Showing posts sorted by relevance for query Google Plus. Sort by date Show all posts
Showing posts sorted by relevance for query Google Plus. Sort by date Show all posts

GOOLGE Plus is Putting Pressure on Facebook

 
Google is making a fresh attempt at social networking with a service that competes with Facebook. The service, called Google Plus, has a similar appearance as Facebook, with streaming updates of photos, messages, comments and other content from selected groups of friends, said Bradley Horowitz, vice president, product management. It will integrate Google’s maps and images.
As Internet users spend more time on social-networking sites, Google, the world’s biggest Internet-search company, is releasing new social features to lure web surfers to its own services and expand advertising sales. Facebook, the world’s most popular social network, captured 13 percent of total hours people spent online in May, while Google attracted 10 percent, according to ComScore Inc.
“It’s something that is changing the quality of Google itself,” Horowitz said of the push into social networks. “It’s the Google you know and love, but now with people.”
Chief Executive Officer Larry Page is starting Google (plus) after missteps last year with the introduction of a social component to Gmail called Buzz. In March, Google reached a settlement with the Federal Trade Commission to resolve concerns it violated its own privacy policies. Executive Chairman Eric Schmidt, CEO for a decade before Page assumed the role, said earlier this month that he “screwed up” in the area of social networking. “I clearly knew I had to do something and I failed to do it,” he said.

The new service will initially be available to only a limited set of users in a test. The company has been testing internally and it’s now ready to gradually open up what it calls a “project” to the general public. The service is available only by invite for now.

“This is a project that will span many years,” Horowitz said. “This is not something where we’re done. On the contrary — we’re just getting started, laying some of the foundation and then many features will evolve.”

With Google (plus), users easily share information based on the circle of friends they think would most like to see a photo or read a message. Once users sign up, they have a profile page with security settings that let them share or hide personal information, such as education or job descriptions.

Other Google (plus) features include Sparks, which gathers videos and articles on topics of interests or hobbies, and Hangouts, which lets friends join video chat with multiple people at once. There is also a mobile version of Google (plus) for handsets running the Android software, and the company is developing a version for Apple’s iPhone. The mobile version enables text-message chats with multiple users and, with an opt-in, photos and videos are automatically stored in an online album for later access.

“We already have users,” Horowitz said. “This isn’t a startup that’s trying to acquire users. The users are here already. It’s just that the experience we’ve offered them is incoherent and disconnected.”


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google CEO Larry Page said G+ Hit 10M Users in 2 Weeks


Google's Facebook competitor Google Plus grew to 10 million users in just two weeks, the company announced Thursday.
That's only a bit more than 1 percent of Facebook's 750 million global users, but it still represents staggering growth for Google's infant social network, which isn't yet open to the public. The site remains in a "limited" trial phase.
"Growth on Google has been great," Google CEO Larry Page said on a conference call with analysts. 

"Over 10 million have joined. That's a great achievement for the team. There has been a ton of activity."

Page said more than 1 billion items are being shared on the network every day. The " 1" button, which populates search results with friends' recommendations, has been clicked 2.3 billion times a day.
Google represents a part of the new CEO's grand vision for the 13-year old company. Despite Google's position as the worldwide leader in search, Page has opted to treat the company as a startup, increasing hiring and starting several new initiatives. 
"Today, I see more opportunities for Google than ever before; we're just at the beginning of what we want to do," Page said. "We're only at 1 percent of what's possible. Google's just getting started."

Accordingly, Google continued its hiring spree in the second quarter, upping its headcount by nearly 9 percent, or 2,500 employees -- including 450 from the acquisition of flight data company ITA .
The company also has spent freely, putting more than $900 million into its infrastructure during the quarter, including expanding its massive data centers. The company says it expects to continue to make "significant" capital expenditures going forward.
Google says all that spending will keep the company ahead of its rivals.

The past quarter has been a busy one. In addition to Google , the company started selling its Chromebook line of laptops aimed at current Microsoft corporate clients and launched its Music application to compete with Apple's iTunes and Amazon's Cloud Drive.
The company also unveiled Google Wallet, which will allow customers to pay for items using their smartphones, and it launched Google Offers, a Groupon competitor.
But Google also shut down several products that weren't working, such as Google Health and PowerMeter.
"Our focus is more wood behind fewer arrows," said Page. "I'm very happy with our progress."
Still, the free spending has made some stock analysts cautious. Page lashed back at that criticism, noting that when Google started its search engine, no one believed the company could monetize that besides the occasional banner ad.

"Fast forward to today, it seems like we're playing the same movie all over again," he said.

The world's online search leader said its net income in the second quarter rose to $2.5 billion, up 36 percent from a year earlier.
Results included one-time charges totaling $1.06 per share. Without the charges, Google said it earned $8.74 per share. Analysts polled by Thomson Reuters, who typically exclude one-time items from their estimates, had forecast earnings of $7.85 per share.
Profit rose as both the number of clicks on Google's ads and the amount that advertising partners pay per click increased substantially: Paid clicks surged 18 percent and cost per click grew 12 percent compared to last year.

Sales for the Mountain View, Calif., company rose 32 percent to $9 billion. Excluding advertising sales that Google shares with partners, a figure also known as traffic acquisition costs, the company reported revenue of $6.9 billion, which topped analysts' forecasts of $6.6 billion.
Shares of Google jumped 12 percent after hours.
Still, not all the news has been positive for Google, which has recently landed in antitrust crosshairs.

The Federal Trade Commission began investigating the company for evidence of abusive practices, and a federal judge rejected Google's planned settlement deal in its attempt to create a universal online book library.
The Department of Justice also heavily scrutinized the company's recent purchase of flight data software company ITA, and Google set aside $500 million for a potential settlement with the DOJ regarding the company's advertising practices. The DOJ is currently studying Google's proposed $400 million purchase of digital advertising toolmaker Admeld.
Late last month, French search company 1plusV said it would seek $423 million in damages from the American search giant over alleged anti-competitive practices.


-The News Source (Chicago Tribune)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google+ Now has 20 Million+ Users


Google has another hit on its hands. According to a study released Friday by web-tracking firm comScore, the web search giant’s new social networking tool, Google Plus, has amassed 20 million users in just three weeks since its launch on June 28.
While that figure is still far from the 750 million registered users of Facebook, it is still enough to make Google Plus the fastest growing social network in history. The spectacular early success indicates that Google Plus may well challenge Facebook once it comes out of a trial mode in which Google has strictly restricted the number of users, Comscore said.

