Saturday, 8 October 2011

Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.


Drones have become America’s tool of choice in both its conventional and shadow wars, allowing U.S. forces to attack targets and spy on its foes without risking American lives. Since President Obama assumed office, a fleet of approximately 30 CIA-directed drones have hit targets in Pakistan more than 230 times; all told, these drones have killed more than 2,000 suspected militants and civilians, according to the Washington Post. More than 150 additional Predator and Reaper drones, under U.S. Air Force control, watch over the fighting in Afghanistan and Iraq. American military drones struck 92 times in Libya between mid-April and late August. And late last month, an American drone killed top terrorist Anwar al-Awlaki — part of an escalating unmanned air assault in the Horn of Africa and southern Arabian peninsula.

But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.

The lion’s share of U.S. drone missions are flown by Air Force pilots stationed at Creech, a tiny outpost in the barren Nevada desert, 20 miles north of a state prison and adjacent to a one-story casino. In a nondescript building, down a largely unmarked hallway, is a series of rooms, each with a rack of servers and a “ground control station,” or GCS. There, a drone pilot and a sensor operator sit in their flight suits in front of a series of screens. In the pilot’s hand is the joystick, guiding the drone as it soars above Afghanistan, Iraq, or some other battlefield.

Some of the GCSs are classified secret, and used for conventional warzone surveillance duty. The GCSs handling more exotic operations are top secret. None of the remote cockpits are supposed to be connected to the public internet. Which means they are supposed to be largely immune to viruses and other network security threats.

But time and time again, the so-called “air gaps” between classified and public networks have been bridged, largely through the use of discs and removable drives. In late 2008, for example, the drives helped introduce the agent.btz worm to hundreds of thousands of Defense Department computers. The Pentagon is still disinfecting machines, three years later.

Use of the drives is now severely restricted throughout the military. But the base at Creech was one of the exceptions, until the virus hit. Predator and Reaper crews use removable hard drives to load map updates and transport mission videos from one computer to another. The virus is believed to have spread through these removable drives. Drone units at other Air Force bases worldwide have now been ordered to stop their use.

In the meantime, technicians at Creech are trying to get the virus off the GCS machines. It has not been easy. At first, they followed removal instructions posted on the website of the Kaspersky security firm. “But the virus kept coming back,” a source familiar with the infection says. Eventually, the technicians had to use a software tool called BCWipe to completely erase the GCS’ internal hard drives. “That meant rebuilding them from scratch” — a time-consuming effort.

The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”

However, insiders say that senior officers at Creech are being briefed daily on the virus.

“It’s getting a lot of attention,” the source says. “But no one’s panicking. Yet.”

Samsung Galaxy Nexus full specs revealed; Verizon Wireless exclusive

Well, now that Apple has announced the iPhone 4S, there’s only one other flagship on the horizon that people are eagerly anticipating and that’s the Samsung Galaxy Nexus. Codenamed “Nexus Prime,” the Galaxy Nexus is a phone we have scooped on numerous occasions, and now we can paint a complete picture of the device thanks to new information from a trusted source. Here’s what Samsung and Google will unveil next Tuesday:

  • Android 4.0 Ice Cream Sandwich
  • 9mm thin
  • 4.65-inch 1280 x 720-pixel Super AMOLED HD with curved glass
  • TI OMAP 4460 dual-core Cortex A9 processor clocked at 1.2GHz
  • 1GB of RAM
  • 32GB of built-in storage
  • 5-megapixel camera on the back, 1.3-megapixel in the front
  • 1080p HD video capture support
  • LTE/HSPA depending on carrier
  • Wi-Fi a/b/g/n
  • NFC
  • 1,750 mAh battery
It is confirmed that the Samsung Galaxy Nexus will be a pure Google Experience device without any third-party UI or modifications, so no TouchWiz on this one, guys. Also, one notable feature of Ice Cream Sandwich? The ability to monitor each app’s data usage on the device. Lastly, we’re still hearing that the Galaxy Nexus will be a Verizon Wireless exclusive here in the U.S., so it’s time to check out those contract end-dates if you’re on another carrier and you plan to scoop up the latest pure Google smartphone.

