Saturday, August 23, 2014

TABLET MOBILE PRINTER

August 20, 2014

Originally, I thought of the idea of having an ORS (object recognition software) before I discovered that it should be feasible within 5 years. This is going to be awesome and very useful in the future. 



I got the idea of my "solution" from my post before (dated June 11, 2014). It's always been a hassle for me to print my documents and pictures because I need to bring my laptop over to where my printer is located and still need to assemble the printer itself. Ugh, consumes too much of my time.


 
So, why not create a portable "dock" printer or portable "cabled" printer for our tablets and smartphones? Print anytime, anyplace. This would help a lot of businessmen who are on the go and us students who want to print assignments anywhere (ex. right before passing them lol). In the future, the printers would be built-in in our tablets, laptops, smartphones. 


There was a Canon laptop manufactured that has a built-in printer but wasn't commercially successful. Why? It was heavy and very thick! This is the main problem, I guess, for NOW. Knowing us (humans), we can discover a lot of ways to make the things we want HAPPEN. 


PAINT editing skills
========================================================================
Last blog post. Farewell.

Saturday, August 16, 2014

thepiratebay

August 14, 2014

I visited thepiratebay 30 minutes ago and this is what the homepage looked like:

Just like what happened to Kim Dotcom (The Megaupload founder guy), Gottfrid Warg and Peter Sunde were arrested and sentenced to one year in prison. They were charged with "assisting others in copyright infringement" and were ordered to pay $30 million dollars for the damages they have caused.

They are still in prison now according to what is written on the homepage of thepiratebay. I'm really happy that the website is still functioning even though 2 of its founders are in prison. I am guilty of downloading pirated files. I get a lot of files/movies/games/music there. Can't imagine what would happen if they shut it down. 

Monday, August 11, 2014

AntiVirus

August 11, 2014

It's kind of a right timing that our topic involves computer viruses. For almost 5 months, I have been using my laptop without any Antivirus software installed because My McAfee Antivirus already expired and my dad doesn't want to spend renewing its license. (Which is wrong. If my laptop gets affected by a virus, fixing it would cost more-in terms of headache of losing files and not for the payment because it's easy to reformat and re-install Windows)

So I've recently installed Avira Free Antivirus on my laptop because I noticed strange symptoms on it:
  • Executing a file takes longer time than usual.
  • Mouse movement was laggy
  • Frequent software crashes
VIRUS ALERT! VIRUS ALERT! came to my  mind, So I've installed the antivirus and scanned my laptop. And there they were, 2 viruses and 3 malicious software. Freaking sneaky viruses.

My laptop seems better now and lost the symptoms mentioned above even though I didn't reformat it because I don't want to lose any files. I'm just going to believe that Avira removed the viruses. #tiwala

Friday, August 8, 2014

Phishing

August 6, 2014

"Phishing - a play on the word "fishing" - is an attempt to steal your password and private account info. Phishers can set up fake web sites that look like those of trusted companies like Yahoo to trick you into disclosing your user name and password."

Thanks to Yahoo! Mail, I discovered early what phishing does. The website allows an option to create a seal (either an image or text) that you should see to make sure you are on the legit Yahoo! site. And yes, it is still available until now.

Visit the website: https://protect.login.yahoo.com/

------------------------------------------------------------------------------------------------------------

Way back on 2005, Chris Putnam and two of his friends created a worm code that changed Facebook profiles look to MySpace profiles look and along the way deleted contact information of users. Since they've created a worm, it copies itself from profile to profile.

When Facebook received complaints and discovered Putnam was the creator, co-founder Dustin Moskovitz offered him a job and hired him. 

Visit: http://www.quora.com/Chris-Putnam-1/How-did-Chris-Putnam-get-hired-at-Facebook

Friday, August 1, 2014

Hacking

July  28, 2014

Last November, my mum was hacked on Twitter by a random person. He hacked a lot of Twitter accounts and made them follow his account, changed their cover photos, and tweeted to each account "Look how easy it is for me to hack your passwords!" My mum made me changed her password as soon as she discovered and told us (me and my sisters) to change ours also. Paranoid!

