Archive for June 13th, 2012
By: Corey Palmer
Since its birth 11 years ago, Drupal Content Management System has become the preferred choice of developers involved in website development. From a personal experimentation platform, Drupal development has expanded into full-blown open source software that is used by millions of developers across the planet. The fact that it is free to use and can be downloaded by anyone makes it all the more enticing. Yet these are not the only factors which make it a hit for web development. Its versatility and flexibility lets advanced level of configuration for website development.
Website development becomes much easy for Drupal developers because it gives the freedom for scaling and future growth. Its modular architecture gives way for scope adjustments and allows scaling, performance with minimum effort on coder’s part.
It provides more power to the administration. New user accounts and user permission are supported and admin can assign different roles depending on the websites’ functioning requirement. Also, its versatility is a boon for web development. Additionally, it is cross platform compatible and can work on any operating system. Also a number of themes and templates are available that facilitate the creation of look and feel of the website.
Website development works fairly well for all big and medium websites that involve heavy data and content management like community websites, social networking websites and websites related to sports, entertainment, government, and many others. The website which truly brought Drupal CMS into focus was whitehouse.gov. developers made the heavy content management on the website look like a cakewalk. Both these websites have extremely different requirements, yet it made their creation smooth and easy.
Additionally, developers can install convenient modules and few appearance that can be formed aloft easily by the administrator and also provide other associated websites that are not complicated or difficult to find or locate. The search engine enhancement is as well a major affair for many business and non-profit websites these days. The best cartage bearing has to be developed by the programmers and software supports of prominent Drupal development Company.
When you apply the Drupal developers for your services, these organizations not alone advance your websites, but they as well provide solutions for upgrading for a minor fee. Change can be done with plug-in extensions or even use new software to advance the look for better performance. Drupal development services are consistently accessible for every type of technical support and this is a milestone which required by every type of Drupal Development Company. Thus, search for company online to get best services for your Drupal development or Drupal web development services or solutions.
New Delhi: After a spate of attacks on a number of Indian websites and a ground protest event on June 9, that evoked lukewarm response, hactivist group Anonymous Operation India has chosen the Right to Information Act (RTI) as the latest tool in their battle against Internet censorship.
Anonymous India is urging Indian citizens to file RTI applications to seek information regarding the correspondence of public servants with Google, Facebook or other websites on content censorship. Anonymous India says they will collate the information and use it “in even more powerful ways.” But did not venture upon further details.
This phase called ‘Operation RTI Engaged’ is a part of many initiatives planned by the hacker collective in their effort to force the Government of India rethink its Internet censorship strategy.
Full text of Anonymous Operation India’s letter to the citizens of India
ANONYMOUS OPERATION INDIA
PHASE II – OPERATION RTI ENGAGED – #OpRTI
June 12, 2012
Dear Citizens of India,
We are Anonymous. We are engaged in a fight with your government to fight their evil schemes of gaining control of our internet. We will not allow this. We will not allow those who do not understand the internet to mangle our rights in their futile attempts at the impossible. Content on the internet cannot be wiped out for those who want to see it and content on the internet must not be made to fit the idea of agreeable for a few powerful people.
People of India, we have been watching. We have been noting the perversion of freedoms to the point where barriers are increasingly restrictive. The politicians whose websites are primitive for the previous decade are deciding from their ignorant perches how the internet of today must be. Their lack of understanding of how content is shared, spread or accessed on the internet makes their restrictive plans ridiculous for any criminal who actually would want to bypass those restrictions, while they serve to keep the common man ignorant of anything they do not wish them to know.It is time to expose this ignorant intolerance for what it is.
It is time to expose the kinds of blocks on free expression that our leaders have silently constructed and to hold them accountable for their subversive attempts at spreading intolerance and disinformation, while suppressing information that shows themselves in bad light.
It is time for a new phase in Operation India. And in this, we need your help.
