Friday, September 26, 2008

Security threats in your daily INTERNET life




Internet has revolutionized the life of the people all around the world. About 80% of the data on the internet is due to e-mail. Today every user on the internet surely having an e-mail ID. A lot of communication either related to business or personal issue takes place over the Internet. But in general users of the internet only knows the ways that is sufficient to carry out the work, they are not aware of the security threats present all around them. Here I’m mentioning some of those security threats…

Lottery wining e-mails:

Now a-days most people are receiving e-mails stating that they have won a huge sum of money in the lucky draw or sender’s grandfather had left the huge amount for him/her and with your help that person can get that money and in lieu of that you will get some share in that huge amount. This thing is called as Social Engineering. The sender of the e-mail takes you in confidence and then directs you steps for attaining the amount. The sender tries to fool you and instead of giving money to you, actually wants money from you. The sender first asks for your personal details as your name, the mailing address, phone number, photo identity proof that may be either the passport or driving license, etc. When you go ahead with this first step the sender then asks for the processing fee for the papers, and after that asks you to collect the money in person by coming over there. Many persons are fooled and suffered a lot from all these fraud e-mails. Some who believed these fraud people lost their huge sum of amount and who went there for money kidnapped over there and their family members were asked for ransom, while some others even lost their lives in all this. On the other hand the information given by you is being used in the terrorist activities. Only your photograph is changed from the identity proof given by you and rest all things remains same, thus the terrorist does all the activities on your name.

So, in future whenever you get this type e-mail that is offering you money always mark it as spam and delete it.

Banking over the Internet:

Another threat over the internet is related to online banking. The online banking where on one hand facilitated their customers, but on the other hand increased the threat to transmit the sensitive information over the internet. However a high care is taken to prevent the misuse of user’s information but again some unsocial agents deploy the same social engineering to get your sensitive information regarding your bank account details. The idea here deployed is sending an e-mail, saying that due some technical problems or some other problems your online account is disabled and you can re-activate it by clicking the link below, and logging in to your account. The link in the email takes you to the bank’s website for logon. But actually the website, on which you have reached from the link in the e-mail, is not the authentic website of the bank but is actually the fake website that looks exactly same as the bank’s website whose purpose is to get the user’s log id and password, so that he/she can access your bank account for your funds. The technical term for this in computer’s world is known as Phishing. Thus when you enter your account’s username and password on the fake website it is sent to the sender of the e-mail and you are simply shown a simply error message. In this way your bank account’s security is compromised.

Thus, if you are getting this type of notification, there is no need to panic. If you have activated your account for online banking then simply open a new browser window and type in the URL of your bank’s online banking and then logon to your account to check your account. One thing you should keep in mind to never click on the link available in the e-mail. Never go to bank’s online banking website by clicking to any link in any e-mail or on any web page that is not believed to be authentic. If you have received these types of phishing e-mails then always inform the technical support department of the bank to take appropriate steps.

Job Offers:

Another trap to get money from the people is fake job offers, especially from abroad. In this, the unsocial people collect individual’s data from job portals that he/she has put on the job portal like Monster.com, Naukri.com, Shine.com, etc. for jobs. In this, an e-mail is communicated to the individual stating that his/her profile matches with the requirements of the job openings in their company, and they offer you to go forward on the process to join the company. Generally the process consists of a telephonic interview after that those people demand for processing fee for the papers necessary to join the company and also ask fee for visa to work in their country. Once the payment is received from the person, then no response is made from these fraud people.

So, whenever you receive such email, always check the authenticity of the email. Search for the company profile over the internet. After consulting with some knowledgeable persons reply or go forward on such matters.

Social Networking:

A lot of social networking sites are point of attraction to the people now a day, like Orkut, Wayn, Facebook, etc. These services where made a platform for friends to meet and, discuss and share their emotions but also made the personal information about the people public. Whereas option is available on these sites to show the information you want, but that also is not 100% guaranteed. As there are scripts used for all these security related tasks and an expert programmer can easily fetch all your personal data. I’m not saying that you should not use social networking sites but be cautious while submitting the information on these sites. Special care must be taken by the girls and ladies while posting the information and photographs on these sites. A lot of cases have been heard regarding theft of the photographs of girls from these social networking sites and misused over other sites. Another thing you should also keep in mind that you should never trust the person on the other side if you do not know him/her personally, never reveal your phone number or mobile number to that person. Even if you have met your childhood friend on these sites, it may be possible that it is not the same person whose name is written over there and whose photograph is displayed on the profile. I myself have seen three profile of my friend on the internet with his name and photograph on all the three profiles; out of these only one profile was authentic that was created by himself rest others were fake and were made by unsocial people on these sites.