How did he get the passwords of 200+ people? I don't know how but I think it's awesome. Hahahaha, regardless of getting my mum's.


Oh and when I download cheats for some games that I play, they are also called "hacks". I just search on google "*insert name of game* hack", then if I'm lucky there will be legit results popping out. 
------------------------------------------------
As an IS student it is my job to prevent these types of events and to provide security but maybe I can also learn how to hack at the same time. Hehehe. I want to know my neighbors' wifi password so I can surf the net for free!!! 



Law and Order


"ACCESS NATION"

1.)    Tracking credit card transactions. (REAL)
Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting a court order, a new document released under a government sunshine request shows.

“Hotwatch” orders allow for real-time tracking of individuals in a criminal investigation via credit card companies, rental car agencies, calling cards, and even grocery store loyalty programs.
Sources:

2.)    Police can check phone call records history.  (REAL)
Police can get phone records without a warrant thanks to Smith v. Maryland, a Supreme Court ruling in 1979, which found that the Constitution's Fourth Amendment protection against unreasonable search and seizure doesn't apply to a list of phone numbers. The New York Times reported last week that the New York's police department "has quietly amassed a trove" of call records by routinely issuing subpoenas for them from phones that had been reported stolen. According to The Times, the records "could conceivably be used for any investigative purpose.
Sources:

3.)    Recover previous file versions.  (REAL)
On Windows and Mac, there is an option to restore previous versions of files.
“Previous versions are either copies of files and folders created by Windows Backup or copies of files and folders that Windows automatically saves as part of a restore point. You can use previous versions to restore files and folders that you accidentally modified or deleted, or that were damaged.”
The saved previous versions depend on the amount allotted for the backup. When the allotted storage becomes full, the computer deletes the oldest backup file and replaces it with a newer backup. 

I think this is how the tech got the original version of Rice’s file.
Sources:

4.)    Worm that can monitor and control other person’s computer. (REAL)
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

There is also a computer Trojan called RAT (Remote Access Trojan). It is usually transmitted through an executable file or in an email attachment. It is usually disguised as something desirable and harmless, such as a video game or other piece of software. It enables the hacker to control his computer’s victim from another location. The hacker can block the mouse and keyboard, delete, download, rename, and upload files, log keystrokes and get passwords, play sounds, open the DVD tray, edit the registry and many more.
Sources:
https://www.youtube.com/watch?v=xUlivXL1Y0Q (A demo of DarkComet a popular RAT)

5.)    Magic Lantern of the FBI. (REAL)
“Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation. Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on 20 November 2001 and by Ted Bridis of the Associated Press.”

Magic Lantern can reportedly be installed remotely, via an e-mail attachment or by exploiting common operating system vulnerabilities, unlike previous keystroke logger programs used by the FBI. It has been variously described as a virus and a Trojan horse. It is not known how the program might store or communicate the recorded keystrokes.
Sources:

6.)    Leaving a copy of a file when you delete it from a hard drive. (REAL)
Recycle Bin is not the end of the road for our files.
“When a file is deleted from your computer, its contents aren't immediately destroyed. Windows simply marks the hard drive space as being available for use by changing one character in the file table. If you manage to start an undelete process before Windows overwrites that part of hard disk with new files.”
Source:

7.)    Every e-mail we send contains a hidden header with our IP addresses. (REAL)
Each sender of an e-mail has an Internet Protocol (IP) address associated with their computer. While not every email address can be tracked, using the fields that are hidden from view by top email providers, it is possible to track many emails down to their area of origin.

Sources:

8.)    Cracking password-protected files. (REAL)
Password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password.
Sources:

9.)    Linking users with their IP addresses. (REAL for Law Enforcement)
Only the law enforcement with subpoenas can do this. They can obtain the name, address, telephone number, electronic mail address, Internet protocol address and local service provider identifier of a user.
For ordinary people like us,

Here's what you can do with an IP trace:
·         Determine the general area of the target's location (City/region, state, country).
·         Determine what ISP they use.