“It would be difficult to think of many sites that reached such a large number in such a short period of time,” said study author Andrew Lipsman.
“That said, Google does have a built-in visitor base of more than 1 billion to work with, so there is clearly potential to convert a high number of users to its new social tool — even if it is still invite-only.” According to Comscore, the latest figures represent an 82 per cent surge from the previous week and a 561 per cent increase over the usage figures two weeks prior.
While the U.S. is the biggest market with 5.3 million users, India is a strong second with 2.8 million users, followed by Britain (866,000), Canada (858,000), and Germany (706,000)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerabilities Found in Google Plus, An Attacker Can Perform DDoS Attack Using Google's Bandwidth


Hello hacker meet your new friend Google plus. Don't get panic. Now you can perform DDoS attack while using the bandwidth of Google.  A security expert has discovered certain flaws in Google’s server which can allow hackers to mount massive distributed denial of service (DDOS) attacks. Simone Quatrini, a penetration tester with Italy-based security firm AIR Sicurezza Informatica, revealed that vulnerabilities in Google’s server allow hackers to use the search engine as a proxy to retrieve content for them.
The security expert has developed a script which can allow it to use Google’s bandwidth to launch DDOS attacks on any website. Quatrini contacted Google about the flaw on August 10, but got no reply from the company. It was then that he decided to disclose the vulnerabilities to the public. Researcher and computer student Ryan Dewhurst had also alerted Google about the flaws, but also did not receive a reply. Quatrini claimed he was getting a bandwidth of 91Mbps even though his home server only receives bandwidth of 6Mbps.
“Is possible to request any file type, and G+ will download and show all the content. So, if you paralyse so many requests, is possible to DDoS any site with Google bandwidth. Is also possible to start the attack without be logged in G+,” Said Quatrini.
Here is video which will clarify you how to do DDoS while using Google's Bandwidth:-
To Download the DDoS Source Code click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Facial Recognition Technology In Google+


One of the fastest growing social network Google Plus adds more facilities. The fastest growing social network, Google Plus, keeps improving its arsenal in the battle with rivals like Facebook and Twitter. Google’s newest heavy weapon is: face detection. This technology allows users to tag the photos quicker and easier than before, without manually entering the identity for individual pictures.
When the user decides to publish an entire photo album, the new face detection feature will display in one place all the faces found in that album. Later on, grouping photos according to the persons that appear in them will be much easier and then tag them with the name and the email will be made with just a few keystrokes. Users can access this new feature from three different places.
One way is to create an album from the sharebox or to add photos to an existing album. Once the upload is complete, Google will recognize the faces and the tagging feature will appear. Another way is to add photos from sharebox and to follow the same steps and Tag People when this option appears. Or, there is the possibility of tagging an entire album using button just above the photo previews.
To respect the people’s right to privacy, after the tagging, every person that appears in the photos will be informed and they can decide if they approve the tagging or not.
Initially, Google provided face detection features with Picasa, but after a while, this service was renamed Google Photos. To gear up for further improvements, Google acquired PittPatt, and its patents for the technology used in face detection and live tracking. Now what Google cooked up in this department is available for Google + users to enjoy. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA Certified First Commercial Smartphone (Android-based Nexus S)


Just when you thought Google was losing its appeal with its Google Plus network, here comes another biggie that might add a feather to the company’s colourful hat.
NASA revealed that they prefer working with Android on their Space Stations and that Nexus S is being used by NASA to run its SPHERE satellites. SPHERE satellites are free-floating devices that were in fact inspired by Star Wars, according to NASA. They have been placed on the International Space Station right from 2006, which dates back to pre-Android days. Android is being used on a special expansion port which would allow NASA to utilize the highly customizable Android OS to add additional sensors and features. Nexus S devices are being touted by NASA as the first commercial Smartphones to be certified to fly on the space shuttle.
Nexus S’ CPU would be used to power SPHERE’s ‘brains’ and the robots would be able to monitor and sense more external data that can be controlled and observed remotely from Earth, thanks to its Wi-Fi connection. NASA made no attempts to hide their happiness with Google and Android OS, which definitely gives Google the boost that it required in the last few weeks. Most people have begun to complain that Google Plus pages are almost empty without any updates, though it is filled with people.
Such criticisms may no more affect the bigwigs at Google, who would now be patting their own backs after NASA declared Android OS to be their preferred mobile operating system. One shouldn’t be surprised if Google makes an attempt to try and do something with space research as well. This news would surely have ruffled feathers of Apple and other competitors who have been fighting Google’s juggernaut that has been throwing its weight around in Internet, mobile and even home device technologies.

-News Source (NASA & Walyou)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Gets Another Chance To Operate In China For One Year


Google’s relationship with the government of China has been a tad tense over the past couple of years. There have been accusations of state-sponsored hacking, interference with access to services, and, of course, Google’s flat-out refusal to censor search results. China also wasn’t pleased with the introduction of Google Plus in Gmail this summer, which shouldn’t have come as a surprise. The Chinese government is widely regarded as being afraid of social networks and some officials even believe that they are being used by the U.S. to destabilize China.
But despite those fears and tensions with Google, a government spokesperson has announced that the license Google requires to continue operations within Chinese borders has been renewed for another year. China’s Ministry of Industry and Information Technology stated that the Google license was one of more than a hundred that were renewed following “adjustments” to operations, though no details about those changes were given.

It’s worth noting that the Internet content license doesn’t actually belong to Google, and that could very well have something to do with the renewal. The license actually belongs to a Chinese partner who works with Google, since the Ministry doesn’t allow foreign companies to own such licenses. Since the spat began, Google’s presence in China has diminished greatly. Its search market share has been devoured by Baidu, who now has its sights set on Google Chrome and Android. Baidu recently announced the Baidu Yi mobile operating system, which will begin shipping on Dell tablets and smartphones in China in the near future.

-News Source (Geek.com)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DuckDuckGo Trying To Beat Google With Simplicity & Strict Privacy Protections Features

DuckDuckGo Trying To Beat Google With Simplicity & Strict Privacy Protections Features 

Nowadays Google is facing massive criticism  for changes Google made in the way it displays search results, putting content from Google’s social network, Google Plus, up front and center, even when it doesn’t seem to make sense. Add to that concerns from users and regulators over Google’s new privacy policy, and Google search has had a difficult 2012 so far, to say the least. In contrast, the fortunes of a relatively unknown search engine focused on privacy, called DuckDuckGo, have never been better. DuckDuckGo, which promotes its simplicity and strict privacy protections over competitors, has experienced a record surge in traffic over the past three months, up 227 percent to nearly 1.5 million unique searches daily. DuckDuckGo’s founder Gabriel Weinberg said that he knew the tide was turning when his four-year-old search engine saw a million searches per day on February 14. In terms of U.S. search market, DuckDuckGo only accounts for an estimated 0.1 percent of all search traffic, according to results from tracking firm comScore. But it’s worth pointing out that fully half of DuckDuckGo’s traffic comes from overseas, mostly Europe, according to Weinberg. Another big change coming: DuckDuckGo plans to launch redesigned mobile apps for iOS (iPhone/iPad) and Android devices within the next 5 months. DuckDuckGo was launched in 2008, when Google’s stranglehold on the global search was reaching its current plateau.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Iran Accused of Carrying out Cyber Attacks Against US Banks Over Anti Islamic Movie Issue

