Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 164

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 167

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 170

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 173

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 176

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 178

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 180

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 202

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 206

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 224

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 225

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 227

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 56

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 49
04 | February | 2012 | Certified Ethical Hackers Security Analyst Malware Hacking Information
From the daily archives: Saturday, February 4, 2012

Keys help in controlling access to a car and keep them safe from thieves. Car theft has become very common in recent times and car owners must take adequate care of their vehicles to keep it safe. This article will help you with understanding the benefits of using transponder keys for your car.

When cars were first manufactured, technology advancement in the field of automobile was in its nascent stages and car doors were designed based on a simple lock and key function. This made it easy for car thieves to break into cars and short circuit ignition and drive away. Car owners felt the need to have advanced technology to be able to fight the prying eyes of car thieves. Also children and other trouble makers would often make scratches on car resulting in disfigurement of car. This too increased the need for a method to maintain safety of cars.

Most modern cars are well equipped to deal with meddlers and are tamper proof. Instead of a mere lock and key mechanism, modern cars are designed with features like auto lock that works through the exchange of radio waves. Lodged in the remote is a fob which acts as a transmitter and emits radio waves of a specific wave length which is received by a receiver located in the car. These frequencies are encrypted and this prevents miscreants from hacking into the frequency. Only when a specific wave length along with a numeric sequence which is simultaneously generated in the receiver is transmitted does the receiver accept the signal and the car door is opened or locked as per the command. Since radio waves are used, locking and unlocking of doors can be done from several feet away and is easy for car owners.

An alarm is linked to the lock mechanism and gets triggered on unauthorized or forced opening of the door. A loud beeping noise along with flashing of the car lights is the alarm that helps in keeping thieves and miscreants at bay.

Another technological innovation is the transponder key which too works on the exchange of radio waves and helps in keeping the door secure. When the key is inserted exchange of transmission takes place and this results in the door being unlocked. There is no carving or edging on these keys unlike traditional keys and thus these keys cannot be copied and remade. Complex transmission mechanism is used which is very difficult to crack and keeps the car secure. Such transponder keys are made specifically for each car and hence even if someone else owns the same make and model of car their key will be ineffective on your car. Transponder keys are also used for ignition in cars and this technology makes sure that only the owner and the person who has the key is able to drive the car.

Article source: http://www.articlesnatch.com/Article/Transponder-Keys-For-Your-Car/3626437

In recent years the certified ethical hacker program has taken off and grown in popularity. I have been a certified ethical hacker for about 5 years now and I have had many people ask me exactly what it means to be “ethical” in hacking. Previously before joining the good guys side and “ethical” side of hacking I conducted penetration tests and DDoS testing for many private companies, mostly hosting and shell providers. The difference then and now is how I conduct myself and the methods that I use to make sure I am not violating anyones privacy or stepping into the illegal or gray areas of the law.

One of my concerns in the security world today is the never ending and virtually unstoppable problem of DDoS attacks. For instance there is no real way that an “ETHICAL” hacker can conduct a true and powerful DDoS test against a network. Yes, I know there are many companies out there that claim they can simulate a DDoS attack but rest assured they cannot test for a true real world “in the wild” DDoS attack. For one thing they don’t have access to the 0day DDoS tools that are used on the underground and secondly they simply cannot afford to purchase enough bandwidth to launch a massive DDoS attack. Such attacks in the real world from groups like Anonymous use literally thousands of high bandwidth *nix network servers from around the world and may have as many as a hundred thousand windows based slower connection trojaned computers, mostly which traverse firewalls and connect clients to IRC channels as to avoid leaving traces on the victims computer.

These real world DDoS attacks could potentially generate as much as a petabyte a second of bandwidth at a target or the uplink which will knock any connection offline. An old friend of mine “mafiaboy” tried to prove his point to the world that we need to do something about this problem and that DDoS attacks are unstoppable when he took down eBay, Amazon and VISA at the same time costing millions of dollars in damage and eventually putting him in jail.

So the real question and point of this post is, how to we as security experts, administrators, consultants, workers, etc approach DDoS protection when we cannot legally have our servers tested against a large scale attack? I know unethically I could go and root a thousand servers and test a DDoS attack using their bandwidth but that is not ethical and now as an adult I see that it is completely wrong and misguided.

Please let me know your thoughts and opinions on the matter…

 
Set your Twitter account name in your settings to use the TwitterBar Section.