Thursday, 15 November 2012

WORLD FASTEST SUPER COMPUTER TITAN AND ITS SECRET


Let's be frank: Many of us need a
computer with just enough for to
check Facebook in one window  and watch movies and games  while we are unaware about the powers of supercomputer
Recently Oak Ridge National Laboratory's
massive new super computer
Titan, has been ranked as the fastest
computer in the world and it is developed by cray. development costs for titan is around $97 million
and its super electric bill is expected
to cost about $9 million per year  . Titan also has more than 700 terabytes of
memory and the Cray XK7 system contains 18,688
nodes, each with a 16-core AMD Opteron
6274 processor and an NVIDIA Tesla K20X
graphics processing unit (GPU)
accelerator.
Titan was benchmarked at 17.59
quadrillions of calculations
per second i.e  It
would take 60,000 years for 1,000
people working at a rate of one
calculation per second to complete
the number of calculations that Titan
can process in a single second isnt it mind bowling guys. Titan is about the same size as
a basketball court . It has
200 cabinets that are each about the
size of a refrigerator and uses as
much electricity as a small town.
Although that might sound like an
energy hog evil.
Titan beat out the previous number one
contender, Sequoia of Lawrence
Livermore National Laboratory .
AtOak
Ridge National Laboratory,  it's
used to perform calculations for
materials research, nuclear energy
research, and analysis of techniques
which can make combustion engines
more efficient and create the next
wave of car batteries, switchgrass ethanol
and improved weather
Titan isn’t the
only computer to combine CPU and GPU
to achieve its high speeds. There are now
a total of 62 systems in the Top 500 list
which make use of the same principal,
including number 8 on the list, the
Chinese system Tianhe-1A. This
supercomputer uses NVIDIA GPUs.

Wednesday, 14 November 2012

NEW MALWARE JACKBOT

Intego discovered a Multiplatform Java
Malware called "Jacksbot " , which
is infecting Windows, Linux and Mac
systems .
The Jacksbot is described as a 'backdoor
Trojan Java "on infected computers and
collects system information , make
screenshots, delete files , steal passwords
and perform click fraud and DDoS attacks.
Although it can run on
any platform that supports JRE, It appears
likely that this trojan is intended to be
dropped by another component that has
not yet been identified . “ There is a
possibility that this malware presents
itself as a Minecraft modification to
unsuspecting users as it contains the
special command ‘ MC for stealing
Minecraft passwords from the
compromised system .
"However, the malware ’ s focus is mainly
on Windows. The malware writers behind
JACKSBOT may just be testing it .and i personally think it is very effective
for a successful multiplatform malware .Just be aware and For Windows-based systems, you can
check the registry for the presence of
the following key:

  HKEY_CURRENT_USER\Microsoft
\Windows\CurrentVersion\Run
Microsoft® Windows®
Operating System = "{Java Root
Directory}\bin\javaw.exe -jar
"{Malware Path and File
name}""
      I hope this information is use ful ....just be aware of it

TCP /IP PROTOCOL

TCP/IP (Transmission Control Protocol/
Internet Protocol) is the basic
communication language or protocol of
the Internet. It can also be used as a
communications protocol in a private
network (either an intranet or an
extranet ). When you are set up with
direct access to the Internet, your
computer is provided with a copy of the
TCP/IP program just as every other
computer that you may send messages to
or get information from also has a copy of
TCP/IP.
TCP/IP is a two-layer program. The higher
layer, Transmission Control Protocol,
manages the assembling of a message or
file into smaller packet s that are
transmitted over the Internet and
received by a TCP layer that reassembles
the packets into the original message.
The lower layer, Internet Protocol ,
handles the address part of each packet
so that it gets to the right destination.
Each gateway computer on the network
checks this address to see where to
forward the message. Even though some
packets from the same message are
routed differently than others, they'll be
reassembled at the destination.
TCP/IP uses the client/server model of
communication in which a computer user
(a client) requests and is provided a
service (such as sending a Web page) by
another computer (a server) in the
network. TCP/IP communication is
primarily point-to-point, meaning each
communication is from one point (or host
computer) in the network to another
point or host computer. TCP/IP and the
higher-level applications that use it are
collectively said to be "stateless" because
each client request is considered a new
request unrelated to any previous one
(unlike ordinary phone conversations that
require a dedicated connection for the
call duration). Being stateless frees
network paths so that everyone can use
them continuously. (Note that the TCP
layer itself is not stateless as far as any
one message is concerned. Its connection
remains in place until all packets in a
message have been received.)
Many Internet users are familiar with the
even higher layer application protocols
that use TCP/IP to get to the Internet.
These include the World Wide Web's
Hypertext Transfer Protocol ( HTTP), the
File Transfer Protocol (FTP), Telnet
( Telnet ) which lets you logon to remote
computers, and the Simple Mail Transfer
Protocol ( SMTP). These and other
protocols are often packaged together
with TCP/IP as a "suite."
Personal computer users with an analog
phone modem connection to the Internet
usually get to the Internet through the
Serial Line Internet Protocol (SLIP) or the
Point-to-Point Protocol (PPP ). These
protocols encapsulate the IP packets so
that they can be sent over the dial-up
phone connection to an access provider's
modem.
Protocols related to TCP/IP include the
User Datagram Protocol ( UDP ), which is
used instead of TCP for special purposes.
Other protocols are used by network host
computers for exchanging router
information. These include the Internet
Control Message Protocol ( ICMP), the
Interior Gateway Protocol (IGP ), the
Exterior Gateway Protocol (EGP), and the
Border Gateway Protocol (BGP ).

HOW TO CREATE TROJAN HORSE ?

Trojan or Virus on your own. In this, post I’ll show you how to make a simple trojan on your own using C programming language. This trojan when executed will eat up the hard disk space on the root drive (The drive on which the Windows is installed, usually C: Drive) of the computer on which it is run. Also, this trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run.
So, I’ll call this as Space Eater Trojan. Since this program is written using a high level programming language, it is often undetected by antivirus programs. The source code for this program is available for download at the end of this post. Let’s see how this trojan works:
Before I move on to explain the working of this program, you need to know what exactly is a Trojan horse and how it works. Unlike what many of us think, a trojan horse is not a virus. In simple words, it is just a program that appears to do a favorable task but in reality performs undisclosed malicious functions that allow the attacker to gain unauthorized access to the host machine or cause a damage to the computer.

Now lets move to the working of our Trojan:

The trojan horse which I have created appears itself as an antivirus program that scans the computer for malware programs. However, in reality it does nothing other than eating up the hard disk space on the root drive by filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result, the the root drive gets filled up completely with in minutes of running this program.
Once the disk space is full, the trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any of the cleanup program. This is because, the trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extension it is often ignored by the disk cleanup software. Hence there is now way to recover the hard disk space other than reformatting the drive.

The algorithm of the Trojan is as follows:

  1. Search for the root drive.
  2. Navigate to %systemroot%\Windows\System32 on the root drive.
  3. Create the file named “spceshot.dll“.
  4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full.
  5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executable for security reasons. You need to compile it to obtain the executable.

How to compile, test and fix the damage?

Compilation:
For step-by-step compilation guide, refer my post How to compile C Programs.
Testing:
To test the trojan,  just run the SpaceEater.exe file on your computer. It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space.
NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.

How to fix the damage and free up the space?

To remove the damage and free up the space, just type the following in the “run” dialog box:
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.