It has come to our attention that beyond the draconian laws that let orders be obtained from courts to silence parts of the internet, beyond the anti-freedom IT Rules that allow anyone to censor the internet for any reason, there are people in powerful places sending orders to websites to censor content of their own wish. While our laws are increasingly shaped to silence people, the actions of these people are beyond such unconstitutional laws too. They are not legal requests, but ones made at will using their influence to force compliance.
We will be unraveling all anti-free-speech actions in due time, and the step for now is to file RTI applications for the correspondence of every public servant to obtain all records of communication with Google, Facebook or any other websites with respect to censoring content. This should be done in creative ways to obtain the most information. Ask for all communication to google.com or other creative questions like other email addresses used by a public servant if they do not use their official addresses, which is one way of avoiding them being recorded as documents in their official capacity.
These RTI applications should be filed for any public figure you can think of. After you have filed the RTI, you should inform us about it, so that we can maintain a list to make sure efforts are not duplicated and each effort makes a significant contribution. When you receive the documents from the RTI reply, we will make them public. Stay tuned for the next phase of our operation, which will use these documents in even more powerful ways.
We see it. We are watching.
We are Anonymous.
We are legion.
We do not forgive those who would steal our voice and ears.
We do not forget the betrayals of those who should serve us.
The government should expect us.
With names like “LulzSec Reborn,” “MalSec,” and “SpexSec,” hacking groups are cropping up in the wake of LulzSec arrests and Anonymous dissatisfaction.
It’s been three months since the arrest of a handful of people accused of conducting denial-of-service and other attacks on police and corporate networks as part of the notorious LulzSec hacking crew.
Yet rather than laying low following the arrests, hacker activists are still going strong and, in fact, regrouping, taking up the baton from the Lulz crew or citing dissatisfaction with the schizophrenic nature of all the various Anonymous operations. Suddenly, there is “LulzSec Reborn,” “MalSec,” and “SpexSec,” fresh names for groups of malicious hackers using old techniques.
It’s unknown if they are legitimate splinter groups with members of the old guard taking charge in a new direction, the way LulzSec was a spinoff of Anonymous. Or they could also just be wannabes hoping to exploit the maverick LulzSec name. On the Internet, no one knows you are a dog, especially if you call yourself “Anonymous.”
“In our eyes, LulzSec is a disposable and reusable brand. Anyone within Anonymous can selectively pick it up or drop it as they need,” said Brian Martin, founder of the Attrition.org security site that’s better known by the handle “Jericho.” “By doing so, they cash in on the name recognition, and specific actions that may not be affiliated with Anonymous can be done under this banner.”
This weekend, someone using the “LulzSec Reborn” name and the LulzSec Love Boat ASCII graphic took credit for hacking TweetGIF, which allows people to share animated GIFs on Twitter. The group had claimed credit for hacking a military dating site back in March.
A group calling itself “SpexSec” posted on Pastebin this week the passwords and visa information of more than 200 suspected terrorists following the release of names, Social Security numbers, and birthdates of thousands of Tennessee residents earlier. Death and Taxes Magazine reports that SpexSec is comprised of two members of TeaMpoisoN, which collaborated with Anonymous on Operation Robin Hood last year. Scotland Yard claimed to have arrested several suspected members of TeaMpoisoN, which the group has denied.
And in April, a group called “MalSec,” for “Malicious Security,” released a video in the vein of Anonymous announcing its debut and discussing its differences with factions of Anonymous.
This is the nature of hacking groups and large collectives of people who may agree on one cause and technique but not on others. They last awhile before they break up and form together in different bands, until those groups get arrested or go their own way.
Anonymous members leave the hive “if there is no organizing principle, if they grow frustrated that they are not having enough impact or are not satisfied with their investment of time or they’re sick of trolling,” said Josh Corman, director of security intelligence for Akamai who has been studying the hackers. “They’ll do one really noble, principled Op and that same week there will be three or four aggressive ops that damage the brand.”
