Thursday, November 09, 2006

What SHTTP means.


SHTTP means Secure Hypertext Transfer Protocol which is developed by Enterprise Integration Technologies in 1995 to ensure security with commercial transactions on the Internet. A protocol that provides secure transactions over the Web. It is endorsed by a variety of organizations. An extension to the HTTP protocol to support sending data securely over the World Wide Web. Not all Web browsers and servers support S-HTTP. Another technology for transmitting secure communications over the World Wide Web -- Secure Sockets Layer (SSL) -- is more prevalent. However, SSL and S-HTTP have very different designs and goals so it is possible to use the two protocols together. Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely. Both protocols have been submitted to the Internet Engineering Task Force (IETF) for approval as a standard.

RSS

What is RSS?
The Internet today contains a wealth of information. Avid Internet users visit many interesting websites and read many articles. Information and web pages make their way in to the favorite folder for later viewing. Over the course of time, re-visiting these bookmarks becomes a major task for users especially as the number of bookmarks grows. A better technique for users is to automatically receive information about updates to their favorite websites.
Internet users can employ special software, like newsreaders and RSS-aggregators, to organize RSS feeds and get automatic updates. Products like Active Web Reader allow you to read RSS files. Such types of programs go beyond simply reading. They also organize RSS feeds, manage updates, monitor website changes and search for information online. They can keep you automatically updated on the latest changes by checking RSS feeds and displaying items from them.

Let's talk about cybercrime.





According to Wikipedia, cybercrime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories. Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime. This term is also used to include traditional crimes in which computers or networks are used to enalbe the illicit activity. Examples of cybercrime in which the computer or network is a tool of the criminal activity include spamming and certain intellectual property and criminal copyright crimes, particularly those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls), malicious code, and denial-of-service attacks.
Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds. Finally, examples of traditional crimes facilitated through the use of computers or networks include Nigerian 419 or other gullibility or social engineering frauds (e.g., "phishing"), identity theft, child pornography, online gambling, securities fraud, etc.
Cyberstalking is an example of a traditionl crime -- harrassment -- that has taken a new form when facilitated through computer networks. Additionally, certain other information crimes, including trade secret theft and economic espionage, are sometimes considered cybercrimes when computers or networks are involved.
Cybercrime in the context of national security may involve hacktivism (online activity intended to influence policy), traditional espionage, or information warfare and related activities. Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

Here a the principal hackers of the time.

Apart from Tsutomu Shimomura, the other three hackers mentioned here were criminals at some point of time and for various reasons. They have all repented for their actions and are currently contributing in positive ways to the burgeoning cyber realm. It is interesting in retrospect to take note of when, why and how they turned to crime. Tsutomu, however, is recognized for bringing down Kevin Mitnick, arguably the most notorious hacker ever. The I-Love-You virus and the Sasser worm had caused so much damage without apparent human intervention that they too deserve due recognition.

Kevin Poulsen

Probably one of the most talented hackers of all time, Kevin Poulsen wanted more than what his high paid job could offer him. His crimes ranged from stealing classified military data to hacking into a radio station’s telephone lines in order to “win” a Porsche. He did not call himself the “Dark Dante” for nothing.

Kevin Mitnick

Well-known in the annals of the FBI, he was one of the most slippery crooks the bureau ever tried to apprehend. As proficient at actually committing the crime as he was at deceiving the authorities, he left a remarkable trail of crime as long as he was on the run. He had delved so deep into cybercrime that he was barred from using a computer for a long time after he was caught.

Adrian Lamo

This is the classic case of a white hacker who went too far. Adrian was a good friend of both Kevin Mitnick and Poulsen but he did not go to the extent that they went in the realm of cybercrime. His life, however, serves to remind all of us how easy it is to be seduced by the dark side even when one is actually working for the “good” side.

Tsutomu Shimomura

A high profile researcher at San Diego Supercomputer Center, Tsutomu has also worked with the likes of Richard Feynman. His other talent, hacking, was brought forth, however, when he had a run-in with Kevin Mitnick. Kevin had deliberately hacked into Tsutomu’s computer to steal some files and Tsutomu took it as a personal challenge to stop him as well as bring him to justice.

I love you Virus

This virus is notorious throughout the world. A highly effective self-replicating algorithm coupled with an instantly provocative message like “ Kindly check the attached LOVELETTER from me. ” has made this one of the most widely spread virus in history. It is believed that this virus alone caused over $10 billion in damages all over the world.

Sasser Worm

This malware does not even need a provocative message to have people loading it onto their computers – it comes and goes as it pleases. Being connected to the Internet is enough to get it loaded onto one’s computer and though it did not directly cause damage, it caused severe network disruptions worldwide leading to millions lost due to loss of productivity. Imagine the impact this had on hospitals and banks.

