Pages

Friday, August 31, 2007

IP spoofing

Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In the subsequent pages of this report, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.
The concept of IP spoofing was initially discussed in academic circles in the 1980's. In the April 1989 article entitled: “Security Problems in the TCP/IP Protocol Suite”, author S. M Bellovin of AT & T Bell labs was among the first to identify IP spoofing as a real risk to computer networks. Bellovin describes how Robert Morris, creator of the now infamous Internet Worm, figured out how TCP created sequence numbers and forged a TCP packet sequence. This TCP packet included the destination address of his “victim” and using an IP spoofing attack Morris was able to obtain root access to his targeted system without a User ID or password. Another infamous attack, Kevin Mitnick's Christmas Day crack of Tsutomu Shimomura's machine, employed the IP spoofing and TCP sequence prediction techniques. While the popularity of such cracks has decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators. A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).

Internet Access via Cable TV Network

Internet is a network of networks in which various computers connect each other through out the world. The connection to other computers is possible with the help of ISP (Internet Service Provider). Each Internet users depend dialup connections to connect to Internet. This has many disadvantages like very poor speed, may time cut downs etc. To solve the problem, Internet data can be transferred through Cable networks wired to the user computer. Different type connections used are PSTN connection, ISDN connection and Internet via Cable networks. Various advantages are High availability, High bandwidth to low cost, high speed data access, always on connectivity etc.

The number of household getting on the Internet has increased exponentially in the recent past. First time internet users are amazed at the internet’s richness of content and personalization, never before offered by any other medium. But this initial awe last only till they experienced the slow speed of internet content deliver. Hence the popular reference “World Wide Wait”(not world wide web). There is a pent-up demand for the high-speed (or broad band) internet access for fast web browsing and more effective telecommuting.

Visit http://www.seminarsonly.com for more details.

G a m i n g C o n s o l e s

Gaming consoles have proved themselves to be the best in digital entertainment. Gaming consoles were designed for the sole purpose of playing electronic games and nothing else. A gaming console is a highly specialised piece of hardware that has rapidly evolved since its inception incorporating all the latest advancements in processor technology, memory, graphics, and sound among others to give the gamer the ultimate gaming experience.
The global computer and video game industry, generating revenue of over 20 billion U.S. dollars a year, forms a major part of the entertainment industry. The sales of major games are counted in millions (and these are for software units that often cost 30 to 50 UK pounds each), meaning that total revenues often match or exceed cinema movie revenues. Game playing is widespread; surveys collated by organisations such as the Interactive Digital Software Association indicate that up to 60 per cent of people in developed countries routinely play computer or video games, with an average player age in the mid to late twenties, and only a narrow majority being male. Add on those who play the occasional game of Solitaire or Minesweeper on the PC at work, and one observes a phenomenon more common than buying a newspaper, owning a pet, or going on holiday abroad.
Visit http://www.seminarsonly.com for more details.

Fluorescent Multi-layer Disc

The introduction of the Fluorescent Multi-layer Disc (FMD) smashes the barriers of existing data storage formats. Depending on the application and the market requirements, the first generation of 120mm (CD Sized) FMD ROM discs will hold 20 - 100 GigaBytes of pre -recorded data on 12 — 30 data layers with a total thickness of under 2mm.In comparison, a standard DVD disc holds just 4.7 gigabytes. With C3D’s (Constellation 3D) proprietary parallel reading and writing technology, data transfer speeds can exceed 1 gigabit per second, again depending on the application and market need.
Visit http://www.seminarsonly.com for more details.

Extreme Programming (XP)

Extreme Programming (XP) is actually a deliberate and disciplined approach to software development. About six years old, it has already been proven at many companies of all different sizes and industries worldwide. XP is successful because it stresses customer satisfaction. The methodology is designed to deliver the software your customer needs when it is needed. XP empowers software developers to confidently respond to changing customer requirements, even late in the life cycle. This methodology also emphasizes teamwork. Managers, customers, and developers are all part of a team dedicated to delivering quality software. XP implements a simple, yet effective way to enable groupware style development.
Visit http://www.seminarsonly.com for more details.

Earth Simulator

In July 1996, as part of the Global Change Prediction Plan, the promotion of research & development for the Earth Simulator has been reported to the Science Technology Agency, based on the report titled "For Realization of the Global Change Prediction" made by the Aero-Electronics Technology Committee.

In April 1997, the budget for the development of the Earth Simulator was authorized to be allocated to National Space Development Agency of Japan (NASDA) and Power Reactor and Nuclear Fuel Development Corporation (PNC). The Earth Simulator Research and Development Center was established, with Dr. Miyoshi assigned for the director of the center. The project had begun.

Visit http://www.seminarsonly.com for more details.

X-INTERNET

X Internet offers several important advantages over the Web:
1) It rides Moore's Law -- the wide availability of cheap, powerful, low real-estate processing;
2) it leverages ever dear bandwidth -- once the connection is made, a small number of bits will be exchanged, unlike the Web where lots of pages are shuttled out to the client; and
3) X Internet will be far more peer-to-peer -- unlike the server-centric Web.

This scenario could be marred by two threats: viruses and lack of standards. Once executables start to move fluidly through the Net, viruses will have perfect conditions to propagate. Standards, or rather the lack thereof, will block the quick arrival of X Internet. I can't see Microsoft, Sun, IBM, or other traditionalists setting the standards. The Web-killer's design will emerge from pure research, academe, or open source -- as did the Web.
Visit http://www.seminarsonly.com for more details.

3- D IC’s

The three dimensional (3-D) chip design strategy exploits the vertical dimension to alleviate the interconnect related problems and to facilitate heterogeneous integration of technologies to realize system on a chip (SoC) design. By simply dividing a planar chip into separate blocks, each occupying a separate physical level interconnected by short and vertical interlayer interconnects (VILICs), significant improvement in performance and reduction in wire-limited chip area can be achieved.

In the 3-Ddesign architecture, an entire chip is divided into a number of blocks, and each block is placed on a separate layer of Si that are stacked on top of each other.
Visit http://www.seminarsonly.com for more details.