This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Google wave new communication revolution

Google just opened up to a limited audience its very interesting communications experiment called Wave (news stories). Our hands-on evaluation: there's a lot to like. It really is a more contemporary take on communications. But it will knock many e-mail users off-balance.

Even Wave's own Software Engineering Manager Lars Rasmussen told me, "It takes a little getting to," and, "We're still learning how to use it." Imagine how everyone else will feel.

If you want to try Wave, you'll have to wait. Google is making access to the service available to some developers and press, but full availability will not be until "later this year," Google says. The version we tested was very raw, still in development. Many features were not implemented and the system threw us a few errors. But the framework and philosophy is clear to see, and that's what this evaluation is based on.

Getting started in Wave: It looks a lot like e-mail...
(Credit: Screenshot by Rafe Needleman/CNET)


What's Wave?

Wave is real-time e-mail. What that means is that when you're writing a reply to a message (or "wave") that you receive in the system, the recipient can see what you are typing as you type it. It will come as a relief to most that the real-time feature can be disabled if you click on the "draft" button (not working in my trial) while writing. But real-time visibility is the default.

You can put your replies anywhere in the message. You can also do this in regular e-mail, but in Wave, your comments are easy to pick out since the app bounds reply text in colored boxes with authors' pictures embedded in them. Those of us who prefer to reply to e-mail messages at the end (or the beginning) and not piecemeal can just reply as usual. But when you want to write a surgical point-by-point reply to a message, Wave makes it easy.

You can drop pictures straight into Wave messages (a neat trick in a browser-based app, made possible by Google Gears), and smart assistants will let you convert addresses to maps, automatically fix spelling errors, and expand contact names.

But Wave is not e-mail. In this image, I am watching co-developers Lars and Jens Rasmussen type replies to my query. The teal tag shows that Jen is typing right now; Lars, who just finished typing above Jens, had his own, separate color.
(Credit: Screenshot by Rafe Needleman/CNET)
But it's the reply-anywhere feature combined with the real-time function that's most interesting. It makes Wave the first useful blend of e-mail and instant messaging that I've seen. Unlike Google's previous attempt to meld the two communications modes into one app (Gmail has Google Talk in its sidebar), this one really works. An asynchronous e-mail conversation between two people can can stay that way, or it become real-time when both parties are online, and the dialog stays in place in the e-mail for later viewing. Switching between the e-mail and IM mode is seamless. In fact, the concept of the two different modes vanishes in Wave.

Wave's message handling really shines when a conversation is between more than two people. Using Wave and its specific, color-coded replies, a group of people can have an actual discussion in e-mail, in real-time if wanted, without getting bogged down in long multi-message discussions--or worse, in threads that end up forking so that different people are discussing different things.

The Wave in-box pane shows you when there are new messages in your threads by bolding the subject lines, and when somebody is actively typing in a wave, you can see the text come in live, in the two-line preview every message gets. That's really cool, although it can be overwhelming.

Speaking of being overwhelmed, the first time I had two people replying to me in an individual message at the same time, in different places in it, my head almost exploded. It's a lot of raw information coming it at once, and it's very different from the old e-mail or the instant message experience.





A new communications architecture

A lot of what Wave does is made possible by the fact that Wave messages don't live primarily in the desktop Wave client (which is actually a rich browser-based app), as the traditional design of e-mail dictates, but rather on the Wave server. Messages aren't just dropped off at your Wave client; persistent links to messages on the servers come with them. When you edit a wave with the Wave application on your computer, it's immediately reflected back to the Wave server, and from then out to other users who are viewing that Wave in their apps, immediately.

Wave servers synchronize with each other as needed. In fairness, this is not radically different from how Lotus Notes and Microsoft Exchange work, but Wave has no legacy support for old e-mail architectures whatsoever, and isn't bogged down by the old methods--like the practice of delivering messages to users and then severing the links to those messages.

Other benefits you get from this include the capability to add new recipients to a wave at any time, and for Wave to know, when that happens, what each user has read and what they haven't. Users' views into Wave will highlight what's new to them when they open a message.