Here's what we cannot do with an IP trace:
·         Determine the target's home address.
·         Identify the computer that is assigned that IP address.
·         Determine the identity of the person using the computer at that IP address.

In the movie, Kinston said that he can link a person with an IP address. I think this part is not true.
Sources:

10.)  Internet Tracking (RFAL)
A growing number of websites are employing a stealthy new form of hard-to-block Internet tracking software that may pose increasing privacy risks for customers.
Canvas fingerprinting, which can command your browser to draw a unique identifier and then log your online behaviour, is nearly impossible to detect, does not fall under “do not track” voluntary systems and evades most conventional ad-blocking software. It is already tracking users on 5 per cent of the biggest sites on the Internet, including The White House, Starbucks, Re/Max Canada, Canadian retailers Metro and Home Hardware, Postmedia website Canada.com, as well as a number of pornography sites.
Any internet users who use or even read about privacy services online will be targeted for surveillance by the NSA, according to a new report from German broadcaster ARD.
According to leaked source-code of the US spy agency’s ‘XKeyscore’ software, individuals who search for information about anonymising services such as Tor have their IP addresses logged by the NSA and can be flagged for further monitoring.

*Woops, I searched TOR online. Maybe NSA is tracking me now.*
Sources:


11.)  Face recognition software (REAL)
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.
In the 2000 presidential election, the Mexican government employed facial recognition software to prevent voter fraud. Some individuals had been registering to vote under several different names, in an attempt to place multiple votes. By comparing new facial images to those already in the voter database, authorities were able to reduce duplicate registrations.
Facial recognition systems are used to unlock software on mobile devices. An independently developed Android Marketplace app called Visidon Applock makes use of the phone's built-in camera to take a picture of the user.

*This was mentioned at the last part of the episode*
Sources:
http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition.htm

Saturday, July 26, 2014

Bonus Post


The FIRST Seminar-ish: 

The ASES Summit Manila 2014 aims to promote student entrepreneurship, business innovation and global business networks amongst top international college students. The theme for this year’s international summit is: “social entrepreneurship in the world of tech startups.”

The event was kind of a Oral Defense. There were several groups (of different nationalities) who proposed business solutions with the help of technology to solve some of our problems here in the Philippines. Almost all of them said that there's a gap between our resources and technologies and they want to fill those "gaps" to fully utilize our resources. 

Bam Aquino (kind of, can't remember the exact words) said:
"If you're going to use the same solution to solve the same old problem, NOTHING will happen"

I like the proposal of the team One Up. They're going to make an application that will get Php 1.00 pledge from every donor and in return donate the money that they will collect to help children study. Even a small amount of donation can help and I guess if the donor wants to donate a larger amount, they can. 


 ------------------------------------------------------------------------------------------------------------
The SECOND Seminar: "It's a TechnoBusiness!"

The first speaker was Mr. Ronald Isip who works for a company called INDRA. He was showing a lot of flowcharts and stuff on his presentation (kind of hard to take in) but from what I gathered is that his company aims to make a large company turn world class through automation. He shared guides on how to properly manage a system and said that experience is a great factor in finding jobs in the future.

The second speaker was Mr. Julius Gorospe, the director of R&D in Samsung Philippines. He studied computer science then kind of shifted to management because he said that "Ang hirap naman pag nagproprogramming pa din kapag puti na ang buhok." Kind of struck me because it's true. Baka mapaaga ang retirement dahil sa stress sa programming. Sad. Lol.

What's funny though is that he uses an iPhone instead of a Samsung mobile. "Keep your friends close and your enemies CLOSER." Mwahahahaha.

He said that what was great about Samsung is that they can go with the flow - like produce gadgets that are "in"- in today's market. And that is why there are known for a lot of products - not just for smartphones.

*I was surprised to discover that SAMSUNG started out as a noodle corporation.*
Start of Mr. Gorospe's seminar
Q&A