So, from next time always be careful in using these sites and do keep in mind what I told above.

Some important tips for using Internet:

  • Always remember to sign out of all your account. Many people simply close the browser window in hurry instead of signing out, and think their account is safe. But this not the case, the session remains valid as long as the valid cookie (used for managing user’s session on the internet) remains on the user’s computer. A cookie is invalidated by signing out of the account. If due to some problem you have lost your internet connection or due to some other problem not able to sign out then simply clear your private data, for this simply select the option from the tools menu. The main thing is to delete the cookies from your browser and your session is invalidated.
  • Always think twice before you activate your account for online net banking; do you really need it! These things are not for fun. As far as possible access your net banking account from your personal computer or laptop only. If any time you have to access your account from cyber cafĂ© or some others computer then use the on screen keyboard utility to enter your password to prevent password theft.
Precautions:
  • Never pay attention to lottery wining e-mails, mark it as spam and block sender.
  • While banking over internet never disclose your sensitive information as your login password, profile password, etc. to anyone.
  • Use the on-screen keyboard utility when accessing your account from public computer or some other's computer.
  • If you receive a job-offer always research about the company over the internet, and also consult some learned person before replying.
  • Never disclose your personal information on social networking sites, as there is risk of information theft.


Internet has emerged as a very powerful tool for communication, but by knowing these security related issues you can take full advantage of it, and will not have to suffer in future.

Wish you happy and better internet experience…

Monday, September 15, 2008

Planning network for home or office…. Go for




The current time is where everyone likes to be connected to their loved ones and the Internet has played a very vital role in this. Now almost all middleclass families are having computer in their home and also have access to the internet. Similarly the support of internet to your business can give it new heights.

Now the condition is again changing, instead of having a single system, there is more than one system and every system likes to be connected to the internet. So, now whenever you are planning for the internet connections, and if you are going to use it regularly, then go for the broadband connection. It will give you a good experience and will be economical also. There’s lot of offers available in the market so it’s difficult for one to make choice.

Selection of ISP:

The broadband service provided by BSNL and MTNL are for stationary access, whereas the services provided by the mobile companies as TATA Indicom, Reliance, Idea, etc. allows you to access the internet on the move. So depending upon your need select your connection. I suggest that you must go for the stationary connection, provided by BSNL and MTNL over their basic phone connection, as here are very few moments when you will have to access the internet on the move unless you are from corporate world. You can also go for the broadband connection provided by the mobile companies but that will be not economical. Stationary broadband will give you good bandwidth (speed) so you can have good working experience. The service provided by mobile service providers through the USB modem or device not gives the good speed. So, you are not going to work smoothly with the interactive multimedia content, like watching videos, or video conferencing with your loved ones.

Selecting Customer Premises Equipment (CPE):

The broadband service provided by BSNL and MTNL requires you to setup ADSL modem for accessing the service. I will suggest you to purchase the modem having more than one LAN port and also having Wi-Fi port this will help you access the service on more than one system and also wirelessly. However this let you spend some more money but it will be beneficial for the future.

Typical Wi Fi Router with inbuilt modem (front view)

Rear view

The most important thing over here is the Wi-Fi! As it will be good for you, because the future is of Wi-Fi. Maximum devices are now being Wi-Fi enabled like the mobile phones and printers. This also lets you get of the rid of the wiring overhead for accessing the network. It also lets you easily add devices to the network. All laptops are now Wi-Fi enabled, for accessing Wi-Fi network on desktop computer just use the USB Wi-Fi Adapter, which is also easily available. It lets you to move out of the rooms and provides you access to the network in your whole premises. The most important is placement of the Wi-Fi router (modem). The modem acts as the Wi-Fi router (or Access Point) for the devices in range. The placement of the router (modem) plays a dominant role for better reception of the signal.

The router will be placed in the open location so that you get good signal reception. If possible place it in the center of your home or office at a height of 1.5 to 2 meters, which will give you better signal strength.