Since last few days, the conspiracy with the 'Anti Islamic Movie' was the headline in every where. We have seen global violence and a mass protest mainly came from Muslim brotherhood. This protest was also touched the internet, and as expected Muslim hackers joined the movement, which cost many damages for the cyber fence. Thousands of websites became victim of cyber attack, and among them several US banks also faced huge disturbance. This protest takes a new direction when Govt of Iran announced the blockage of Google Inc's search engine and its email service. "Google and Gmail will be filtered throughout the country until further notice," an official identified only by his last name, Khoramabadi, said, without giving further details. The Iranian Students' News Agency (ISNA) said Google ban was connected to the anti-Islamic film posted on the company's YouTube site which has caused outrage throughout the Muslim world. 
This stand of Iran Govt created a controversy, which make them responsible for carrying out cyber attacks against US banks. According to NBC news report US National Security officials accused the Iranian government for engaging cyber attacks against US Banks mainly Bank of America. But when the ball goes to Iran's side then they completely denies the blame, while saying "We officially announce that we haven't had any attacks," This statement came from the Head of Iran's civil defense agency Gholam Reza Jalali when he was asked about the report. The western media reports alleged on Friday that Muslim hackers have repeatedly attacked Bank of America Corp, JPMorgan Chase & Co and Citigroup Inc over the past year as part of a broad cyber campaign targeting the United States. Security sources told Chicago Tribune and NBC News that the attacks on the three largest US banks originated in Iran, but it is not clear if they were launched by the state, groups working on behalf of the government, or "patriotic" citizens. 

Here we want to refresh your memory while digging up a story, when Iran Govt decided a permanent Internet ban in Iran, where Iran Government has announced its plans to establish a National Intranet within five months. The Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet." And that five months is almost over, so may be the blockage of Google came due to that reason, or may be not. We suggest our readers that, it will be better if you ask yourself, that whether Iran was indeed responsible for the cyber attack or not??!!


-Source (Reuters, NBC & FARS News Agency)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Plus One Button is Now 3times Faster than Before

Google announced they have now speed up the Google +1 button for websites.
The button is now automatically up to 3 times faster and best of all, webmasters do not need to update their code for the speed changes to take affect. The change is automatic. Google said, “no action is required on your part, so just sit back, relax, and watch as the button loads more quickly than before.”
Is 3X faster not enough? Google has also released a new asynchronous snippet that is even faster. This feature allows your web site to continue loading while your browser downloads the +1 JavaScript. 
To see the official announcement of Google click here  

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Announced 'Pwnium 2' & Increased Prize Money $2m To Exploit Chrome

Google Announced 'Pwnium 2' & Increased Prize Money $2m To Exploit Chrome

Few days ago we got the result of Microsoft hosted Blue Hat Security contest, where Microsoft awarded a bunch of hackers and gave away an amount of  $260,000. Immediately after this event, Internet giant Google   has upped the ante in its industry-leading cash-for-security-bugs program with hefty bonuses and a hacking contest that will award up to $2 million worth of prizes to people who successfully exploit its Chrome browser. In the official Chromium blog, Google has announced the plan for Pwnium 2. According to a blog post by Chris Evans, Software Engineer at Google- Pwnium 2 will be held on Oct 10th, 2012 at the Hack In The Box 10 year anniversary conference in Kuala Lumpur, Malaysia.
This time, Google be sponsoring up to $2 million worth of rewards at the following reward levels:
  • $60,000: “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself. 
  • $50,000: “Partial Chrome exploit”: Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows kernel bug. 
  • $40,000: “Non-Chrome exploit”: Flash / Windows / other. Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver. 
  • $Panel decision: “Incomplete exploit”: An exploit that is not reliable, or an incomplete exploit chain. For example, code execution inside the sandbox but no sandbox escape; or a working sandbox escape in isolation. For Pwnium 2, we want to reward people who get “part way” as we could definitely learn from this work. Our rewards panel will judge any such works as generously as we can. 
Exploits should be demonstrated against the latest stable version of Chrome. Chrome and the underlying operating system and drivers will be fully patched and running on an Acer Aspire V5-571-6869 laptop (which we’ll be giving away to the best entry.) Exploits should be served from a password-authenticated and HTTPS Google property, such as App Engine. The bugs used must be novel i.e. not known to us or fixed on trunk. Please document the exploit. 
We also like to give you reminder that earlier in this year Google had increased vulnerability bounties in Anniversary of Vulnerability Reward Programbe. Also PayPal, Facebook & many other has already started this paid bug bounty program.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Spammers are Exploiting Google+


Scammers have begun exploiting the launch of Google’s new Google+ social network, with a growing raft of spam emails that imitate Google+ invitations. Google+ is currently still in the testing phase following its launch last week, and users need to be invited by another Google+ member before they can sign up.

Fake invitations:-

However, some of those Google+ invitations are fake, and their links direct traffic to an online business called Canadian Family Pharmacy, which sells Viagra, according to Sophos. Sophos said the emails, distributed by a Canadian hacking group called Partnerka, look authentic.
“The spammers are no doubt hoping that the email will be hard to resist, as many people are eager to see what is being billed as Google’s answer to Facebook,” said Graham Cluley, senior technology consultant at Sophos, in a statement. “Research shows that last year alone, 36 million Americans bought drugs from online pharmacies, so this is a technique that is clearly continuing to work for spammers.”
Overall the scam is “amateur” in that it makes no attempt to use a site that looks like Google+ to harvest users’ personal information, Sophos said. While Facebook doesn’t allow friends lists to be exported to Google+, an extension is now available for Google’s Chrome browser that allows users to export friends data in a format that can be imported into Google+. Facebook has, however, begun modifying accounts to prevent the tool from working, according to Mohamed Mansour, who developed the Facebook Friend Exporter tool.

