الثلاثاء، 17 يونيو 2008

!CYBERCRIME- REVENGE

SO HOW IS THE REVENGE??

I think the revenge the best way for expressing about our anger feelings, because we explored but did not prevented, prevented and did not revenged, so when we knew more it’s easily to understand HOW IS THE REVENGE??

By using some programs we can do it:      
            Steganos Internet Security Prog
            (For browsing as a Ghost where nobody can track you)
It is very important to protect our personal information contained in the computer.
This unique program helps to protect our system from malicious attacks, viruses, spyware and repelled the attacks on our computer, also this program used for deleting all shooting during the browsing on the web.
This program is updated periodically and continuously to respond for the latest viruses,spyeware and the program is able to monitor all chat programs while receiving files and discovers all P2P file-sharing programs that may contain viruses & serious Trojans cause our computer to a complete collapse, in addition to provides a control to all whatever were in terms of access to Internet communication programs built with the fiery wall which helps to prevent any open port without our consent.

 CA Personal Firewall Prog
 If we are using the internet at home o work, so we are at risk from hackers and crackers.This program considered very important for users to their operating systems that contain on the firewall for repelling the cybercriminals and direct deterrence.

Imvajra Spy-ware Remover Prog
 Used for searching the security threats that might be exposed to our system, preventing the malicious program and removing spyware & viruses from its roots. The wonderful multi-functional is to provide us with high protection.
The program works in the background and follows up on all our movements on the Internet or a computer to make sure that expose us to dangerous locations or spy files containing malicious software on a very spreading database can get rid of the various types of spyware.

Outpost Firewall Pro
Is that firewall program on the device which used for hiding the IP, make survey to any malicious virus (program) will be monitored and disable it, sending of deceptive response to Hacker to informant him that this person does not exist and closed any open port and the device automatically to prevent any infiltration attempt of the web to our computer or vice versa.
One of the best advantages to this program is prohibited any planting spyware or cookies and try to prevent the theft of data, also makes the system hidden from outsiders, checks Inbox , Prevents the system from Internet worms & viruses and protect the children from Internet porn-sites .
OUTPOST FIREWALL compatible with a firewall program ( Agnitum Outpost Firewall Pro) to block hackers, and the elimination of espionage and attempting to infiltrate and seize the files or anything harmed on the hardware and software, considered as one of the important programs that are popular in this area as a bodyguard to our information.Already considered as a personal protection program, strong and effective with spyware such as:
Internet worms, spyware agents, trojan horses, hijackers and hackers which can not pass to a computer without our knowledge, also revealing all kinds of attacks by hackers and contains a strongest tracking system to monitor network activity, control of every connection between our browser and others on the Internet or a local area network.
as one of the strongest programs that protect confidentiality and privacy ,also the ease of use is a key element to make everyone cares, the program contains a lot of advantages not only can be described as all but really huge program in the absolute protection and secure browsing.

 ZoneAlarm Security Suite
 An optimal program used to protect the system from hackers and crackers who shall prevent them from destroying our computer system, stealing the personal information and eliminating of viruses, worms and other threats. 

Neo Trace Express prog

This program seriously at all, who shall appoint the hacker's place after seeing its own IP number, in addition to show some information concerning to the experts in sites and servers.
--------------------------------------------
AL-BIK... 
              

الاثنين، 16 يونيو 2008

CYBERCRIME


VON HARVIX said: We explore. We prevent. We revenge.
But how can understand this theory (securities theory)?!
First what do we mean with the crime as a legal concept?!!
                                                                                     
 Crime as absolute concept is a psychological, social and economic phenomenon and is as old as the human society. And maybe known as a legal wrong manner that can be followed by criminal proceedings which may result into consequential punishment.

But what’s the CyberCrime??
Let’s dive slowly in that term:
                                                   
CyberCrime is “may be said to be those communities, of which, genus is the conventional crime, and where either the computer is a subject of the conduct constituting and making crime”.


Do You Know!!!
Any criminal activity that uses a computer (PC) either as an instrumentality, target or a means for devoting more and more from the crimes comes within the ambit (مدي) of CyberCrime”.