Security:

Now the most important thing with the Wi-Fi is the security. You think that you placed the router at the best location and getting good signal reception all over your premises that’s all! You think that the signal seizes to extend out of your premises! It is not the case; the signal continues to extend beyond the boundary of your premises. Thus to protect your data and internet connection, security is the most important concern. The most common wireless encryption standard is Wired Equivalent Privacy (WEP), but it has shown to be easily breakable even when correctly configured. So, Wi-Fi Protected Access (WPA and WPA2) became the standard in 2003 and is now shipped with almost all Wi-Fi enabled equipments. By default the Wi-Fi routers are configured in the “open” mode, i.e. anyone who is in the range of the Wi-Fi signals can access the network and if the person having some technical knowledge then he/she can change the settings of your router. Thus it is advisable to first change the IP address range of you router and then change the SSID i.e. the network name and then set the network access key. Also it will be better to hide the access point so that it is not discoverable from the devices in range.

So whenever you are going to set up small networks in home or in your office then go for Wi-Fi. It is the best option available with least overhead. The wireless router with inbuilt modem will let you to connect the devices with each other and also to the internet. So turn your home or office into a “hot spot” for you.

Saturday, July 12, 2008

Vehicle Tracking System using GPS



As it has always been a logistic nightmare to track out the vehicles on the way. In order to solve this problem of tracing out the vehicles on the way a vehicle tracking system based on Global Positioning System (GPS) has been devised. The system uses Global Positioning System as its base technology. For the communication purpose the system is set to be configured with the available terrestrial network.


Working of GPS:

The feasibility studies were started in 1960’s. The Pentagon appropriates funding for this system in 1973 and the first satellite related to this topic was launched in 1978, and the system declared fully operational in 1995.

The official name of the system was NAVSTAR GPS (Navigation Satellite Timing And Ranging Global Positioning System) and is developed by US Department of Defence. The Global Positioning System is a worldwide positioning system based on the functioning of the 29 satellites. These satellites keep transmitting the signals at a particular frequency to the earth. The GPS listeners, on earth tune to that particular frequency and listen to the signals sent by the satellite. For positioning any device which is equipped with the GPS listener, signals from three or more satellites is required. The signals from three satellites determine the latitude and longitude of the device on the earth. But the signal from four satellites determines the latitude, longitude and altitude of that device on the earth. More the signals from the satellite more will be the accuracy of the position of the device.

Use of GPS for vehicle tracking system:

For locating or tracking the vehicles, the system uses the GPS as its base technology to locate the vehicle on the earth. For this the vehicle is equipped with the GPS listener. Once the vehicle is located on the earth then the next step is to send this information to the control centre for the mapping of the vehicles. That’s here the terrestrial network comes into scene. The system uses the terrestrial network such as the available CDMA or GSM mobile network for communicating with the control center.

Once the vehicles is located then it is it sends its information such as the latitude, longitude, altitude, speed(derived), etc. to the terrestrial network. The terrestrial network then sends this information to the control center where the vehicle is mapped on the electronic map on the computer. If there is some information that is to be send to the person in the vehicle then it is sent to the terrestrial network. The terrestrial network sends this information to the device in the vehicle. For this the system use the Short Messaging Service (SMS), thus the information that is sent by the control centre to the person in the vehicle appears as SMS to him. Thus, it is fully two way communications between the control center and the device.



The location is represented by the Position Fix. A position fix is based on real – time satellite tracking and is defined by set of co-ordinates. It changes as the GPS receiver moves. Position shows the approximation of the receiver’s true location.

The path which the receiver must follow is denoted by the waypoint. A waypoint is the set of co-ordinates entered into the receiver. The position fix is matched with the waypoint within some allowed error limits. If it is within the error limits, the vehicle is following the correct path unless it is on wrong path and the control centre is sent information about this.

Friday, July 11, 2008

Your own Website, your own dedicated server, at your HOME…

You just typed in the URL in the address bar of the web browser and the site opened in front of you. Have you ever thought that from where the page came from or where it is lying? So, how do you feel if something like this happens for your website? Sounds great! But for this you have to buy the web space to place your web site over there, then buy the domain name, by which the people can access your stuff worldwide.


But you yourself have a computer which has lot of space available. Also you are having an internet connection. Can you use your own computer to act as server for hosting your website? Yes, sure you can do this; after all you have spent a lot of money for your computer, so it’s the time for you to exploit it!