And, taking a page from Twitter Search, Wave's search function will be real-time (it wasn't when I tried it). If you are searching for a word or phrase in your inbox of waves, and someone updates a message thread with your search target, that message will pop up in your results the moment they type in the change. (You can save searches in the navigation bar, a nice feature.)



All together? Not yet

At the moment, the only people Wave users can communicate with are other Wave users. Wave addresses look like e-mail addresses, but there's no gateway between Internet e-mail and Wave, so messages send from standard e-mail clients to Wave will bounce. This is a serious limitation, and one Google hopes developers will rectify by writing gateways between Wave and standard e-mail servers, not to mention IM services and other social and workflow systems like Facebook, Bugzilla, and so on. A Twitter interface is already being shown.

However, as Rasmussen told me, Wave is currently spam-free since it's not linked into the global e-mail system. He doesn't want to open up Wave to standard e-mail until he can ensure that this system won't be overrun, too.

In fact, the reason Wave is being released in the way it is right now--as an early developer-only experience--is to encourage programmers to write extensions to it. The e-mail gateway is particularly critical, and Google may develop it itself. Without it, Wave is yet another new communications medium that will have a hard time getting off the ground since it duplicates many capabilities people are already accustomed to. Wave is technically a radical departure from e-mail, but for the end users it will still be used for a lot of the same things e-mail is.

Google's Wave team hasn't yet done much integration with other Google developers' projects, although Wave was introduced to the company through a detailed video demo. As Rasmussen told me, "To say we're 'working with' other Google groups would be a stretch." Obvious integrations we're waiting for include Gmail, Google Docs, and Google Voice.







Check out the developer preview at Google I/O

Google Wave is a new tool for communication and collaboration on the web, coming later this year. Watch the demo video below, sign up for updates and learn more about how to develop with Google Wave.

Google Wave will be available later this year.

Learn

Google Wave can make you more productive even when you're having fun.

Take a sneak peek.

Develop

Learn how to put waves in your site and build wave extensions with the Google Wave APIs.

Visit code.google.com/apis/wave.

Build

Google Wave uses an open protocol, so anyone can build their own wave system.

Learn more at www.waveprotocol.org.

source:cnet.com

Don't Search For Free Goodies Online!

Searching for free music, games and screensavers can be hazardous to your computer



Internet security firm McAfee Inc. searched for more than 2,600 popular keywords on the most accepted search engines including Google and Yahoo! Buzz and found that certain keywords or search terms were riskier than others. McAfee said some search categories are used to lure unsuspecting consumers to their websites. Hackers and cybercriminals are often able to persuade searchers to download files carrying malicious software that can cause consumers to disclose their personal and financial data.
According to McAfee Inc., some of the riskiest searches on the Internet today are associated with either with finding items for free, such as music or screensavers, or looking for work that can be done from home.



Hackers are most successful when they can attract a large number of victims. One way to target big crowds online is to track current events-everything from celebrity meltdowns and natural disasters to holidays and popular music. One key tool cybercriminals use to snare victims is to get them to download a computer file or program that comes with a malicious payload.



Searching for free music downloads online is risky too. On an average, 20.7 percent of results were risky (compared to just 1.7 percent of all search terms) and on one results page out of the 25 search engine pages rated, McAfee found a whopping 42.9 percent of results risky. As consumers continue to convert their music libraries to digital formats like MP3 files, they also struggle with the cost of buying music they may already own in cassette, LP record, or other formats. 


Caught between those two needs, many consumers have heard that the web can be a source for free music. If the consumer is already looking for music, then they already have the mindset of being willing to download something-and that makes the malware authors' work easier.



Work from home searches can be as much as four times more risky than the average for all popular terms. And on an average, these searches are 50 percent more risky than other popular terms.



The Indian result of the study shows that searching for Katrina Kaif and Shahid Kapur can be dangerous to your computer! Searching for the famous actress can put you to a 26.6 percent risk of affecting your computer while Shahid Kapur makes you vulnerable to a 22.2 percent risk.







