your password with new password, and then you can login to yahoo messenger with new password that you just been created. If you try to send a complain to the contact of yahoo messenger, It will useless. Yahoo doesn’t care what happen to your if you go locked.
To protect your ID or to prevent Lock ID, you must have a strong password. I will suggest you to not chat with your primary email in yahoo messenger. Sometime yahoo makes a prohibition to some of ID. This mean your ID can be banned by yahoo and your ID never be join to yahoo messenger or yahoo email again.
To create a strong password you must use all character who listed in your keyboard. Such as uppercase, number, and symbol. You must be create password which have not less 8 character or more. Here I give you an example a strong password: H4rP3 ^&* (with 3 space on it). To make a better password work well, you have to change your password frequently: 3 week or 3 month, depending how strong and important your password is.
Make Internet Calls from Computer PC to Phone Free Services Include
Below is the list (Website and Tools) how you can make a call to phone including mobile phone or home phone that you can do from you computer just only using Internet. That means you don’t use a cellphone or handphone or any phone, you just use Internet Connection and you desktop or Laptop or NoteBook or NetBook computer
- Magic Jack - Most Call are Free .
- Skype - PC to PC aka skype to Skype Free Call, Need Charge for pc to Phone but cheaper that Phone to Phone
- Yahoo! Voice - PC to PC Free using Yahoo Messenger Voice Talk, Need Charge for PC to Mobile Phone and else but in low cost
- PalTalk - PC to PC and als PC to Phone
- BuddyTalk
- JaJah
- DukaDial - North America Free Call
- Voipcheap - Free Internet Calls (Limited)
- sharpVoice
- iConnectHere = PC to Pnone Calls
- PC2Call - Prepaid Calls
- YouTring - Free PC to PC, Cheap PC to Phone, International Calls available.
- EvaPhone - Free VoiP Service PC to Cell Phone Home Phone all over the World
- Net2Phone
How to get back your lost usb -USB Lost and Found
USB Lost and Found is a tool to setup your USB drive to keep unauthorized users from keeping your USB drive if it were to be lost. USB Lost and Found has two methods of telling unauthorized users to return it. The first method is the Message method which when the user tries to use your USB drive it comes up with a message box that tells them to return it, along with your contact information, and denies access to the USB drive. The second method, which only comes with the Pro version, is called Lock Down. Lock Down immediately locks the user's computer when the USB drive is accessed, covering the whole screen and denying access.
· You can download the Free version here. (1.2MB file)
· You can buy the Pro version below
· Redesigned installer
· Redesigned unlocking system
· Fixed Pro version password on Message selection bug
· 1.0:
· Publicly Released
· Pro version has the Message method and the Lock Down method.
· Tricks users to not open it with AutoPlay and run Lock Down/Message.
· Double clicking the USB drive in My Computer causes Lock Down/Message to run.
· Fine with many Anti-viruses.