Gabrielle Coleman, Wolfe Chair in Scientific and Technological Literacy at the Department of Art History & Communication Studies at McGill University in Quebec, believes LulzSec Reborn is LulzSec in name only. “I am almost 100 percent [certain] that the Antisec/LulzSec guys have nothing to do with the LSR [LulzSec Reborn] and in fact there is still a small crew of antisec/lulzsec guys in existence,” she said in an e-mail.
With Anonymous, the family tree gets pretty complicated. For instance, the Anonymous team in the UK probably overlapped with Anti-Sec, according to Coleman. “Then Cab1n Cr3w was well and alive and kicking for a long time through that period (though they were also sort of making fun of Anti-sec). They did disband after all the arrests and rumors of informants have skyrocketed.”
The sheer size and diversity of Anonymous participants ensures steady turnover. MalSec appears to have formed out of a desire by some Anons to distance themselves from the more erratic acts of some of their brethren.
MalSec has new methods and ideas. We have witnessed aggressive hacks that included, the general public getting attacked, and credit card information being stolen,” the MalSec video says. “We also have witnessed Anonymous supporters harming each other within the collective. Do you not see that this is a tactic to divide us and make us lose sight of our goals, of what is truly important? We cannot sit by idly and watch as our values are ripped away and disgraced. This is ineffective and counterproductive to achieving our goal. We do not wish to take from the people, or to harm them, but rather to empower them.”
What the crew does not say is who their targets will be. I’m sure we’ll find out soon enough.
NEW DELHI: Nokia on Wednesday launched its much-awaited cameraphone 808 Pureview in India. It will be sold at a ‘Best Buy price’ of Rs 33,000.
The smartphone has a four-inch wide screen and runs on Symbian Belle. It boasts of 41 MP sensor and the most advanced imaging innovation featuring Nokia’s award-winning PureView technology and Carl Zeiss optics.
Nokia has a tie-up with Dolby Laboratories that has helped it introduce a rich cinematic sound output in 808 PureView which features both Dolby Digital Plus and Dolby Headphones technology. In addition, Nokia is bundling a Dolby Headphone with PureView 808.
Besides, Pureview has two microphones that capture a near perfect sound recording to make the videos with rich CD-like audio recording enabled by Nokia Rich Recording, earlier only possible with external microphones.
Above all, its new pixel oversampling technology, superior low-light performance and the ability to save in compact file sizes for sharing in email, MMS, and on social networks, the Nokia 808 PureView promises the users to capture high-quality images in any conditions. PureView also has full HD 1080p video recording and playback with 4X lossless zoom.
Significantly, a software upgrade promised by Nokia with the latest Belle feature pack software upgrade for its other smartphones will add cinematic 5.1 Dolby surround sound for better music and movies experience to handsets like Nokia 700, 701 and Nokia 603.
With Dolby technologies in its smartphones, Nokia claims to turn them into devices which can deliver high-definition (HD) content with Dolby Digital Plus 5.1-channel surround sound to HDTVs, audio/video receivers, and home theater systems.
PureView 808 comes in only black and white colours and will be available across Nokia retail outlets starting Thursday with an MRP of Rs 33,899. It is powered by a single core 1.3Ghz microprocessor which seems inadequate but according to Nokia, the phone has another processor dedicated to the camera function, thus ensuring a reasonably good performance. It has a 16GB internal storage, expendable up to 32GB with a microSD card. The RAM seems rather low at 512MB.
Speaking at the launch, Vipul Mehrotra, director and head of smart devices, Nokia India said, “Nokia has always been known for its imaging legacy. What started off with a simple objective to create the most advanced imaging device, the Nokia 808 PureView has evolved into something extremely revolutionary.”
SAN FRANCISCO: Amazon on Tuesday released its music player app for iPhone and iPod touch, a move that expands the reach of the Internet retail giant for Apple users.