Other most dangerous search terms in India include Waptrick, Orkut, Yahoomail, Rediffmail, How to earn money, Namitha (Namitha Kapoor -- the Tamil/Telegu actress), Shimla and Bejing 2008 Olympic Games.



Surprisingly, searching for the term 'Viagra' is not as risky as searching for 'Screensavers' or 'Free Games'. According to the report, searching for Viagra is safer than searching for the term 'iPhone' and 'Barack Obama'!



The complete McAfee report can be accessed here.




Pentagon plans new cyberspace war command: report

WASHINGTON (Reuters) - The Pentagon plans to create a new military command for cyberspace, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare, the New York Times said on Friday.

The military command will complement a civilian effort President Barack Obama plans to announce on Friday that will overhaul the way the United States safeguards its computer networks, the newspaper said on its website.

Citing Obama administration sources, the Times said the president will detail on Friday the creation of a White House office that will coordinate a multi-billion-dollar effort to restrict access to government computers, protect systems that run U.S. stock exchanges, clear global banking transactions and manage the air traffic control system.

The Times said the civilian office would be responsible for coordinating private sector and government defenses against thousands of cyber-attacks mounted every day against the United States, largely by hackers but sometimes by foreign governments.

Administration sources said the president would not discuss the Pentagon plan on Friday. But Obama is expected to sign a classified order in the coming weeks that will create the military cyber-command.

The need for improved U.S. cyber-security was driven home in April when the Wall Street Journal reported that cyber-spies had penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system.

The Times said the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use as a deterrent or alongside conventional weapons in a wide variety of possible future conflicts.

Reuters has reported that companies in the cyber-security market range from security-software makers Symantec Corp and McAfee Inc, to traditional defense contractors such as Northrop Grumman Corp and Lockheed Martin Corp, to information technology companies such as CACI International.

The Pentagon had been working on a cyberspace strategy for several months. It was completed weeks ago, but was delayed because of ongoing arguments over the authority of the White House office and budgets for the entire effort, the report said.

iPhone and iPod Touch are vulnerable to hackers and new viruses

Are you using iPhone or iPod? Then its about time you udate the software used by these hardware platforms, iTunes and QuickTime.

Security breaches have been found in the software associated and distributed worldwide with the iPod and iPhone from Apple. There are several security leaks of which some are pretty extensive. The most known security holes have been blocked in new patches of these two software applications. There are ten different security holes that can be tightened up through automatic update on both the Windows and Mac OS operating systems.

The errors utilized in QuickTime lies in the media player that is associated with the media software iTunes. Most of the iPod and iPhone users utilize iTunes to update their media player with new music, videos and podcasts. The software iTunes is needed to use the iPhone at all, and to restore, update or handle media files.

The security errors can in worst case make it possible for malicious hackers to install software on your computer that should not be there.

They disguise this destructive and malicious software as movie cuts that will make the users to open them and give access to the hackers. The malicious code will make QuickTime to crash and if possible to install other malicious software to work in batch on your computer without you knowing it at all.

It is really bad news that malicious code is hidden in media files and let users believe that its only a movie they open up and not a malicious code hidden in it. The internet transfers more and more media files, so it is of great concern this trend.

A security hole in iTunes will also be fixed now together with an upgrade patch that will make the software ready for the next version of iPhone operating system 3.0 which is expected within short time.

So my advise to you is to update your applications iTunes and QuickTime now, and make sure you are updating it on a regular basis to implement the latest versions with fixes that at least takes the most common and known security holes in these applications.

Network monitoring Tools

Featured Tool: Ping Plotter Ping Plotter is a marvelous tool that pings and graphs an endpoint and all hops in between. It can be useful in troubleshooting packet loss and latency. What is unique about Ping Plotter is it can identify current problems but can also be watchful of new issues that occur. The current version has multiple alert instances and is capable of sending e-mail, logging to a text file, or playing a wav file for specified parameters.