There are many issues that must be handled for hosting the website from your home PC, which I shall take on in this article. The most important issue is that people access your stuff using your broadband internet connection. In 90% of the cases your ISP provide you with the dynamic IP, i.e. every time you get a different IP address when you connect to the internet. So it will be difficult for the DNS to map your computer appropriately. This is the main issue, which is handled later in this article.


For getting started its assumed that you have made you own website and its now ready to be published on the internet. In Windows XP Pro/2000/NT there is windows service available called Internet Information Service (IIS) for hosting website but in Windows 98/XP Home this is not available so, I’m using the third party server for publishing the server.
Here I am using Apache Tomcat web server for the deployment of the web site.


Getting started…
First download and install Apache Tomcat on your computer. Just follow the typical settings for installation. To test whether the server is working properly fire a web browser window and type in the following: http://localhost:8080

You will see the Tomcat home page. Now it is sure that you your server is installed and working properly. Now place the folder containing your web files in the webapps folder inside Tomcat. The very first page i.e. the home page of your website must be index.html or index.jsp. If this is not the case then rename the home page file to index.html or index.jsp and also update the links in your web site for your home page.


Making your website accessible
You have to configure your system for making your website accessible for people on the internet. First of all you have to configure your firewall to allow the requests for your website. For this, if you are using any other program other than the Windows inbuilt firewall then configure it to allow connections for port 80 that is for HTTP (Web Service). If you are using Windows firewall as in Win XP then in its advances settings tick the Web Service (HTTP). Thus now your system is configured to handle HTTP request from outside.


Securing your system
As you allow people on the internet to access the content available on your system, it’s not safe regarding the security issues as there are many security loopholes present in Windows XP Pro. So, it will be better to get your windows updated with the security updates released by Microsoft. If you are having genuine copy of windows then use the automatic updates feature; else manually download the updates and install them.


Getting domain name
Domain names are nothing but the names by which the computers are referenced on the internet instead of IP address. IP addresses are used to uniquely identify the computers on the network; they are just like phone numbers. But having dynamic IP address its problem for DNS! This problem is handled with the concept of dynamic DNS. A lot of information is available on the internet regarding dynamic DNS and also there are many service providers for dynamic DNS. The concept behind dynamic DNS is that you open an account with the service provider and then create a host over there. Then you must download the dynamic DNS client and run on the system that you use for hosting websites and is having dynamic IP. Whenever the IP address of the system changes then the running client of the service provider updates your IP address in the provider’s DNS database so that your computer is correctly mapped to the proper IP address by the domain name. One such service provider is no-ip, that provides the dynamic DNS service. First you have to open the free account over there; once you are having account on no-ip, add host, select the domain name from the offered free domain names, then select port-80 redirect in the host type and enter port 8080 as Apache runs on port 8080. Now you are done.


Final step
Now go to apache webapps folder and rename the ROOT folder to some other name and rename your web application or website folder to ROOT. That’s all, now you are done. If everything that is explained above is right then startup the apache server and connect to internet; and your website is accessible from all over the world. To check fire a web browser window and type in the domain name of your web site that you have chosen and you will be presented with the home page of your very own website.


In this way without spending a single penny you can have your own website, your own dedicated server, at your very own HOME.

Sunday, July 6, 2008

The VIRUS Phobia

A general computer science student working at his room suddenly notices something strange in his system. Some of the icons are distorted, a folder inside the folder with the same name, and some applications are not working properly. He immediately thinks that what happened to the system, then it strikes to his mind that his computer may be infected by a virus. He instead of removing the virus makes up his mind to format the system, reinstalling the windows and then the various drivers and finally all the applications.

This is the general view of many of the peoples who knows how to install the windows. The rest who don’t know how to install windows, thinks that many of the things in the system are not working properly, and due to the fear that it will spoil their costly system, they immediately call the vendor to do the things right; which in turn charges them a huge amount in lieu of doing the things right, which in fact is not a difficult task. Thus, many of us don’t exactly know how to handle the situation when a computer is attacked by a virus.

Whenever you notice that the system is doing something strange, some of the applications are not working properly, windows is distorted then it may be the case that your system may be infected by virus. But there is nothing to panic. Remain calm and try to find out the virus and also find the way to fix that.

Amit Saxena, a student of Electrical and Electronics branch, is having system just only to carry out general word processing, listening songs, and watching movies. He used to collect the media from various sources and don’t worry about whether the data is safe or not. Result is, very often his system is infected with virus. And when the situation of the system becomes critical that it can’t work further then he simply formats the system, mostly spoiling his 4 to 5 hours. Thus in a month he use to format his system about 5 to 6 times. This is not right, as it creates a bad effect on the hard disk.

