Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Miscellaneous. Show all posts

Not Sure How to Run an Election Campaign? “CAMPAIGN MANAGER” Is Right Here, to the rescue

Elections have knocked the country's doors!

There is a rising need to acknowledge all the raging political demands and needs of the citizens of the country.

To satiate the burning requisites of the nation, a comprehensive dash-board, open source platform(https://github.com/CSPF-Founder/CampaignManager) is here.

Brought to you by AVS Labs pvt ltd, Campaign Manager is available at a minimal price.

CAMPAIGN MANAGER works for the erudite management of election campaigns.

The versatile open source application is super user-friendly and is easy to install on one's own server.

One of the best aspects of this open source platform is that it's also available in customized versions on demand.

This is a substantial initiative towards meeting the political requisites of the population in need.

This application is specifically designed to work extensively in under-developed and developing countries.

WHY CAMPAIGN MANAGER?

Other e-government portals and campaign solutions are ruinously expensive. But CM is an open source.

Political parties and individuals could in a hassle-free way download and install it on their servers.

CM owners also entertain host servers and provide training in case of lack of proficiency on the downloader's part.

CM'S INTERFACE!

The application significantly proposes three roles for the users:
• Admin
• Data Entry Person
• Feeder

The ADMIN keeps a close and regular check on the issues entered and prioritizes them. Also it's their job to instruct the right person for the job via the dash-board.

The FEEDER is any individual who reports issues or problems according to the area/ ward/ constituency.
The feeders include people like party members, media-men etc.

The DATA ENTRY PERSON is that person who shall be instructed by the feeder to report an issue on their behalf in case they can't.

Supremely Outstanding Benefits of CM

It's an amazing utility that caters to the political needs of the citizens.

It aids the political leaders to comprehend and view the problems feeded in by the citizens.

It's an excellent mechanism for managing and resolving the peoples’ current issues.
 
Get the Source code and guide from here:
https://github.com/CSPF-Founder/CampaignManager

Former Convicted Hacker started to print dollars with the picture of Putin


Hacker going by online handle "Police Dog", has launched a new business in the Russian capital Moscow. He plans mass-produce dollars with a picture of Russian President Vladimir Putin.

About 17 years ago,  the hacker was convicted for stealing $ 40 million in the United States. After service his sentence, he decided to change his profile. So, now he is engaging in Souvenir business.

According to the local news report, he intends to do this in a mass production level not in small scale.

However, this business is capital-intensive. So, he has already launched a campaign to raise money for this project.  It is said that other famous political faces will be also printed on bank notes in the future.

- Christina

 

Stealing of Movies for extortion - Baahubali 2 the latest victim

Baahubali 2 has become another victim of the extortion racket targeted at movies. However, like a typical movie, this seems to have had a good ending. Sixteen perpetrators of this incident have been arrested for stealing a copy of Baahubali 2 and demanding a ransom from the producers of the movie, Arka Mediaworks Entertainment Ltd.

This greedy gang of sixteen threatened to publish the movie on the Internet, if a ransom was not paid. According to India.com, representatives of Arka Mediaworks refused to pay the blackmailers and immediately called the police.

As part of the tactics used to identify the perpetrators, the police asked Arka Mediaworks to play along and seek proof that the movie was indeed stolen. The perpetrators did not know that the copy of the film was "cleverly" marked for copy protection and provided the company with a filler from the movie.

This allowed law enforcement agencies to trace the stolen copy to a specific theatre whose owner was soon arrested. Torrent Freak notes that watermarks allow producers to track exactly where a cam-copy of movie was made, but in this case attackers had digital copy of the film. This suggests that the perpetrators had managed to secure the encryption key which is required to decrypt content (or the movie in this case).

While the owner of the theatre was one of the sixteen arrested, it was also learnt that two of the arrested had been detained in 2015 as well for dealing in pirated copies of Baahubali 1! Old habits do die hard...

The Baahubali incident was not an isolated one. In recent months, hackers put 10 episodes of the new season of the series "Orange Is The New Black" on the internet. The hacker/s - known as the Dark Overlord is said to have stated that representatives of Netflix and Larson Studios refused to pay the ransom, and thus the online posting in retaliation.

It has been learnt that hackers also sought to blackmail Disney by threatening to publish from the latest movie in the Pirates of the Caribbean franchise, Dead Men Tell No Tales.


- Christina

iPhone ,PS3 hacker GeoHot arrested for possession of Cannabis

The 22-year-old Hacker "George Hotz" also known as geohot who become famous as the first person to "jailbreak" an iPhone was recently arrested for possession of marijuana.

He was traveling by car with friends on his way to the SXSW conference in Austin to give a talk titled “The Final Frontier of Reverse Engineering” when he had to stop at a border patrol checkpoint in Sierra Blanca, Texas. Department of Homeland Security officers were using dogs to decide if a vehicle warranted a search, and Hotz’s car was barked at.