Another is feature is the graphical representation of packet loss and/or latency. You can see the results over any specified time period. Besides the visual graph inside of Ping Plotter, you can export either raw data or have a screen shots saved at automatic time intervals. All ping intervals are completely customizable and any hop can be graphed along with the endpoint.

The Ping Plotter website includes a tutorials and documentation on interpreting the results. There is also a support forum for the product. Ping Plotter is a very affordable at $15 and is available as a 30 day trial. Several websites that rate shareware have given Ping Plotter high marks. It also received an honorable mention in MCP Magazine. Users at Broadband Reports frequently use Ping Plotter to located poor DSL or Cable connections. Gamers are also concerned packet loss and latency and will find this tool invaluable. The beta version of Ping Plotter will be adding more features and better performance.

In our testing, we used Ping Plotter to ping watch the connection to a low traffic website on the end if a dedicated T1. The time interval was set to 1 minute as not to flood the hops or endpoint with packets. The display interval was set for one hour and an image was automatically saved each hour showing the results graphically. The captured results were surprising to say the least. While the cable connection is very good, it isn't perfect. Future plans will include using Ping Plotter with an FTP program to automatically upload the hourly results for everyone to view.





Best Pen Test Linux Distributions

Linux distributions are often customized to perform many specialized tasks cater to a particular industry, hobby or business. Security Penetration testing is one such niche where professional (and hobbyists) use customized Linux distributions with the whole purpose of doing security tests on networks and personal computer (hopefully with permission). Most of these distribution are live CDs which can be used without having to install them to your computer. Today we will take a look at some of best Pen-test distributions out there.



1) BackTrack: Backtrack is the most widely known pen-test distribution out there. The latest release (4 Beta) has been ported to Debian/Ubuntu from Slackware and now can be installed locally as a full distribution and tools can be updated using Backtrack repositories. Backtrack includes more than 300+ security tools.







2) Knoppix STD: As the name suggests this distribution is based on Knoppix and STD stands for Security Tools Distribution. This distribution didn’t get any update (like most pen-test distros) in a long time and might not work on some new hardwares but they have a fairly good collection of tools. xfce fluxbox is used for desktop environment.





3) nUbuntu: Based on Ubuntu and fluxbox, nUbuntu is a fairly new and active pen-test distribution. They have partnered with an Italian IT security company for future nUbuntu certification and training.





4) Network Security Toolkit: NST is a Fedora based Live distribution and unlike some other pen-test distro NST can be used under virtual machine without any network configuration problems (from my experience). NST also have a unique Web User Interface to access tools and manage configurations.





5) PEENTO: A Gentoo based pen-test live cd (you could have guessed) that actually looks very nice. They are using Enlightenment for DE and has quite a few unique pen-test tools including GPU based cracking software pyrit.

Top 10 Black Hat Hackers

black-hat is a term in computing for someone who compromises the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network. The term white hat is used for a person who is ethically opposed to the abuse of computer systems. The term cracker was coined by Richard Stallman to provide an alternative to using the existing word hacker for this meaning. The somewhat similar activity of defeating copy prevention devices in software which may or may not be legal in a country’s laws is actually software cracking.

(Source)(In No Particular Order) 1)

jonathan jamesJonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.”

James’ major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, “The code itself was crappy . . .certainly not worth $1.7 million like they claimed.”

Given the extent of his intrusions, if James, also known as “c0mrade,” had been an adult he likely would have served at least ten years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he’s learned his lesson and might start a computer security company.

2)

adrian-lamoAdrian Lamo: Lamo’s claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.”

Lamo’s intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it’s legal. What Lamo did is not.

When he broke into The New York Times’ intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times’ LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

3)

kevin mitnickKevin Mitnick: A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown.

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and stealing software.

Mitnick’s mischief got serious when he went on a two and a half year “coast-to-coast hacking spree.” The CNN article, “Legendary computer hacker released from prison,” explains that “he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system.” He then hacked into computer expert and fellow hacker Tsutomu Shimomura’s home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

4)

kevin puolsonKevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”

Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, KIIS-FM, was accomplished by taking over all of the station’s phone lines. In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.

Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.

5)

morrisRobert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.

Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

6)

levin2Mass media claimed at the time he was a mathematician and had a degree in biochemistry from Saint Petersburg State Institute of Technology.

According to the coverage, in 1994 Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.

In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.[1] According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.

ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).

7)

loydIn human terms, it’s a case of a trusted, 11-year employee gone bad. Lloyd built the Novell NetWare computer network at Omega South and then blew it up with a software time bomb after he fell from corporate grace and was ultimately fired for performance and behavioral problems. Today, he faces a sentence of up to five years in prison.

In a business sense, the loss of its key manufacturing programs cost Omega, which builds measurement and instrumentation devices for customers like NASA and the U.S. Navy, more than $10 million, dislodged its footing in the industry and eventually led to 80 layoffs.

The 1996 incident set off an intense investigation that brought together the U.S. Secret Service and one of the world’s top data recovery and forensics experts to piece together the evidence that would ultimately lead to Lloyd’s arrest and conviction

8)

MELIS1David Smith, the author of the Melissa virus, was facing nearly 40 years in jail when he decided to cooperate with the FBI.

Facing jail time, public wrath and a fortune in potential fines, the 30-year-old sender of the fast-spreading Melissa computer virus did what hundreds of criminals have done before. He agreed to go undercover.

Federal court documents unsealed at the request of the Associated Press show that for almost two years, Smith - then out on bail - worked mostly full time cruising the dark recesses of the Internet while the FBI paid his tab.

What did the FBI get? A windfall of information about malicious code senders, leading directly to two major international arrests and pre-empting other attacks, according to federal prosecutors.

What did Smith get? Just 20 months in federal prison, which was about two years less than the minimum sentencing requirement, and about 38 years less than he faced when initially charged.

Sometimes it takes a thief to catch a thief, said former federal prosecutor Elliot Turrini, who handled Smith’s case and agreed to the reduced sentence.

About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage, but Smith is the only person to go to federal prison in the United States for sending one.

9)

mafiaThe computer hacker known as “Mafiaboy,” who crippled several major Internet sites including CNN, arrives in court Thursday, Jan. 18, 2001 in Montreal, Canada. He pleaded guilty on Thursday to 55 charges of mischief. The trial of the 16-year-old Montrealer, who can not be identified under Canadian law, was set to begin Thursday on 66 charges relating to attacks last year on several major Web sites, as well as security breaches of other sites at institutions such as Yale and Harvard.

10)

Abene9_2005Mark Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.

Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled Cyberspace

Sources:

http://en.wikipedia.org/wiki/Main_Page

http://eyeball-series.org/hacker/hacker-eyeball.htm

http://www.itsecurity.com/features/top-10-famous-hackers-042407/

 
Ping Tools

Free Ping - This IP ping software tool allows for visual notification along with Windows Pop Ups to notify you of a downed device.
Windows Status Network Reporting Tool - Simple to configure monitoring tool that provides a webpage of device status. Lacks any alerting features but does run as a Windows NT/2000/XP service.

Servers Alive - Fully mature commercial product that can monitor devices, NT Services and performance counters and includes Netware monitoring. Runs as a service on Windows NT/2000/XP, web interface and multiple alerting capabilities. Free for 10 devices. <$$>

IP Sentry - Runs as a Windows NT/2000/XP/2003 service or network monitoring software package. Web interface, monitors Windows shares and services. Lots of optional plug ins. Free for 2 devices. <$$ - $$$>

WhatsUp - The standard against all others are judged. Full package of monitoring and alerting capabilities. Can monitor services, web pages, up/down dependencies, and runs as a service on Windows NT/2000/XP. It has a web interface that includes multiple levels of security. WhatsUp FT Premium adds Fault Tolerance and application monitoring for Microsoft Exchange and Microsoft SQL Servers to good old WhatsUp Gold. WhatsUp Professional suits larger networks.<$$$>

Network Sniffers
Wireshark - Network protocol analyzer (successor to Ethereal). Free does not mean a product is lacking in features or maturity. This is a full feature packet sniffer that can be used capture traffic in real time and identify everything behind the scenes in network traffic. Filtering, DNS resolution of clients and select between TCP/UDP/ICMP traffic.