The Cloud Player app allows customers to stream or download music stored in Amazon accounts to the iPhone or iPod touch, play music that is already stored on their device, and manage or create playlists.
Amazon, a big rival to Apple’s iTunes, will not be selling music through the app but will allow its customers to manage and listen on Apple hardware.
“Customers tell us that they want access to all of their music, wherever they are, and on all of the devices they use,” said Steve Boom, vice president of digital music for Amazon.
“By bringing Cloud Player to iPhone and iPod touch, we now have the most widely compatible cloud playback solution available, giving our customers the ability to buy once and enjoy their music everywhere.”
Amazon is also selling its own tablet computer, the Kindle Fire, in a challenge to the market-leading iPad from Apple. But Kindle sales are believed to be slipping after a sales surge last year, according to analysts. Amazon does not provide sales data for the Kindle.
Some reports say Amazon is readying an expansion of its app store to more international markets and the Android platform in a more direct challenge to Apple and Google.
The majority of people recognize the benefits of a regular exercise routine and healthy eating. This is why so many people have gym memberships and follow the latest diet fads. But even if you start a workout routine, you may stop this routine after a few weeks or months. That’s because most exercise regimens are boring or take too much time. Between work, family and other responsibilities, busy people don’t always have time to hit the gym before or after work.
You need a convenient and simple way to stay in shape, and if you have one of the latest video game systems in your house, an easy fitness program is at your fingertips. Practically every gaming system has at least one fitness game designed to make exercising fun and enjoyable.
Here is a list of the top four fitness games to keep you in shape.
Your Shape: Fitness Evolved
Xbox 360 with Kinect
This interactive fitness game invites you to enter your age, weight and current exercise routine. With the Kinect controller in hand, this game evaluates your body size and then tailors each workout to help you meet your fitness goals. This fitness game offer more than one type of workout. There are cardio workouts, as well as workouts to strengthen and tone your muscles. The workouts are simple and easy-to-follow, but your interactive instructor is there to help if you fail to complete the movements as instructed.
EA Sports Active 2
This is a fun and easy interactive fitness game that you can complete in your own living room. This game comes with wireless sensors and a resistance band. The menu features a long list of available workouts, and you can select a workout based on your fitness level. Perfect for busy people, you can choose a workout as short as 20 minutes or a workout that lasts a full hour. Plus, you can customize your workouts and design a program that you’re comfortable with. This fitness game offers a combination of circuit training, lower body training, cardio and upper body training. And the best part, the game keeps tracks of the amount of calories that you burn.
Wii Fit Plus With Balance Board
Whether you’re looking to shed extra pounds or increase your level of physical activity, this fitness game is perfect if you don’t have a lot of time to exercise. Choose from a list of 20, 30 or 40-minute preset routines or create your own custom routine. The balance board keeps track of your weight and body mass index, and the game keeps an estimate of your calories burned. With more than 40 varieties of fitness activities, this game is ideal for the entire family.
This fast-paced, calorie-burning workout is perfect if you want to dance yourself thin. Be prepared to have fun and sweat off the inches. This workout features nine types of dance styles, such as salsa, reggaeton and the mambo. The upbeat music encourages movement, and it’s the ideal choice if you’re hosting a fitness party. The latin-inspired dance moves offer an excellent cardio workout, and the movements are designed to work and tone different areas of the body, such as the legs, thighs, arms and abdomen.
Staying in shape can be fun, but it can also help lower the cost of your life insurance. Find out more about how you can pay less for term-life insurance at the Term-Life Insurance blog.
Websites will be legally obliged to provide victims with the identity of people who post abusive and defamatory online messages about them under plans by the Government.
Major reforms of the libel laws will also see internet service providers (ISPs) given greater protection from being sued if they help to identify so-called trolls.
Would-be claimants will have to show they have suffered serious harm to their reputations, or are likely to do so, before they can take a defamation case forward.