Geohot reportedly holds a a medical marijuana license in California. In the glove box of his car he kept 1/4 oz. of marijuana and “chocolate edibles” equivalent to less than 1/8 oz., according to a source familiar with the case cited by Above the Law. Such a small amount of the drug typically only warrants a citation, but the local sheriff reportedly took the whole weight of the chocolate and valued it at $800, instead of the $15 Hotz allegedly paid for it. Hotz was booked for a felony and posted $1,500 bail.


American Pop star Kesha's Twitter account hacked


Hackers gained access to Twitter account belong to singer-songwriter and rapper Ke$ha and announced that her latest song was about to be released.

"Single out in a couple hours. Ugh so f**kin stressful… wish I could stay on da (the) beach forever." The tweet posted reads.

The sing later spotted the false message, she realized her account had been compromised and quickly deleted it. She then post a tweet about the hack "animals!! i love u! i got hacked. single is not out YET. promissse you’ll be the first to know!xx"

Accroding to zdnet report, Kesha’s account may be verified, but if someone gains access to a verified Twitter account, it doesn’t become unverified. It’s currently unclear if someone outside of Kesha’s inner circle actually managed to gain access to her account. It’s certainly possible that someone she knows and has entrusted her Twitter account password with decided to post the malicious tweet.

Facebook is down in European countries

Facebook is down for two hours in European countries on Wednesday morning because of technical problems.

Users from Albania, Belgium, Bosnia, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, France, Finland, Germany, Hungary, Iceland, Ireland, Israel, Italy, Macedonia, Malta, Norway, the Netherlands, Portugal, Poland, Romania, Russia, Serbia, Spain, Sweden, Switzerland, Turkey, Ukraine, and the U.K and more countries are unable to access the social network.

"Today we experienced technical difficulties causing the site to be unavailable for a number of users in Europe," Facebook said. "The issue has been resolved and everyone should now have access to Facebook. We apologise for any inconvenience."

Duqu Framework written in an unknown Programming language..?!


Kaspersky facing difficulty in identifying the programming language of Duqu Framework. Today, Researcher Igor Soumenkov shared their findings about the Duqu in Kaspersky lab post.

"At first glance, the Payload DLL looks like a regular Windows PE DLL file compiled with Microsoft Visual Studio 2008 (linker version 9.0). The entry point code is absolutely standard, and there is one function exported by ordinal number 1 that also looks like MSVC++. " Researcher wrote in the post.

"This function is called from the PNF DLL and it is actually the “main” function that implements all the logics of contacting C&C servers, receiving additional payload modules and executing them. The most interesting is how this logic was programmed and what tools were used."

After analyzing the Duqu, researcher come to come to conclusion that Duqu Framework have been written in an unknown programming language. The mysterious programming language is definitively NOT C++, Objective C, Java, Python, Ada, Lua and many other languages they have checked.

Compared to Stuxnet (entirely written in MSVC++), this is one of the defining particularities of the Duqu framework.

Kaspersky request programmers to recognize the framework , toolkit or the programming language that can generate similar code constructions.  If anyone find the answer contact them via this email stopduqu@kaspersky.com or post a comment in their official blog.

You can read the full report about the Duqu here.

Indian Government to ask Yahoo, Gmail to route all mails through servers in India

Internet mail service providers Yahoo, Gmail and others will be asked to route all emails access in India through the Indian Servers, even if the mail account was registered outside, reports the Times of India.

The decision was taken after IndianSecurity agencies failed to access the email accounts of suspected Indian Mujahideen terrorists because they needed the permission from a European nation where the email server was located and the account opened to do so.

During a recent high-level meeting held in the office of Union Home Secretary R K Singh, the Department of Information Technology (DIT) was asked to take up the matter at the earliest with the content providers.

During the meeting, director general from CERT-in informed that content provider Yahoo automatically locates all email accounts registered in India to the server in India, minutes of the meeting said.

However, Yahoo accounts registered outside India and subsequently accessed from India are routed through servers outside India, it said.

"It was decided to advice Yahoo, Gmail etc that all emails accessed from India should be routed through servers in India," it said, adding that the DIT would take up the matter with the content providers.

Chinese Student hacked Government website over excessive homework


A Government education website in South china's Guandong province was hacked and police say the hacker is a 13 year old student who complained about homework.

He left messages on the defacement page, complaining that his school gave students homework that was "suffocating" during the winter vacation.

"Haven't you advocated less homework to alleviate the burdens on students, leaders? Do you really mean it, or does the school intend to torture us?" The defacement message reads.

Admin temporarily took the webite offline in order to patch the vulnerability . Security experts traced the hacker and identified him as an eight-grade boy from
a middle school in the district, according to Liang Xuying, deputy head of the district's education bureau that operates the website.

A search on Sina Weibo, China's popular Twitter-like microblog service, indicated that more than 290,000 postings are related to excessive homework.


Liang suggested education authorities learn from the case and set up a platform where students can better communicate with their teachers and school administrators.

"If such a platform or channel exists, there won't be students who express their opinions through such illegal ways," Liang said.

The student hacker will not face any legal penalties, but the school will take appropriate disciplinary action, Liang said.