Show Traffic - Real-time network traffic sniffer on any given interface. Resolves names to IP addresses. Can be used to identify unwanted traffic. It does not capture traffic for later analysis.

Network Probe - Network monitor and protocol analyzer. Unbelievable tool to identify almost any specific network traffic including peer to peer applications and instant messaging software. Filter by hosts per protocol. You will be surprised at the traffic types on your network.

Web Log Analyzers

IIS Log File Analyzer - Simple interface and reporting capabilities provide information such as number of visitors, NS Lookups of visitors, simple filter, and referrers.

Web Log Expert (Full & Lite) - Support for IIS and Apache Logs. Both versions can identify referring traffic, entry page, page stats, search engines, and traffic by the hour of the day and week. The full version can give detailed error reports, exit pages weekly and monthly traffic and much more detailed reporting and filtering.

Mach 5 Analyzer - This is a solid mature product that offers full reporting capabilities and exporting to Word, Excel, and HTML. Extensive filters and tracking and errors. Supports most log file formats. <$$>

Who's-On - Unlike traditional analyzers while report after the fact, this tool reports access in real time. Track visitors activity, set alerts for exceptions and undesirable traffic. This tool is both useful and addictive. Several versions available including one that runs as a service. Web interface for remote monitoring also available. <$$>

Miscellaneous Tools

CoolMon - This tool can provide information about your system in a transparent pane on your desktop. (My Desktop & Config File) There are a variety of scripts and extensions that do everything from gather the weather to create a webpage of multiple systems. (Think servers!)

VNC - Need to remote control a desktop across the room or across the world? This is a stable product that will run as a service or from a floppy and is available for almost any platform.

Event Sentry - Monitor Windows NT/2000/XP Event Logs with this tool that runs as a service. It send e-mail alerts of events specified by type (Warning, Information...) or as defined by the filter.

GFi LANguard Network Security Scanner - Identify security risks on you servers and workstations. Find unauthorized/unexpected services and shares. The product can be used to push patches and updates to equipment for the first 30 days and for a modest fee after thirty days. The scanning ability continues to work for free forever. <$$$>

Sysinternals - There are a wide variety of tools to assist in management or troubleshooting of Windows systems and servers. The tools are well respected with many of them free.

Directory & File Monitor - This small utility monitors files or directories for changes including add/deletion of files, renaming or attribute changes. Has the ability to log activity to a webpage. Excellent to monitor a server or workstation for unauthorized or malicious activity.

GFi LANguard System Integrity Monitor - Monitor files for unauthorized or malicious activity. It runs as a service on Windows NT/2000/XP and can send e-mail alerts. It is an excellent way to protect your web server.

Who's On Proxy/ISA Server - If you has a Microsoft Proxy or ISA Server, watch the actual traffic in real time. See where your users are visiting at any given moment. Web interface for remote monitoring. <$$>

Netbotz/Rackbotz - Hardware devices to monitor critical system areas. Besides security cameras that can detect motion, there are sensors for sound (fire alarm), moisture, temperature, and airflow. These can be a lifesaver for mission critical equipment. <$$$$>

Helper Applications

Hermes Mail Server - Excellent SMTP/POP3 mail server that can be used to relay alerts from your network monitoring station or tools. The source code is included. It can run as a service on Windows NT/2000/XP.

VNC - Remote control of almost any desktop from anywhere. VNC (Virtual Network Computing) allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The software is open source and has been ported to almost any platform ever used. VNC runs a service on Windows NT/2000/XP.

Network Notepad - It should come as no surprise that proper network diagrams are an important tool in monitoring your network. Network Notepad is a freeware alternative to more expensive diagramming programs. Network Notepad is a program for creating interactive network diagrams with user definable management features such as point and click telnet