Google’s answer to Facebook:-

Google unveiled Google+ last week as its answer to Facebook, which has racked up some 700 million users in six-plus years. Seizing on the market leader’s seemingly cavalier attitude toward user privacy, Google envisions Google+ as a more nuanced approach to social networking that tries to give users complete control over what content they share online and with whom they share it. Available to users by invitation only for now, Google+ comprises four major components: Circles, Sparks, Hangouts and mobile, which includes instant photo and video uploads and group messaging.
Social Circles has been rumoured since March, and was at the centre of a clumsy smear campaign by Facebook which attempted to brand Google’s privacy as poor. Circles is a sharing service that lets users add circles, or groups of users united by common interests by dragging and dropping their profiles into a circle. Circles could include family, friends and colleagues.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google Plus is Now Giving Online Gaming Features


Google+ is became more attractive, they are now giving online gaming features like facebook. Hope now the competition between G+ and FB will be more harder and interesting.
Google's new social network, Google+, took a big step forward Thursday by adding games to its site. Google+ angry birds games Google+, which is less than two months old, said Thursday afternoon that it's beginning to roll out a games button at the top of users' streams. The highly popular Angry Birds</> is one of the first games to be added to the site, along with Zombie Lane and Edgeworld.
Vic Gundotra, senior vice president of engineering at Google, announced the gaming news in a blog post. Gundotra noted that users will be able to click on a Games button that will be placed above their streams. The button takes them to a games page, allowing games to be available when users want them and hidden when they don't.
"The experiences we have together are just as important to our relationships," wrote Gundotra. "We want to make playing games online just as fun, and just as meaningful, as playing in real life. That means giving you control over when you see games, how you play them and with whom you share your experiences."
And that's going to be an important feature for Google+, which has grown quickly since its launch, according to Ezra Gottheil, an analyst with Technology Business Research.
"Games are a real complement to social networking," said Gottheil. "When people play games with other people, it is often more about being with other people than about the game itself. It actually fits the Circles model well. If you're a serious gamer, you want to talk about the game with other players, but that bores the rest of us silly."
And Gottheil also noted that adding games to the site, while not surprising, is a smart move. If people are able to access great games and engage with Circles of gamers, it easily could draw more users to the fledgling network. "I think Facebook has to be nervous about Google+ taking away some of its time-on-site more than taking away users," he added. In today's blog post, Gundotra noted that users will find their high scores, other games that friends have played recently and invitations to play with friends and family. And he also noted that Circles will only be updated with a user's scores and game play if they are interested in gaming, as well.
"Today we're starting to gradually roll out games in Google+," wrote Gundotra. "We look forward to making them fully available to everyone in Google+ soon. When you see a Games page in your account, please give games a try and send us feedback. Look for the "send feedback" button in the bottom right-hand corner of any page in Google+."

For more information and to see the official blog report of Google click here

-News Source (G+ & PC Mag)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Permanent Internet Ban in Iran, Govt Launching National Intranet Service

Permanent Internet Ban in Iran, Govt Launching National Intranet Service  

The Iran Government has announced its plans to establish a National Intranet within five months. As a result millions of Internet users in Iran will be permanently denied access to the World Wide Web (WWW) and cut off from popular social networking sites, email services & so on. The government is set to roll out the first phase of the project in May, following which Google, Hotmail and Yahoo services will be blocked and replaced with government Intranet services like Iran Mail and Iran Search Engine. At this stage, however, the World Wide Web, apart from the aforementioned sites, will still be accessible. Iran government has already started the registration procedure to apply for procuring Iran Mail ID, which mandates authentic information pertaining to a person's identity, including national ID, address and full name. Registration will be approved only after verifying it against the government data on the particular applicant. The second and final stage of the national Intranet will be launched in August, which will permanently deny Iranians access to the Internet. "All Internet Service Providers (ISP) should only present National Internet by August," Taghipour said in the statement. Iranian ISPs already face heavy penalties if they fail to comply with the government filter list. By establishing the Intranet, the government control is set to become stricter. Foreign sites can still be accessed over the Intranet provided they are mentioned in a "white list" set up by the government. The government is also believed to be planning for better control on proxy servers which allow users to access banned sites. Accordint to statement of Reza Taghipour, the Iranian minister for Information and Communications Technology, announced the setting up of a national Intranet and the effective blockage of services like Google, Gmail, Google Plus, Yahoo and Hotmail, in line with Iran's plan for a "clean Internet."

-Source (IB Times)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Researchers developing tools that tell who’s blocking Web information



You type in the address of a website, but nothing comes up. Did you make a mistake or is someone or something blocking the information you want?

Researchers at Georgia Tech are developing free tools that give Internet users worldwide the answer.
The device would have detected recent Internet blackouts in Egypt and Libya and could let people know if governments are throttling the Web without their knowledge, said Nick Feamster, a computer science professor who is one of the principal investigators on the project. It would also expose whether Internet service providers are delivering the upload and download speeds they promised consumers, he said.
Google recently awarded Tech professors at least $1 million to develop Web-based devices to improve transparency on the Web. The first tool should be available for anyone to download by the end of the year.
The goal isn’t to help people circumvent a blocked site, but rather to explain why it is inaccessible, said Wenke Lee, a computer science professor who is also a principal investigator.
“Information and our access to information has a lot of impact on who we are and how we live our lives,” Lee said. “Not having this information is similar to withholding knowledge from students or basically not giving children enough nutrition for them to grow.”
Feamster said they are not judging why a site is blocked. There are reasonable motives, such as protecting people from spam and cybercrime. And there are darker motives, such as censoring content, tampering with search results or altering information to promote propaganda.
“Users have the right to be aware of what is happening,” Feamster said. “This is a global issue.”
The Google Focused Research Awards program provided Tech with $1 million for two years’ worth of work on the project, plus an optional third year with an additional $500,000. The research program supports engineering and computer science projects that are of mutual interest to college researchers and the company.
“Georgia Tech has been a very strong partner for Google and we look forward to exciting things coming from this collaboration,” said Leslie Yeh Johnson, a Google university relations manager.
The project is in the early stages, but the team has developed a “browser extension” that would provide users with real-time information about blocked sites.
An icon, likely an exclamation point, would appear in the address bar. If users click on that, a message pops up saying the site is inaccessible and provides a link for more information. The link would explain, using a phrase such as “to the best of our knowledge” how long the site has been down, who or what caused it and whether users from a specific country or Internet service provider are impacted.
The project faces a couple of challenges, such as making sure governments or service providers can’t block or filter the device, Feamster said.
They must persuade people to use the tools and report network problems and issues so the team can gather information. The more people who report information, the more accurate the tool will be, Lee said. People at Google or Tech will vet the information to make sure it isn’t tainted or misleading, Feamster said.
Feamster and Lee have long worked to combat censorship. Censorship has become increasingly pervasive and studies find 60 nations restrict access to information on the Internet, they said. While much focus remains on the so-called Great Firewall of China, it also occurs in Australia, South Africa and the United Kingdom, Feamster said.
Emory University professor Ramnath Chellappa said there is always interest in tools that promote transparency on the Web.
Chellappa, an expert on information security and privacy, said the new Tech effort could benefit users in the Mideast and North Africa, but will likely have a greater effect on the issue of net neutrality, which advocates for no restrictions on content or access.
Lee said the project aims to create a “transparency watchdog system.”
“The idea is to give people something that provides better information about the accessibility of content,” Feamster said. “It could be censorship or an outage or somehow the user’s fault. The point is to be clear about what is really going on.”