Monday, 12 September 2011

Dexpot 1.5.13

Want different workspaces in windows . Try this . This software named Dexpot can turn your desktop screen into up to 20 in number. It creates upto 20 additional workspaces that can be quickly switched between.For instance, you can use Desktop 1 to listen to your favourite music or you can surf the web on Desktop 2 - the second workspace, use Desktop 3 to handle your daily word processing
You can even configure wallpapers, different icons, start-ups, and more can be configured for each desktop workspace.
Users who own tablets or netbooks and Ultra-Mobile PC which come with small screens and low resolutions will surely benefit from this software as well. Go to the download page.

Wednesday, 24 August 2011

Introducing the all new Nokia 600,700 and 701

First the 600, sporting a 1Ghz CPU along with a 3.2-inch nHD display, 5MP auto-focus camera with LED flash and 720p video recording, FM transmitter ,NFC(Near Field Communication), 2 gigs of internal storage, FM radio with an internal antenna, rumors indicate 15 hours of talk-time on GSM, is the cheapest of the lot and comes with a price tag of approximately 12,500/- rupees.

Next is the Nokia 700, also sporting a 1Ghz processor with a 3.2-inch AMOLED "ClearBlack" display technology with Gorilla Glass, NFC(Near Field Communication),the same 5MP auto-focus camera, penta-band 3G radio.The 700 has a relatively poor talk-time of  7.3 hours; available in five different colors, the price tag of this baby is around 18,000/- rupees. Nokia claims this to be the world's most compact touchscreen monoblock.

Finally, the Nokia 701,featuring a 3.5 inch IPS LCD screen with "ClearBlack" claims to be the brightest mobile phone display.The 701 has the same 1 Ghz CPU, NFC(Near Field Communication),8MP auto-focus camera with dual LED flash, penta-band 3G radio and a front facing camera.It comes in four colors , and offers a whopping 17 hours of talk time on GSM.This comes with a price tag of 20,000/- rupees.


Sunday, 21 August 2011

Google trick - Watch google flying

Ever seen google logo flying....
if not here's another amazing trick you can perform with google.
Go to google.com
In the search bar type google loco
click on i'm feeling lucky and see what happens

Google trick - google h4x0r

Want to turn google into the form shown in the picture...
Play with google - the google h4x0r trick...........
3 easy steps and you are done playing with google..
1. go to google.com
2. type google l33t in the search bar.
3. press i'm feeling lucky.

you are done now...check out the new google h4x0r look.

Google trick - elgoog - google mirror

Wanna play with google..... Here we are to help you..
This is a very simple google trick to reverse the order of every text appearing on the google homepage. Even the text you type will be in the reverse order. The results of your search will also appear in the same way!
To do this...you simply need to go to elgoog.im and start reverse searching on the site........
Keep checking for more google tricks...

Monday, 15 August 2011

Google planning to buy Motorola

Breaking news just in - Google is planning to buy the Motorola handset division for around $12.5 billion. Thus google is soon going to make its presence in the hardware market. According to the press release, the acquisition of motorola mobility (dedicated android partner) , will enable google to enhance the competition in mobile computing and technology . Google will run motorola mobility as a separate business. HTC, Samsung, Sony, LG and Nokia will now have to gear-up to face a stiff competitor in the mobile market.

Child Lock for Windows mouse and keyboard

You may have realized that accidental key presses can sometimes prove to be a big problem for you, especially when kids are after your PC trying to play with keyboard and mouse. The problem becomes bigger, when you leave your system for a few minutes. Unwanted key presses may lead to deletion of your files or even windows. To prevent this from happening, you may use the default Windows lock feature.But this features, locks your system bringing you to the log-on screen and you need to this manually every time. The alternative to this is Child Lock. This freeware provides a handfull of options for locking your keyboard and mouse.This locks the keyboard and mouse automatically after it realizes that there has been no activity on the system for the past 10 minutes. You can even lock the keyboard and mouse using Child Lock manually. 

Sunday, 14 August 2011

Malwarebytes Anti-Malware

Hmm.. so wondering you are safe with only an anti-virus running? No, you are not , this small add-on in addition to your anti-virus is all you need! This surprising small utility can detect many un-wanted stuff on your personal computer. It supports multiple drive scans, context menu integration, a nice log for all the scans done. This is completely hassle free interface , it comes in two variants free and paid. The paid one has on demand protection which is not necessary as your anti-virus does this job. So grab the free one; update the malware definitions, do a full scan and breathe easy.

Get your download here.