Friday, February 15, 2008

Spoofing

In the 19th century, British comedian Arthur Roberts invented a game called Spoof, which involved trickery and nonsense. This gave the English speaking world a new word that today symbolizes a gamut of hacking technologies. Spoofing attacks primarily include
· Email spoofing
· SMS spoofing
· IP spoofing
· Web spoofing.
Spoofing attacks are used to trick people into divulging confidential information (e.g. credit card data) or doing something that they would usually not do (e.g. installing malicious software on their own computers). Such use of spoofing attacks is commonly referred to as Phishing.

Email Spoofing:-
Sending an e-mail from somebody else’s e-mail ID is the simplest form of Email spoofing. Innumerable tools exist on the Internet which can easily be used to send e-mails appearing to have been sent by somebody else. The effects are intense
For example let us suppose a case.
Customers of any bank, say ABC Bank, receives an e-mail from the bank asking them to verify their usernames and passwords for bank records. The email is spoofed, but thousands of customers clicks the link and sign in with their information. Certainly their accounts will be hacked.

SMS Spoofing:-
Sending an SMS to anywhere using a particular (or concerned) person mobile number.
For instance, a young lady receives an SMS from her husband’s cell phone informing her that he had had an accident and is at the hospital and urgently need money. On receiving the SMS, she rushes out of the house with the money. She is attacked and robbed by the person who had sent her the spoofed SMS.

IP Spoofing:-
An IP address is the primary identification of a computer connected to a network (e.g. the Internet). A criminal usually uses IP spoofing to bypass IP based authentication or to mislead investigators by leaving a trail of false evidence.
IP spoofing can be accomplished using proxy servers and simple PHP scripts that are readily and freely available online.

Web spoofing:-
When you sit at a computer, open up a browser and type in www.google.com, you expect to reach the correct website (and most often you do!). This is because of the domain name system which converts human readable domain names such as www.google.com into computer readable IP addresses like 178.65.XX.YY. etc

Conclusion:-
Viewing the lots of dangerous effects that spoofing can cause for, I think:
“Spoofing should be the part of Pakistan’s cyber crime law”.

Thursday, February 7, 2008

Future of Ideas

The Internet revolution has come. Some say it has gone. What was responsible for its birth? Who is responsible for its demise?
In The Future of Ideas, Lawrence Lessig explains how the Internet revolution has produced a counterrevolution of devastating power and effect. The explosion of innovation we have seen in the environment of the Internet was not conjured from some new, previously unimagined technological magic; instead, it came from an ideal as old as the nation. Creativity flourished there because the Internet protected an innovation commons. The Internet’s very design built a neutral platform upon which the widest range of creators could experiment. The legal architecture surrounding it protected this free space so that culture and information–the ideas of our era–could flow freely and inspire an unprecedented breadth of expression. But this structural design is changing–both legally and technically.
This shift will destroy the opportunities for creativity and innovation that the Internet originally engendered. The cultural dinosaurs of our recent past are moving to quickly remake cyberspace so that they can better protect their interests against the future. Powerful conglomerates are swiftly using both law and technology to "tame" the Internet, transforming it from an open forum for ideas into nothing more than cable television on speed. Innovation, once again, will be directed from the top down, increasingly controlled by owners of the networks, holders of the largest patent portfolios, and, most invidiously, hoarders of copyrights.
The choice Lawrence Lessig presents is not between progress and the status quo. It is between progress and a new Dark Ages, in which our capacity to create is confined by an architecture of control and a society more perfectly monitored and filtered than any before in history. Important avenues of thought and free expression will increasingly be closed off. The door to a future of ideas is being shut just as technology makes an extraordinary future possible.
With an uncanny blend of knowledge, insight, and eloquence, Lawrence Lessig has written a profoundly important guide to the care and feeding of innovation in a connected world. Whether it proves to be a road map or an elegy is up to us.