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Why did Microsoft spend $8.5bn on Skype? (Detailed Report)


Microsoft Skype
In a bold move, Microsoft acquires Nokia and catapults itself to the top of the smartphone world. The full integration of Windows Phone 7 software into Nokia hardware will result in a better user experience for customers, a zero-fragmentation platform for developers, easier deployment of a smaller number of SKUs for retailers, and more reliable update management for carriers.
It's worked before. Microsoft's hardware/software integrated devices, Xbox and Kinect, are enjoying strong revenue growth and great margins: $1.9bn revenue last quarter, 50% more than last year, with 10% operating profit.
In a prepared statement, Microsoft CEO Steve Ballmer says:
I welcome Stephen Elop back into my executive staff. His brief leave of absence has allowed us to more fully explore the possibilities of combining the best smartphone hardware, Nokia's, with the best OS, Windows Phone 7. Google's anticompetitive Android free and open licensing practices unfairly tilted the playing field against our better product; they made it impossible for us to sell Windows Phone 7 software. Instead, we're now ready to do battle with Apple from a superior position: a stronger product carrying the Windows Everywhere flag, wider carrier distribution around the world, and more retail partners in US, Europe, and BRIC nations. With our acquisition of Nokia, we're now a $100bn company, back where we belong: at the top of the high-tech industry.
When I woke up, I heard a different story: Microsoft bought Skype for $8.5bn.
We all know Skype: free voice and video calls from computer to computer, plus paid services if you need to dial a phone. As Skype prepared for its long-awaited IPO, we got financial data from their S-1filing with the SEC. S-1s are always instructive: This is usually the first time a private company opens the kimono – and the SEC watches closely as you prepare to sell shares to widows and orphans.
The Profit & Loss statement in Skype's S-1 looks like this:
With revenue of $860m in 2010, Skype's operating profit is a modest $20m, with a net loss of $69m due to interest expenses stemming from $686m in long-term debt. Except for in 2008, when they saw a $42m profit, Skype has racked up huge losses, including $1.4bn in 2007 and $370m in 2009.
(Technically, these figures straddle two different corporate structures because of Skype's complicated history. Started in 2003 as an independent European company, Skype was acquired by eBay in 2005 for a price pegged between $2.6bn and $3.1bn. After the acquisition, eBay discovered its ownership of Skype was "encumbered": A crucial piece of Skype's technology was owned by another company, Joltid, which was essentially in the hands of Niklas Zennström, one of Skype's founders. eBay settled with Joltid for about 14% of Skype. This caused wags to say the crafty Skype founders sold the company twice – and it certainly didn't make the ex-management consultants running eBay look so sharp. In 2009, eBay sold 70% of Skype to private equity and venture investors in a transaction that valued the company at $2.75bn.)
Why did Microsoft pay $8.5bn – 10 times the company's revenue – for a business that has changed hands so many times, never made money, and comes with substantial debt? (Admittedly, the $686m debt number is manageable – for Microsoft).
One eloquent answer comes from Brad Horowitz, a partner at the Andreessen Horowitz venture firm started by Netscape's founder. Horowitz invokes the network effect: A large number of users attracts more users and so on, in a kind of gravitation well:
500,000 new registered users per day – 170 million connected users – 30 million users communicating on the Skype platform concurrently – 209 billion voice and video minutes in 2010
And he concludes:
Today, I tip my hat to an old rival, Microsoft. By acquiring Skype, Microsoft becomes a much stronger player in mobile and the clear market leader in internet voice and video communications. More importantly, Microsoft gets a team, ably led by the exceptional Tony Bates, that can compete with anyone.
Well, this is a nice encomium to the guys who transformed the venture firm's $50m investment in Skype a few months ago into a $150m payday. My own venture investor hat is tipped to MM. Andreessen and Horowitz.
But not so much to Steve Ballmer.
Looking at Microsoft's recent quarterly numbers, we see the continuation of a now old and getting older tradition: losses in the Online Services Division. Only a few weeks ago, TechCrunch wondered: When Will Microsoft's Internet Bloodbath End? Business Insider provided a vivid illustration for the problem:
In just the past 12 months, Microsoft has lost $2.5bn in its online business. They spend $2 to make $1 in revenue. Buying and "integrating" Skype will make the picture even redder.
So, again, why spend $8.5bn on Skype?
The official explanation is that Skype will be targeted at professional users. For these, Microsoft already has a product called Lync, although not many have heard of it. And they have Messenger for consumers. (Actually, it's Windows Live Messenger for Windows and Microsoft Messenger for the Mac.) I don't think it's unfair to ask how, how well, and when Microsoft's Grand Unified Messaging platform will effectively exist, and how it will be monetised.
Given Microsoft's track record, there isn't much evidence of its ability to perform such integration, nor of its ability to move a big platform forward at a competitive pace, certainly not faster than what Google seems able to do with Google Voice, Talk and Google Video for Business.
The theory must be that every Windows PC will come with "Skype inside". But that isn't much progress: There are already 170 million connected Skype users, and 500,000 new registrations everyday. And imagine how carriers will react when they see a Skype client bundled with every Windows Phone 7 device, further pushing them towards their preordained destination: dumb pipes.
Today, Skype is joyfully used in both consumer and business environments. It's not perfect, but the price is right and Skype is now a verb. The next thing we know, Microsoft will take a good if imperfect service and "improve" it by integrating it with Office or SharePoint (a good product on its own). And, at some point, Microsoft will try to make us pay for it. In more ways than one.
But, again, the history isn't there. Microsoft's ability to successfully charge for a formerly free product is lacking.
Reactions to the Skype deal have been negative, if not downright derisive. Many see the Skype acquisition as more evidence that Microsoft can't innovate, or even effectively copy and out-implement any more. One local exec asked, rhetorically, how much it'd take to re-implement Skype. $100m? $1bn? It's not a question of money. Microsoft spends tons in R&D: 15% of sales, about $9bn per year. (Apple spends 2% of revenue, less than $2bn.) Think of iTunes: it's been out there for close to 10 years and there's no iTunes clone coming out of Redmond. Microsoft has to buy what it no longer has the people or the culture to create – or copy.
David Pogue, the NY Times' tech guru, thinks this acquisition will go where so many went before: to failure by mediocrity and to poisoning by matrix management.
Ben Brooks, a Microsoft shareholder – and not the disgruntled kind – comments on the Skype deal and concludes: The Ballmer Days Are Over. Perhaps, but who can tackle the job of turning Microsoft around?
In last year's 30 May Monday Note, I wrote Ballmer had opened the "Second Envelope". He was running out of explanations: first blame your predecessor, then fire a few subordinates. Next, you're out of excuses and out the door.
Since then, a few more subordinates have decided to "spend more time with their families": CTO Ray Ozzie, who wrote a long, long farewell memo (don't do that, it doesn't make you look good); tablet executive Bill Mitchell; Bob Muglia, president of the server and tools division. We'll exclude Stephen Elop, the president of the business division who went on to rescue Nokia, as he might have left of his own volition – or of his seeing Ballmer looking for the next excuse.
Last year, I noted Microsoft's stock had been stagnant for almost 10 years. Things haven't improved since then:
In the past 12 months, Microsoft's stock has fallen by 11% while the Nasdaq climbed 25%, Google 7%, and Apple 44%.
Having run out of ideas and envelopes, is Ballmer spending $8.5bn of Microsoft's $50bn cash, its biggest acquisition so far, as a desperate tentative to keep the company, or himself, in the game?