I would like to finish this presentation by one of the most important cybercrime story of the 20th. The american government called it "electronic Pearl Harbor".
For two days in January 1999, hackers repeatedly tapped into military computers at Kelly Air Force Base in San Antonio -- the center for the most sensitive Air Force intelligence, the kind of information critical to American troops now on patrol over Iraq and in Bosnia.
NBC News has learned the attack was a sophisticated, coordinated assault through computer networks in Canada, Norway and Thailand.
The hackers didn't receive top secrets but the Pentagon's No. 2 man, Deputy Secretary of Defense John Hamre, says the United States is essentially engaged in an all-out cyberwar.
For the past several months, so-called cyberterrorists,
operating from as many as 15 locations worldwide, have launched a series of coordinated attacks on Pentagon computers -- as many as 100 per day.
The attackers remain unidentified and since anyone with a computer is a potential enemy, experts warn the United States military is vulnerable to a sneak attack.
At Kelly, the hackers were trying to enter a server that controls a number of sensitive computers at the base and other bases in the San Antonio area.
Among the computers targeted were those of the Air Intelligence Agency, the Air Force Information Warfare Center and a Joint Chiefs of Staff command-and-control operation. Officials said it was the most sophisticated attack yet on Pentagon computers.

The attack so worried the Pentagon that it called in the FBI, which has launched a criminal investigation. But the military is making some progress. New technology developed by the Navy did detect the attacks on Kelly Air Force Base, but failed to find the hackers themselves.

Several experts said such an attack wouldn't have even been detected at all a few months ago but the government has been quietly setting up cyberwar early-warning operations at the Pentagon, CIA and the National Security Agency over the past year.

Without falling down the paranoïa, we all have to be careful. I have never been a victim of cybercrime but I am a possible target as all Internet users. In fact, as soon as we pay something on internet ,our bank code can be stolen.

However, the protection is making progress. Some sure systems are applied as Paypal for example, and work well.


Tuesday, November 07, 2006

Why Youtube is so great.

Today, nearly all Internet users know or have heard about Youtube. It is the symbol of the last innovation of the NTIC, the Web 2.0.
What is you Tube?
YouTube is a popular free video sharing web site which lets users upload, view, and sharevideo clips. Founded in February 2005 by three employees of PayPal, the San Bruno-based service utilizes Adobe Flash technology to display video. The wide variety of site content includes movie and TV clips and music videos, as well as amateur content such as videoblogging. It is staffed by 67 employees. In October 2006, Google, Inc., announced that it had reached a deal to acquire the company for $1.65 billion USD in Google's stock. The acquisition is expected to close in the fourth quarter of 2006.
The company's humble beginnings in a garage and commitment to offering free services necessitated outside financial backing. In November of 2005, venture capital firm Sequoia Capital invested an initial $3.5 million; additionally, Roelof Botha, partner of the firm and former CFO of PayPal, joined the YouTube board of directors. In April 2006, Sequoia put an additional $8 million into the company, which had experienced a boom of popularity and growth in just its first few months.
At present, YouTube is one of the fastest-growing websites on the World Wide Web, and is ranked as the 10th most popular website on Alexa, far outpacing even MySpace's growth. According to a July 16, 2006 survey, 100 million clips are viewed daily on YouTube, with an additional 65,000 new videos uploaded per 24 hours. The site has almost 20 million visitors each month, according to Nielsen/NetRatings, where around 44% are female, 56% male, and the 12- to 17-year-old age group is dominant. Youtube's pre-eminence in the online video market is staggering. According to the website Hitswise.com, Youtube commands up to 64% of the UK online video market.
The key of this success is, in my opinion, the speed of download and the fact it is free. Everyone can use it, even if he or she's not a king of the internet. We can explain this success by the buzz it had created when it started.
Youtube has revealed people, who are famous in the website
community. As an example, I will present the lonelygirl15 phenomenon.

Lonelygirl15 is a fictional video blog that came to international attention via YouTube, a popular video sharing website. The central character is a YouTube user of the same name, although she is commonly known as Bree. The character achieved massive popularity with her series of videos, which acquired over 15 million cumulative views. But after viewers grew suspicious, lonelygirl15 was exposed as a fictitious character played by New Zealand actress Jessica Rose. An interview with The New York Times then revealed the series creators, Ramesh Flinders, a screenwriter and filmmaker from Marin County, California, and Miles Beckett, a surgical residency dropout turned filmmaker.
The series, which began June 16, 2006 is still running, with new videos appearing regularly.The series, which began June 16, 2006 is still running, with new videos appearing regularly.

As far as I am concerned, I use Youtube everyday. I only watch videos, like musical clips and series. I don't donwload movies, that it why I don't share what I watch. I don't like to download because when I do it I feel like robbing something. I don't feel at ease. One of the reason why I like Youtube is that it is now allowed. Must of all, it is not necessary to download because we can see what we want, when we want and wherever there is an internet access. It is so much faster and safer that download sites like Emule or Napster, that it would be silly to not use it.

Thinking about the possible uses of Youtube in the future, we can all imagine. The best like the worst.
We can plan that people suffering of censorship will find here a way to get out of their silence. They have the public to read their message. We can also dream that some friendships and love stories will born. I think that it is already the case but I am sure that this movement will grow.
But stop dreaming, and let think about professional uses. Managers now have the possibility to edit methodology, secret of success or informations they want to transmit to their employees. When we see that the White House uses Youtube in her campaign against drugs, we can easily apply this to the company system. Youtube is as all the medias a way of pressure. Here comes the bad aspect. We know that all the files coming to Youtube are checked. But if the company, now forming part Google, is on lobbying, the game will be ended.