REASONS FOR CYBERCRIME:
1. Capacity to store data in comparatively small space
The computer has unique characteristic and we considered the one of them for storing data in a very small space, Make it easier for using.

2. Easy to access
The problem encountered in protecting and preventing a computer system from unauthorised access is that there is every possibility of breach or get cracked not due to human error but due to the complex technology.
But HOW this happens???
By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders, retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.

3. Complex
The computers work on Operating Systems (O.S) which are composed of millions of codes (0, 1).
The cybercriminals (hackers or crackers) take advantage of these lacunas (ثغرات) and penetrate into the computer system.

4. Negligence (الاهـــــمال)
Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cybercriminal to gain unauthorised access and control over the computer system (patch plant).

5. Loss of evidence
Loss of evidence is a very common & apparent problem as all the data are routinely destroyed. Further collection of data outside the territorial extent المدي الاقليمي)) also paralyses this system of crime investigation.

6. Motivation of Knowledge
Where the hi-tech revolution prompted many young people to enter and search for rules of the game, even if the consequences were painful. After learning its arts, that we can see will be risky on the crumbs of society and thus a loss of confidence among us.
The love of possession generated within these people, and keep up with others in various areas of knowledge and the means were not aware of a useful but the spirit of competition to create a new type of scientific research.
  
And after these all we want to know who these criminals are?
Are Programmers, Organized Professionals or Trained Intelligent???



CYBERCRIMINALS divided into three types:
1. Children and teenagers between the age group of 6 – 18 years
The simple reason for this type of behaviour pattern in children is seen mostly due to the inquisitiveness (الفضول) to know and explore many things. 

2. HACKERS/CRACKERS
-Organised hackers
This divided into 2 hacking types:
a. DARK SIDE
These kinds of hackers are mostly organised together to fulfil certain satisfaction objectives.
b. MALICIOUS
Who organised for some reasons may be to fulfil their political bias, fundamentalism....etc.
-Professional crackers
Their work is motivated by the color of money. These kinds of crackers are mostly employed to crack the websites of the rivals (المنافسين) and get credible, reliable and valuable information.

3. Discontented employees
This group include those people who have been either sacked by their employer or are dissatisfied with their employer.



MODE AND MANNER OF COMMITING CYBERCRIME:
1. Unauthorized access to computer systems or networks
This kind of offence (الجريمة) is generally referred as Hacking/Cracking in the generic sense.

2. Theft of information contained
This includes information processed and stored in computer hard disks, removable storage media…..etc. 
E.g. compute name, user name, windows folders, windows version and its serial No, etc.

3. Email bombing/freezing
Email bombing refers to sending huge numbers of mails to the victim, which may be an individual, a company or even mail-servers in there by ultimately resulting into crashing. 
E.g. ebomber ,Kaboom…etc
Email Freezing refers to prohibit the messenger worked and also its mail service to open.
E.g. freeze email…etc
  

4. Data diddling (التحريف والتزوير بقواعد البيانات)
This kind of an attack involves altering raw (الخام) data just before a computer processes it and then changing it back after the processing is completed.
The electricity board faced similar problem of data diddling while the department was being computerised.

5. Salami attacks
This kind of crime is normally prevalent (شائعة) in the financial institutions and establishments or for the purpose of committing financial crimes.
 E.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.

6. Denial (انكار) of Service attack
The computer of the victim is flooded with much more requests than it can handle which cause it to crash.
Distributed Denial of Service (DDS) attack is also a type of denial of service attack, in which the offenders are wide in number and widespread. E.g. AltaVista ,Yahoo ,Lycos …etc

7. Virus / worm attacks
Viruses are programs that attach themselves to a computer or a file in it and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it.
 E.g. love bug virus, which affected at least 5 % of the computers of the   globe. The losses were accounted to be $ 10 million.

Worms unlike viruses do not need the host to attach themselves to computer or maybe file in it.They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. 

 8. Logic bombs
 These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs.
 E.g. even some viruses may be termed logic bombs because they lie dormant (مختفية)all through the year and become active only on a particular date (like the Chernobyl virus).