:: Read More On Trolling And Changes To The Law
It comes after a mother who was targeted by online trolls won backing from the High Court to have her tormentors’ identities disclosed.
Nicola Brookes faced “vicious and depraved” abuse on Facebook after she posted a comment supporting former X Factor contestant Frankie Cocozza when he left the show last year.
It needs to be a criminal offence, there needs to be legislation covering cyber-bullying. It’s no good with civil lawsuits… They’re unrealistic.
Scott Freeman, whose daughter became a victim of online trolls
The Defamation Bill was debated in the House of Commons on Tuesday.
Sky News political correspondent Glen Oglaza said the reforms have widespread support across the parties, so the Bill should make its progress through Parliament pretty quickly.
“What they’re saying is, enough is enough of this cyber-bullying and abuse that’s going on, on websites like Twitter and Facebook,” he said.
“It’s a difficult position because although in theory Facebook and Twitter are the publishers in a way that books and newspapers, and for that matter television companies are, they don’t have the same amount of control over what appears and therefore, it’s more difficult to prosecute them and sue them for libel because in some ways, they’re not responsible.”
The power to ask for anonymous identities to be revealed are intended to give individuals an avenue of redress should they be subject to defamatory comments online.
The idea is to enable people to approach ‘offenders’ and seek out-of-court settlements or other mediated resolutions.
But Scott Freeman, who set up the charity Cybersmile when his daughter became a victim of trolls, said these reforms do not go far enough.
“It needs to be a criminal offence, there needs to be legislation covering cyber-bullying. It’s no good with civil lawsuits,” he told Sky News.
“It needs to be addressed. It’s one in three children now throughout the UK [who experience cyber-bullying], and it’s affecting adults. It’s terrible and civil lawsuits are not enough. They’re unrealistic.”
Justice Secretary Ken Clarke said the Government wants a libel regime for the internet that makes it possible for people to protect their reputations but also ensures that information online cannot be easily censored.
“As the law stands, individuals can be the subject of scurrilous rumour and allegation on the web with little meaningful remedy against the person responsible,” he said.
“Website operators are in principle liable as publishers for everything that appears on their sites, even though the content is often determined by users.
“But most operators are not in a position to know whether the material posted is defamatory or not and very often – faced with a complaint – they will immediately remove material.
“Our proposed approach will mean that website operators have a defence against libel as long as they comply with a procedure to help identify the authors of allegedly defamatory material.”
He added: “It will be very important to ensure that these measures do not inadvertently expose genuine whistleblowers, and we are committed to getting the detail right to minimise this risk.”
Frank Zimmerman narrowly escaped jail when a judge suspended a 26-week prison sentence for two years after he sent a threatening email to Conservative MP Louise Mensch.
The 60-year-old posed as a member of online hacking group Anonymous and sent the mother-of-three an email telling her she would have to choose which one of her children would die.
In another case, 21-year-old student Liam Stacey, from Pontypridd in South Wales, was jailed for 56 days for mocking Bolton footballer Fabrice Muamba on Twitter after he collapsed with a heart attack.
The Bill will also replace the common law defences of justification and fair comment with new statutory defences of truth and honest opinion.
The so-called Reynolds defence of responsible journalism published in the public interest also gets statutory recognition, as responsible publication on a matter of public interest.
IT peripherals maker Amkette today launched a new device ‘EvoTV’ priced at Rs 9,995, which will allow users to surf Internet on their television sets in the same way they do on their computers.
The company is betting big on the device and expects as much as 50 per cent of its revenues to come from the product.
Similar to Apple TV, EvoTV is a digital media device which allows users to access content like videos, games and websites using WiFi and broadband connection. It comes with a remote that acts like a mouse and has a mic to facilitate conversations on VoIP (like Skype).