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hotmail New Features, Targeting Graymail


Microsoft's new Hotmail features are designed to remove clutter from users' email inboxes. Microsoft is tweaking Hotmail, aiming to remove endemic clutter from its users’ inboxes. These new tweaks, which are scheduled to roll out in coming weeks, target what the company called “graymail,” which include newsletters plus updates from social networks and Websites.
Hotmail’s latest graymail-killing features include a new newsletter-filtering function, which is paired with a one-click ability to have Hotmail tell various companies you no longer want to receive their daily or weekly email. (Hotmail will also eliminate that company’s emails currently residing in your inbox.)
“Despite the drastic decrease of true spam in the inbox, we found that most customers are still seeing newsletters, product offers, and other clutter,” Dick Craddock, group program manager for Hotmail, wrote in an Oct. 3 posting on The Windows Blog. “In fact, 75 percent of email identified as spam by our customers actually turns out to be unwanted graymail that they receive as a result of having signed up on a legitimate website.”
Hotmail’s other new features include a Schedule Cleanup, which will eliminate email from a specific address after three, ten, thirty or sixty days. A revamped flagging system automatically sorts important messages to the top of the inbox, and Custom Categories offer a way to personalize email sorting.
Over the past few quarters, Microsoft has worked to improve Hotmail on several different fronts. In July the company announced new security features designed to track down compromised user accounts and make passwords more secure, along with making it easier for users to reclaim their compromised accounts.
Microsoft’s “all in” cloud strategy has placed it on a head-on collision course with Google. In addition to Hotmail, Microsoft’s other consumer and business cloud services continue to battle the search-engine giant on several fronts, including search (Bing vs. Google’s core search franchise) and productivity (Office 365 vs. Google Apps).
Of course, the cloud comes with its own unique issues. Microsoft has wrestled with some outages for its cloud services over the past few months, including a significant one on the night of Sept. 8 that managed to knock out Hotmail, SkyDrive and other Live properties for a few hours.


-News Source (The Windows Blog & eWeek)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Nmap 5.59 BETA1 (With 40 new NSE scripts)



Nmap 5.59 BETA1 released. This version includes 40 new NSE scripts (plus improvements to many others), even more IPv6 goodness than the informal World IPv6 Day release, 7 new NSE protocol libraries and hundreds of bug fixes! This release also expands and improves IPv6 support!

o [NSE] Added 40 scripts, bringing the total to 217!  You can learn
 more about any of them at http://nmap.org/nsedoc/. Here are the new
 ones (authors listed in brackets):

 + afp-ls: Lists files and their attributes from Apple Filing
   Protocol (AFP) volumes. [Patrik Karlsson]

 + backorifice-brute: Performs brute force password auditing against
   the BackOrifice remote administration (trojan) service. [Gorjan
   Petrovski]

 + backorifice-info: Connects to a BackOrifice service and gathers
   information about the host and the BackOrifice service
   itself. [Gorjan Petrovski]

 + broadcast-avahi-dos: Attempts to discover hosts in the local
   network using the DNS Service Discovery protocol, then tests
   whether each host is vulnerable to the Avahi NULL UDP packet
   denial of service bug (CVE-2011-1002). [Djalal Harouni]

 + broadcast-netbios-master-browser: Attempts to discover master
   browsers and the Windows domains they manage. [Patrik Karlsson]

 + broadcast-novell-locate: Attempts to use the Service Location
   Protocol to discover Novell NetWare Core Protocol (NCP)
   servers. [Patrik Karlsson]

 + creds-summary: Lists all discovered credentials (e.g. from brute
   force and default password checking scripts) at end of scan.
   [Patrik Karlsson]

 + dns-brute: Attempts to enumerate DNS hostnames by brute force
   guessing of common subdomains. [Cirrus]

 + dns-nsec-enum: Attempts to discover target hosts' services using
   the DNS Service Discovery protocol. [Patrik Karlsson]

 + dpap-brute: Performs brute force password auditing against an
   iPhoto Library. [Patrik Karlsson]

 + epmd-info: Connects to Erlang Port Mapper Daemon (epmd) and
   retrieves a list of nodes with their respective port
   numbers. [Toni Ruottu]

 + http-affiliate-id: Grabs affiliate network IDs (e.g. Google
   AdSense or Analytics, Amazon Associates, etc.) from a web
   page. These can be used to identify pages with the same
   owner. [Hani Benhabiles, Daniel Miller]

 + http-barracuda-dir-traversal: Attempts to retrieve the
   configuration settings from a Barracuda Networks Spam & Virus
   Firewall device using the directory traversal vulnerability
   described at
   http://seclists.org/fulldisclosure/2010/Oct/119. [Brendan Coles]

 + http-cakephp-version: Obtains the CakePHP version of a web
   application built with the CakePHP framework by fingerprinting
   default files shipped with the CakePHP framework. [Paulino
   Calderon]

 + http-majordomo2-dir-traversal: Exploits a directory traversal
   vulnerability existing in the Majordomo2 mailing list manager to
   retrieve remote files. (CVE-2011-0049). [Paulino Calderon]

 + http-wp-plugins: Tries to obtain a list of installed WordPress
   plugins by brute force testing for known plugins. [Ange Gutek]

 + ip-geolocation-geobytes: Tries to identify the physical location
   of an IP address using the Geobytes geolocation web service
   (http://www.geobytes.com/iplocator.htm). [Gorjan Petrovski]

 + ip-geolocation-geoplugin: Tries to identify the physical location
   of an IP address using the Geoplugin geolocation web service
   (http://www.geoplugin.com/). [Gorjan Petrovski]

 + ip-geolocation-ipinfodb: Tries to identify the physical location
   of an IP address using the IPInfoDB geolocation web service
   (http://ipinfodb.com/ip_location_api.php). [Gorjan Petrovski]

 + ip-geolocation-maxmind: Tries to identify the physical location of
   an IP address using a Geolocation Maxmind database file (available
   from http://www.maxmind.com/app/ip-location). [Gorjan Petrovski]

 + ldap-novell-getpass: Attempts to retrieve the Novell Universal
   Password for a user. You must already have (and include in script
   arguments) the username and password for an eDirectory server
   administrative account. [Patrik Karlsson]

 + mac-geolocation: Looks up geolocation information for BSSID (MAC)
   addresses of WiFi access points in the Google geolocation
   database. [Gorjan Petrovski]