Handling a virus attack in fact is not a hard nut to crack. Just you need some knowledge and most important is the “patience”. As prevention is better than cure, so it is beneficial to protect your computer using a good anti-virus program, keep the virus definitions update and also copy data from secure source. Whenever you bring any data from sources that you think may be vulnerable to viruses, always scan that.

Whenever you find that your computer is infected by virus then there is no need to panic. Simply think of the source from where the virus made its way to the system, block that way so that it can’t make its way back to the system when you are on your way to fix that virus. To fix most viruses just follow the following steps:

  • Update the virus definitions of your anti-virus program.
  • Turn-off the system restore utility in windows XP. If it’s not possible to turn off the system restore, then restart the system in the safe mode and then turn off the system restore.
  • Perform full system scan, select fix for all the found viruses. If some of the viruses that cannot be fixed by the anti-virus program; quarantine all those infected files.

In most of the cases above provided steps will fix the problem, and if problem still persists then go online and get a fix for that particular virus.

Always make back up of your important data, so that in case of virus attack you not lose your data that may be the result of years of work. So, next time if you get infected by virus then don’t try to reinstall windows or call vendor for help, simply do it yourself.

Sunday, January 20, 2008

Categories of Members in Software Project Teams…..

Here I'm presenting my personal view about the different types of persons that I've come through in my college life and in the development of software project. It is my thinking about these types of people, and many of you also agree with me. Any suggestions on this matter is highly appreciated.....

Some other categories related to this topic are available on my friend's blog. It is highly recommended to have a look on that......

http://manasdeeps.blogspot.com

Theorists:

This kind of personnel in the field of programming knows the complete detail of how the things go on, what’s the theory behind it, what logic must be applied to do the things in the right way but they rarely have done these all things in practical. They can very well explain you how should you proceed but when the point comes for them to do those things by themselves they fail. They only have the theoretical knowledge but practically they are zero.

Loudspeaker:

Producing a lot of sound and impressing the audience is their main property. This kind of people are very well suited for presentations but becomes dangerous for the group sometimes when they are trapped by the questions of the audience. This category of the people can say all the things fluently in front of the audience what they have mugged up during the preparation. These people have expertise in speaking and also have good level of confidence to present the things in a relevant manner. Sometimes if they are trapped by the audience then they handle the matter by their common sense and knowledge what so ever they are having

Commandos:

A very special category of the programmers is the commandos, who once understood the problem domain, are capable of doing all the work in time and in perfect manner. They know all the minute details of each and every step they are applying to solve the things. They are having sound technical knowledge both theoretical and practical. Confused professors seem to take lessons from commandos, and its big head ache of commandos to describe the things properly to confused professors. Also "Politician" is seen to have conflict with the commandos.

Confused Professor:

Knowing a lot of programming languages as ‘C’, “JAVA”, J2EE, .NET, etc. but very few of them are recalled at the time when there is need is the problem of these types of persons. These types of people gain lot of knowledge in a short span of time but they don’t practice that knowledge; thus they get confused in the syntax and other minute details of the various programming languages. They not only themselves confused but they try to confuse the other people also. The main problem with “Confused Professor” is that being professor (in nature) he tries to explain the things to other people but being confused he actually fails to do that and confuses others also. So, other members try to keep away from confused professor. But commandos know that this guy is having a lot of knowledge, and when commandos are in problem they seek the help of confused professor.

Showman GUY:

Talking about lot of technical words, carrying electronic devices to impress others, always doing work so that he must be the point of attraction of others – these are some of the activities that are done by the persons having this quality. They always try to show that they are superior than others, having a lot technical knowledge, they do what they like, don’t listen to others but actually they are only having little knowledge; in background they steal the ideas of commandos and administrators. They always try to keep away from commandos because they know that once they came in contact with the commandos, commandos will know their reality and then they cannot show off in front of commandos.

Side Kick:

Gathering material from various sources, giving ideas that are actually of others, going here ‘n there for printouts, reference books, etc. were main jobs of side kick. This category is overlooked in team but plays an important role in the team. The administrators and commandos know the potential of side kick. They exploit their potential for the welfare of the project. Side kick don’t argue with "Administrators" and "Commandos", and accept the work assigned to them happily.