9. Trojan attacks
This term has its origin in the word ‘Trojan horse’. In software field this   means an unauthorized program, which passively gains control over another’s system by representing itself as an authorised harmful program. The most common form of installing a Trojan is through e-mail.
E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed (مضايقات) this lady.

10. Internet time thefts
Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining unauthorised access to the login ID and the password of any account or maybe even the credit cards.

11. Web jacking (الاصطياد عبر الشبكة الالكترونية)
This term is derived from the term Hi-jacking. In these kinds of offences the hacker gains unauthorised access and control over the websites. He may even mutilate or change the information on the site. This may be done for fulfilling satisfaction objectives, for money or some political racism ideas.


CLASSIFICATION of CYBERCRIME:
The subject of cybercrime may be broadly classified under the following three groups:

1. Against Individuals 
a. their person .
b. their property(possession) of an individual.
 
2. Against Organization
a. Government.
c. Firm, Company and Group of Individuals.

3. Against Society at large 
 The following are the crimes, which can be committed against the followings group.
 

And take it in details to know its specific elements.
Against Individuals: –
- Harassment (الابتزاز) via e-mails.
- Cyber-stalking
(مطاردة).
- Dissemination
(نشر) of obscene (اباحية) material.
- Defamation
(التشهير).
- Unauthorized control/access over computer system.
- Indecent
(غير لائق) exposure.
- Email spoofing
(التحايل عبر البريد)
- Cheating & Fraud
(الغش والخداع)

Against Individual Property: - 
- Computer vandalism (التخريب).
- Transmitting virus.
- Unauthorized control/access over computer system.

- Intellectual Property
(الحقوق الفكرية) crimes.
- Internet time thefts.

Against Organization: -
- Unauthorized control/access over computer system
- Possession of unauthorized information.
- Cyber terrorism against the government organization.
- Distribution of pirated software etc.

Against Society at large: -
- Pornography (basically child pornography).
- Polluting the youth through indecent exposure.
- Trafficking
(الاتجار بالبشر)
- Financial crimes.
- Sale of illegal articles.

-.Online gambling(القمار).
- Forgery
(الغش).


The above mentioned offences may discuss in brief as follows:
       1. Harassment via e-mails
       Harassment through e-mails is not a new and different concept. It is very similar to harassing through letters.

2. Cyber-stalking
Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails…..etc.

3. Dissemination of obscene material/ Indecent exposure/ Pornography (basically child pornography)
Pornography on the net may take various forms. It may include the hosting of website containing these prohibited materials, Use of computers for producing these obscene materials, downloading through the Internet, obscene materials. These obscene matters may cause harm to the mind of the adolescent and tend to corrupt their mind.

4. Defamation
This is the communication of a statement that makes a claim, expressly stated or implied to be factual.

5. Unauthorized control/access over computer system
This activity is commonly referred to as hacking. So we will not use the term "unauthorized access" interchangeably with the term "hacking" to prevent confusion as the term used in the Act of 2000 is much wider than hacking.

         6. E mail spoofing
A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it's origin to be different from which actually it originates recently.

7. Computer vandalism
Vandalism means destroying and genocide the property of another. Thus computer vandalism may include within its purview (نص) any kind of physical harm done to the computer of any person.
   
      8. Intellectual Property crimes (IPR)
Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, copyright infringement (انتهاك), trademark and service mark violation, theft of computer source code….etc.

 9. Cyber terrorism against the government organization
 At this juncture a necessity may be felt that we need to distinguish between cybercrime and cyber-terrorism.
Both are criminal acts….But is the difference among them??
A cybercrime is generally a domestic issue (قضية داخلية), which may have international consequences.
A cyber-terrorism is a global concern, which has domestic as well as international consequences.  The common form of these terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.  Technology savvy (دهاء)terrorists are using 512-bit encryption, which is next to impossible to decrypt(فك تشفير).
The recent example may be cited of – Osama Bin Laden, the LTTE, attack on America’s army deployment system during Iraq war.
And a cyber terrorist is the person who uses the computer system as a means or ends to achieve the above objectives. Every act done in pursuance thereof is an act of cyber terrorism.