 + mysql-audit: Audit MySQL database server security configuration
   against parts of the CIS MySQL v1.0.2 benchmark (the engine can
   also be used for other MySQL audits by creating appropriate audit
   files).  [Patrik Karlsson]

 + ncp-enum-users: Retrieves a list of all eDirectory users from the
   Novell NetWare Core Protocol (NCP) service. [Patrik Karlsson]

 + ncp-serverinfo: Retrieves eDirectory server information (OS
   version, server name, mounts, etc.) from the Novell NetWare Core
   Protocol (NCP) service. [Patrik Karlsson]

 + nping-brute: Performs brute force password auditing against an
   Nping Echo service. [Toni Ruottu]

 + omp2-brute: Performs brute force password auditing against the
   OpenVAS manager using OMPv2. [Henri Doreau]

 + omp2-enum-targets: Attempts to retrieve the list of target systems
   and networks from an OpenVAS Manager server. [Henri Doreau]

 + ovs-agent-version: Detects the version of an Oracle OVSAgentServer
   by fingerprinting responses to an HTTP GET request and an XML-RPC
   method call. [David Fifield]

 + quake3-master-getservers: Queries Quake3-style master servers for
   game servers (many games other than Quake 3 use this same
   protocol). [Toni Ruottu]

 + servicetags: Attempts to extract system information (OS, hardware,
   etc.) from the Sun Service Tags service agent (UDP port
   6481). [Matthew Flanagan]

 + sip-brute: Performs brute force password auditing against Session
   Initiation Protocol (SIP -

http://en.wikipedia.org/wiki/Session_Initiation_Protocol)

   accounts.  This protocol is most commonly associated with VoIP
   sessions. [Patrik Karlsson]

 + sip-enum-users: Attempts to enumerate valid SIP user accounts.
   Currently only the SIP server Asterisk is supported. [Patrik
   Karlsson]

 + smb-mbenum: Queries information managed by the Windows Master
   Browser. [Patrik Karlsson]

 + smtp-vuln-cve2010-4344: Checks for and/or exploits a heap overflow
   within versions of Exim prior to version 4.69 (CVE-2010-4344) and
   a privilege escalation vulnerability in Exim 4.72 and prior
   (CVE-2010-4345). [Djalal Harouni]

 + smtp-vuln-cve2011-1720: Checks for a memory corruption in the
   Postfix SMTP server when it uses Cyrus SASL library authentication
   mechanisms (CVE-2011-1720).  This vulnerability can allow denial
   of service and possibly remote code execution. [Djalal Harouni]

 + snmp-ios-config: Attempts to downloads Cisco router IOS
   configuration files using SNMP RW (v1) and display or save
   them. [Vikas Singhal, Patrik Karlsson]

 + ssl-known-key: Checks whether the SSL certificate used by a host
   has a fingerprint that matches an included database of problematic
   keys. [Mak Kolybabi]

 + targets-sniffer: Sniffs the local network for a configurable
   amount of time (10 seconds by default) and prints discovered
   addresses. If the newtargets script argument is set, discovered
   addresses are added to the scan queue. [Nick Nikolaou]

 + xmpp: Connects to an XMPP server (port 5222) and collects server
   information such as supported auth mechanisms, compression methods
   and whether TLS is supported and mandatory. [Vasiliy Kulikov]

o Nmap has long supported IPv6 for basic (connect) port scans, basic
 host discovery, version detection, Nmap Scripting Engine.  This
 release dramatically expands and improves IPv6 support:
 + IPv6 raw packet scans (including SYN scan, UDP scan, ACK scan,
   etc.) are now supported. [David, Weilin]
 + IPv6 raw packet host discovery (IPv6 echo requests, TCP/UDP
   discovery packets, etc.) is now supported. [David, Weilin]
 + IPv6 traceroute is now supported [David]
 + IPv6 protocol scan (-sO) is now supported, including creating
   realistic headers for many protocols. [David]
 + IPv6 support to the wsdd, dnssd and upnp NSE libraries. [Daniel
   Miller, Patrik]
 + The --exclude and --excludefile now support IPV6 addresses with
   netmasks.  [Colin]

o Scanme.Nmap.Org (the system anyone is allowed to scan for testing
 purposes) is now dual-stacked (has an IPv6 address as well as IPv4)
 so you can scan it during IPv6 testing.  We also added a DNS record
 for ScanmeV6.nmap.org which is IPv6-only. See
 http://seclists.org/nmap-dev/2011/q2/428. [Fyodor]

o The Nmap.Org website as well as sister sites Insecure.Org,
 SecLists.Org, and SecTools.Org all have working IPv6 addresses now
 (dual stacked). [Fyodor]

o Nmap now determines the filesystem location it is being run from and
 that path is now included early in the search path for data files
 (such as nmap-services).  This reduces the likelihood of needing to
 specify --datadir or getting data files from a different version of
 Nmap installed on the system.  For full details, see
 http://nmap.org/book/data-files-replacing-data-files.html.  Thanks
 to Solar Designer for implementation advice. [David]

o Created a page on our SecWiki for collecting Nmap script ideas! If
 you have a good idea, post it to the incoming section of the page.
 Or if you're in a script writing mood but don't know what to write,
 come here for inspiration: https://secwiki.org/w/Nmap_Script_Ideas.

o The development pace has greatly increased because Google (again)
 sponsored a 7 full-time college and graduate student programmer
 interns this summer as part of their Summer of Code program!
 Thanks, Google Open Source Department!  We're delighted to introduce
 the team: http://seclists.org/nmap-dev/2011/q2/312

o [NSE] Added 7 new protocol libraries, bringing the total to 66.  You
 can read about them all at http://nmap.org/nsedoc/. Here are the new
 ones (authors listed in brackets):

 + creds: Handles storage and retrieval of discovered credentials
   (such as passwords discovered by brute force scripts). [Patrik
   Karlsson]

 + ncp: A tiny implementation of Novell Netware Core Protocol
   (NCP). [Patrik Karlsson]

 + omp2: OpenVAS Management Protocol (OMP) version 2 support. [Henri
   Doreau]

 + sip: Supports a limited subset of SIP commands and
   methods. [Patrik Karlsson]

 + smtp: Simple Mail Transfer Protocol (SMTP) operations. [Djalal
   Harouni]

 + srvloc: A relatively small implementation of the Service Location
   Protocol. [Patrik Karlsson]