“We are aiming at 70-75 per cent growth in revenues with this product. In the fiscal ended March, we had revenue of Rs 80 crore… This year, we expect EvoTV to contribute about 50 per cent of our revenues,” Amkette Chief Executive Officer Rajiv K Bapna told reporters.
The Android operating system-based device will be available by June-end in Delhi (and NCR), Mumbai, Bangalore and Kolkata, and will be launched in 40 cities by the end of August this year.
“With EvoTV, we plan to revolutionalise the future of television globally. The Internet experience should not be limited to just PCs. Using this, users will be able to access games and content like videos, just like they would on a PC,” Bapna said.
Google, which operates the Android platform, also plans to launch its set-top box ‘Google TV’ to allow viewers to use their device both for television viewing as well as accessing the Internet simultaneously without adjusting any cables.
The company also plans to export the device to Middle East, Europe and North America in the next three months, he said.
Once known for its floppy drives, Amkette’s current product range includes wireless keyboards, flash storage and audio peripherals.
The device is powered by twin ARM processors and comes preloaded with basic applications. Users can also download more apps from the Android application market – Google Play.
“The device has been conceptualised, researched and designed in India (Bangalore and Delhi) and took 14 months in the making,” Bapna said, adding that it will be manufactured in China.
NEW DELHI: Computing giant HP today launched a new deduplication solution which will help companies save storage space as well as protect data from security breaches.
The solutions will allow organisations to create faster backup of their data as well as recovery.
“HP offers solutions in the mid range to high end enabling organisations to maximise the value from their information in the most efficient way possible,” HP India Vice President, Enterprise Group Som Satsangi said.
WASHINGTON: The Flame computer virus which has been raging in the Middle East has strong links to Stuxnet, a malware program widely believed to have been developed by the United States or Israel, a security firm said Monday.
Kaspersky, the Russian computer security firm credited with discovering Flame last month, said its research shows the two programs share certain portions of code, suggesting some ties between two separate groups of programmers.
Kaspersky researcher Alexander Gostev said in a blog post that a first examination made it appear the two programs were unrelated.
“But it turns out we were wrong,” he wrote. “Our research unearthed some previously unknown facts that completely transform the current view of how Stuxnet was created and its link with Flame.”
Gostev said Flame, even though it was discovered just recently, appears to predate Stuxnet, which was created in 2009.
“By the time Stuxnet was created (in January-June 2009), the Flame platform was already in existence (we currently date its creation to no later than summer 2008) and already had modular structure,” he said.
“The Stuxnet code of 2009 used a module built on the Flame platform, probably created specifically to operate as part of Stuxnet.”
This, he said, points to the existence of “two independent developer teams… (each) developing its own platform since 2007-2008 at the latest.”
Kaspersky, one of the world’s biggest producers of anti-virus software, said the Flame virus was “about 20 times larger than Stuxnet,” the worm which was discovered in June 2010 and used against the Iranian nuclear program.
High concentrations of computers compromised by Flame were also found in Lebanon, the West Bank and Hungary. Additional infections have been reported in Austria, Russia, Hong Kong and the United Arab Emirates.
Compromised computers included many being used from home connections, according to security researchers who were looking into whether reports of infections in some places resulted from workers using laptops while traveling.
Stuxnet was designed to attack computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.
Most Stuxnet infections have been discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there. The worm was crafted to recognize the system it was to attack.
Some reports say US and Israeli intelligence services collaborated to develop the computer worm to sabotage Iran’s efforts to make a nuclear bomb.
Johannes Ullrich, a researcher at the Washington-based SANS Technology Institute, said the relationship between the two viruses remains unclear.
“Flame did initially appear very different, and I still think it wasn’t written by the same group or individual that wrote Stuxnet,” Ullrich told AFP.
“However, this doesn’t mean that the two groups didn’t coordinate or share code with each other. I do think this may have been the case with Stuxnet and Flame… the code could have been written by two different contractors who worked for the same government and as a result had access to each other’s resources.”