  10. Trafficking
Trafficking may assume different forms. It may be trafficking in   drugs, human beings, arms weapons etc. These forms of trafficking are going unchecked because they are carried on under pseudonyms 
(اسماء مستعارة).

11. Fraud & Cheating
    Online fraud and cheating is one of the most lucrative businesses that are developing and growing today in the cyber space. It may assume different forms. Some of the cases of online fraud and cheating that have come to light are those pertaining to credit card crimes, contractual crimes, offering jobs….etc.
   

CyberCriminals Exploring:
I. system information (Msinfo):
To start Msinfo.exe
     1. Click Start, and then click Run 
     2. Type Msinfo, and then click OK.
And we ll concentrate to two orders :
-Software Environment:
The status of the Operating System Wholly.
-Running Task (Also by pressing ctrl+Alt+Delete on the Keyboard):
And find the wired actions in your computer.
II. System Configuration Utility Start-Up (Msconfig):
Is a system tool that allows you to temporarily change the way Windows starts by disabling startup programs and services which making incorrect changes and damage your system.
To start Msconfig.exe
    1. Click Start, and then click Run 
    2. Type Msconfig, and then click OK.
     3. Then appears  System Configuration Utility list.
   4. Take Srartup.
Then we will see many files determined in arrangement, these files all we installed before on the system if you doubt about some files then delete it quickly from that list.
III. Registry Editor (RegEdit):
Enables you to view, search for, and change settings in your system registry, which contains information about how your computer runs. Although you can use Registry Editor to inspect and modify the registry, doing so is not recommended, as making incorrect changes can damage your system.
To start Regedit.exe
     1. Click Start, and then click Run. 
     2. Type Regedit, and then click OK.
    3. Press on HKEY_LOCAL_MACHINE.
      4. Choose SOFTWARE.
      5. Then MICROSOFT.
    6. After that WINDOWS.
     7. CurrentVersion.
    8. Finally get RUN.

Now we looking at the right of present window that we seeing the many files and its values under the names of names and data respectively, so when we don’t find the value of any file just space or arrow pointing only this means patch file found or hacking program executed on our computer .so we delete it from our system with ALT+DELETE+ENTER.

 IV. Network Statistics (NetStat):
   
To start NetStat.exe
1.   Click Start, and then click Programs> Accessories >Command Prompt.
2.   Type NetStat , and then click OK.
 And from foreign address we the port linked to the hacking              program to your computer which is usually start from port 50000-to-port 60000.
3. After checking and determining the patch of hacking:
Disconnect the cable of networking and reboot the computer then get wholly (كليا) scan for your system.

V. By MS-DOS:
    1. Click Start, and then click Programs> Accessories >Command Prompt.
    2. Write C:\Windows\patch.exe,
                   C:\Windows\system32\patch.exe,
                   C:\Program files\%subfolder%\patch.exe or
                   C:\patch.exe.
  And all of the previous orders written depends on our system.
3. And if we find the patch file we delete by write this statement:   
             c:\windows\delete patch.


CYBERCRIME PREVENTION:
Prevention is always better than cure. It is always better to take certain precaution while operating the net.
So we should keep in mind the following things-
1. to prevent cyber stalking avoid disclosing any information pertaining to oneself(anyone). This is as good as disclosing your identity to strangers in public place.
2. always avoid sending any photograph online particularly to strangers(unknowns) and chat friends as there have been incidents of misuse of the photographs.
3. always use latest and up date antivirus software to guard against virus attacks and get scanning periodically to the system.
4.  always keep back up volumes so that one may not suffer data loss in case of virus contamination
5. never send your credit card number to any website that is not secured, to guard against frauds.
6. always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.
7. it is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal, and better if you delete it all from your system every time you sit to work with your computer preventing it from theft.
8. websites owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this.
9. use of firewalls may be beneficial.
10. web-servers running public sites must be physically separate protected from internal corporate network.
11. Eliminating the websites Advertisements those jumping whenever and wherever you are by some special programs.
E.g. Optout program from grc.com company.
---------------------------------------
AL-BIK...