 + tftp: Implements a minimal TFTP server. It is used in
   snmp-ios-config to obtain router config files.[Patrik Karlsson]

o Improved Nmap's service/version detection database by adding:
 + Apple iPhoto (DPAP) protocol probe [Patrik]
 + Zend Java Bridge probe [Michael Schierl]
 + BackOrifice probe [Gorjan Petrovski]
 + GKrellM probe [Toni Ruotto]
 + Signature improvements for a wide variety of services (we now have
   7,375 signatures)

o [NSE] ssh-hostkey now additionally has a postrule that prints hosts
 found during the scan which share the same hostkey. [Henri Doreau]

o [NSE] Added 300+ new signatures to http-enum which look for admin
 directories, JBoss, Tomcat, TikiWiki, Majordomo2, MS SQL, WordPress,
 and more. [Paulino]

o Made the final IP address space assignment update as all available
 IPv4 address blocks have now been allocated to the regional
 registries.  Our random IP generation (-iR) logic now only excludes
 the various reserved blocks.  Thanks to Kris for years of regular
 updates to this function!

o [NSE] Replaced http-trace with a new more effective version. [Paulino]

o Performed some output cleanup work to remove unimportant status
 lines so that it is easier to find the good stuff! [David]

o [Zenmap] now properly kills Nmap scan subprocess when you cancel a
 scan or quit Zenmap on Windows. [Shinnok]

o [NSE] Banned scripts from being in both the "default" and
 "intrusive" categories.  We did this by removing dhcp-discover and
 dns-zone-transfer from the set of scripts run by default (leaving
 them "intrusive"), and reclassifying dns-recursion, ftp-bounce,
 http-open-proxy, and socks-open-proxy as "safe" rather than
 "intrusive" (keeping them in the "default" set).

o [NSE] Added a credential storage library (creds.lua) and modified
 the brute library and scripts to make use of it. [Patrik]

o [Ncat] Created a portable version of ncat.exe that you can just drop
 onto Microsoft Windows systems without having to run any installer
 or copy over extra library files. See the Ncat page
 (http://nmap.org/ncat/) for binary downloads and a link to build
 instructions. [Shinnok]

o Fix a segmentation fault which could occur when running Nmap on
 various Android-based phones.  The problem related to NULL being
 passed to freeaddrinfo(). [David, Vlatko Kosturjak]

o [NSE] The host.bin_ip and host.bin_ip_src entries now also work with
 16-byte IPv6 addresses. [David]

o [Ncat] Updated the ca-bundle.crt list of trusted certificate
 authority certificates. [David]

o [NSE] Fixed a bug in the SMB Authentication library which could
 prevent concurrently running scripts with valid credentials from
 logging in. [Chris Woodbury]

o [NSE] Re-worked http-form-brute.nse to better autodetect form
 fields, allow brute force attempts where only the password (no
 username) is needed, follow HTTP redirects, and better detect
 incorrect login attempts. [Patrik, Daniel Miller]

o [Zenmap] Changed the "slow comprehensive scan" profile's NSE script
 selection from "all" to "default or (discovery and safe)"
 categories.  Except for testing and debugging, "--script all" is
 rarely desirable.

o [NSE] Added the stdnse.silent_require method which is used for
 library requires that you know might fail (e.g. "openssl" fails if
 Nmap was compiled without that library).  If these libraries are
 called with silent_require and fail to load, the script will cease
 running but the user won't be presented with ugly failure messages
 as would happen with a normal require. [Patrick Donnelly]

o [Ncat] ncat now listens on both localhost and ::1 when you run ncat
 -l. It works as before if you specify -4 or -6 or a specific
 address. [Colin Rice]

o [Zenmap] Fixed a bug in topology mapper which caused endpoints
 behind firewalls to sometimes show up in the wrong place (see
 http://seclists.org/nmap-dev/2011/q2/733).  [Colin Rice]

o [Zenmap] If you scan a system twice, any open ports from the first
 scan which are closed in the 2nd will be properly marked as
 closed. [Colin Rice].

o [Zenmap] Fixed an error that could cause a crash ("TypeError: an
 integer is required") if a sort column in the ports table was unset.
 [David]

o [Ndiff] Added nmaprun element information (Nmap version, scan date,
 etc.) to the diff.  Also, the Nmap banner with version number and
 data is now only printed if there were other differences in the
 scan. [Daniel Miller, David, Dr. Jesus]

o [NSE] Added nmap.get_interface and nmap.get_interface_info functions
 so scripts can access characteristics of the scanning interface.
 Removed nmap.get_interface_link. [Djalal]

o Fixed an overflow in scan elapsed time display that caused negative
 times to be printed after about 25 days. [Daniel Miller]

o Updated nmap-rpc from the master list, now maintained by IANA.
 [Daniel Miller, David]

o [Zenmap] Fixed a bug in the option parser: -sN (null scan) was
 interpreted as -sn (no port scan). This was reported by
 Shitaneddine. [David]

o [Ndiff] Fixed the Mac OS X packages to use the correct path for
 Python: /usr/bin/python instead of /opt/local/bin/python. The bug
 was reported by Wellington Castello. [David]

o Removed the -sR (RPC scan) option--it is now an alias for -sV
 (version scan), which always does RPC scan when an rpcinfo service
 is detected.

o [NSE] Improved the ms-sql scripts and library in several ways:
 - Improved version detection and server discovery
 - Added support for named pipes, integrated authentication, and
   connecting to instances by name or port
 - Improved script and library stability and documentation.
 [Patrik Karlsson, Chris Woodbury]

o [NSE] Fixed http.validate_options when handling a cookie table.
 [Sebastian Prengel]

o Added a Service Tags UDP probe for port 6481/udp. [David]

o [NSE] Enabled firewalk.nse to automatically find the gateways at
 which probes are dropped and fixed various bugs. [Henri Doreau]

o [Zenmap] Worked around a pycairo bug that prevented saving the
 topology graphic as PNG on Windows: "Error Saving Snapshot:
 Surface.write_to_png takes one argument which must be a filename
 (str), file object, or a file-like object which has a 'write' method
 (like StringIO)". The problem was reported by Alex Kah. [David]

o The -V and --version options now show the platform Nmap was compiled
 on, which features are compiled in, the version numbers of libraries
 it is linked against, and whether the libraries are the ones that
 come with Nmap or the operating system.  [Ambarisha B., David]

o Fixed some inconsistencies in nmap-os-db reported by Xavier Sudre
 from netVigilance.

o The Nmap Win32 uninstaller now properly deletes nping.exe. [Fyodor]

o [NSE] Added a shortport.ssl function which can be used as a script
 portrule to match SSL services.  It is similar in concept to our
 existing shortport.http. [David]

o Set up the RPM build to use the compat-glibc and compat-gcc-34-c++
 packages (on CentOS 5.3) to resolve a report of Nmap failing to run
 on old versions of Glibc. [David]

o We no longer support Nmap on versions of Windows earlier than XP
 SP2.  Even Microsoft no longer supports Windows versions that old.
 But if you must use Nmap on such systems anyway, please see

https://secwiki.org/w/Nmap_On_Old_Windows_Releases.

o There were hundreds of other little bug fixes and improvements
 (especially to NSE scripts).  See the SVN logs for revisions 22,274
 through 24,460 for details.

To Download Nmap 5.59 BETA 1 Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...