IT104 Presentation of it
Wednesday, July 14, 2010
mess db,0ah,0dh,'Enter 5 character:$'
mess1 db,0ah,0dh,'You enter:$'
bk db ?
ck db ?
dk db ?
ek db ?
start:
mov ah,09h
lea dx,mess
int 21h
mov ah,07h
int 21h
mov ah,02h
mob bl,al
mov dl,bl
int 21h
mov ah,07h
int 21h
mov ah,02h
mov bk,al
mov dl,bk
int 21h
mov ah,07h
int 21h
mov ah,02h
mov ck,al
mov dl,ck
int 21h
mov ah,07h
int 21h
mov ah,02h
mov dk,al
mov dl,dk
int 21h
mov ah,07h
int 21h
mov ah,02h
mov ek,al
mov dl,ek
int 21h
mov ah,09h
lea dx,mess1
int 21h
mov ah,02h
mov dl,ek
int 21h
mov ah,02h
mov dl,dk
int 21h
mov ah,02h
mov dl,ck
int 21h
mov ah,02h
mov dl,bk
int 21h
mov ah,02h
mov dl,bl
int 21h
int 20h
Monday, February 15, 2010
Key Provisions of USA Patriot Act.
The Provisions are:
Section 201 - Gives federal officials the authority to intercept wire, spoken and electronic communications relating to terrorism.
Section 202 - Gives federal officials the authority to intercept wire, spoken and electronic communications relating to computer fraud and abuse offenses.
Subsection 203(b) - Permits the sharing of grand jury information that involves foreign intelligence or counterintelligence with federal law enforcement, intelligence, protective, immigration, national defense or national security officials
Subsection 203(d) - Gives foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained as part of a criminal investigation with law enforcement.
Section 204 - Makes clear that nothing in the law regarding pen registers - an electronic device which records all numbers dialed from a particular phone line _ stops the government's ability to obtain foreign intelligence information.
Section 206 - Allows federal officials to issue roving "John Doe" wiretaps, which allow investigators to listen in on any telephone and tap any computer they think a suspected spy or terrorist might use.
Section 207 - Increases the amount of time that federal officials may watch people they suspect are spies or terrorists.
Section 209 - Permits the seizure of voicemail messages under a warrant.
Section 212 - Permits Internet service providers and other electronic communication and remote computing service providers to hand over records and e-mails to federal officials in emergency situations.
Section 214 - Allows use of a pen register or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism or spy investigations.
Section 215 - Authorizes federal officials to obtain "tangible items" like business records, including those from libraries and bookstores, for foreign intelligence and international terrorism investigations.
Section 217 - Makes it lawful to intercept the wire or electronic communication of a computer hacker or intruder in certain circumstances.
Section 218 - Allows federal officials to wiretap or watch suspects if foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order. The pre-Patriot Act standard said officials could ask for the surveillance only if it was the sole or main purpose.
Section 220 - Provides for nationwide service of search warrants for electronic evidence.
Section 223 - Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information gathered under this act.
Section 225 - Amends FISA to prohibit lawsuits against people or companies that provide information to federal officials for a terrorism investigation.
© 2005 Associated Press. All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed.
Monday, January 25, 2010
*The degree to which an individual can determine which personal information is to be shared with whom and for what purpose. Although always a concern when users pass confidential information to vendors by phone, mail or fax, the Internet has brought this issue to the forefront. Web sites often have privacy policies that stipulate exactly what will be done with the information you enter. For more information, visit www.privacyalliance.org and www.epic.org. Contrast with confidentiality, which deals with unauthorized access to data. See privacy policy, CPO, EU Directive, GLB, HIPAA and P3P.
"Computer Privacy Under the Law"
- The Fair Credit Reporting Act (1970)
- Privacy Act of 1974
- Family Education Rights and Privacy Act (1974)
- Right to Financial Privacy Act (1978)
- Privacy Protection Act of 1980
- Cable Communications Policy Act of 1984
- Electronic Communications Privacy Act (1986)
- Video Privacy Protection Act of 1988
- Telephone Consumer Protection Act of 1991
- Driver's Privacy Protection Act of 1994
- Communications Assistance for Law Enforcement Act of 1994
- Telecommunications Act of 1996
- Health Insurance Portability and Accountability Act of 1996
- Children's Online Privacy Protection Act (COPPA) of 1998
- Financial Modernization Act (Gramm-Leach-Bliley Act) (2000)
Monday, January 18, 2010

Zero-day Attack
Zero day attacks can devastate a network. These are the attacks that target application vulnerabilities that are unknown to the application's creators and for which no patch yet exists. By exploiting these vulnerabilities, attackers can enter your network to execute code. In the worst case, an attacker can exploit these flaws to gain complete control of a victim's computer.
To be protected from malicious zero day threats, you must have proactive zero day defenses already in place when the attack is launched. You get this critical level of protection with the Firebox® X family of Unified Threat Management security appliances.
What "Zero Day" is All About
There's a lot of buzz in the security industry about "Zero Day" attack protection, but vendors differ substantially in the protection they really provide.
- Zero Day threats are new or unknown attacks for which a patch or signature has not been written
- Zero Day protection, therefore, means being protected against a new and unknown threat before the vulnerability is discovered and the exploit is created and launched.
Monday, January 11, 2010
*Convention on Cybercrime
Objectives: Set out in the preamble, is to pursue a common criminal policy.
*Encurve LLC-Hacktivism and Politically Motivated Computer Crime
Objectives: Covers a wide range of online activity to promote the objectives of individuals, groups or nations: Espionage ...
*Industrial Spies and Organized Crime Groups
Objectives: Their goals are profit-based. Their sub-goals include attacks on infrastructure for profit to competitors or other groups listed above, theft of trade secrets, and gain access and blackmail affected industry using potential public exposure as a threat.
*Terrorists
Objectives: Their goal is to spread terror throughout the U.S. civilian population. Their sub-goals include: attacks to cause 50,000 or more casualties within the U.S. and attacks to weaken the U.S. economy to detract from the Global War on Terror.
*National Governments
Objectives: Their goal is to weaken, disrupt or destroy the U.S. Their sub-goals include espionage for attack purposes, espionage for technology advancement, disruption of infrastructure to attack the US economy, full scale attack of the infrastructure when attacked by the U.S. to damage the ability of the US to continue its attacks.
1.) If I were hired as an security consultant with the this kind problem which is hacking, the first thing I would do is follow the seven ethical ways of data. Then try to understand everything that the hacker is doing as for me to know anything about it. It's not easy to solve a problem like that, that's why I should do all the things to know who are those hackers who made that crimes.
2.) Being a friend, all I can do is advising or try to talk to him in simple manner as to assure that maybe he/she would change his/her mind. But, a virus he made cannot easily erase that's his the only one who can made it, so being as a friend of him I would sincerely try to pleasing him not to do that crime as for the safeness of everyone.

Monday, November 23, 2009
Are IT workers professionals? Yes or No?
As for me, yes because IT workers study hard about computer, and it's non-sense if they will not use their profession being an Information Technology. IT workers also professional not only because they finish the course but also they worked hard for that profession to have a job that suets for their profession. As by now, that in our community IT graduates are easy to find a job. We all know that, IT are also one of the common courses aside from nursing that are now probably related to our economy. Calling agent is one of the example of IT workers that helps our country (Philippines) today, because of their help many other foreign country are investing and by the help of IT workers. Now that our modern days are more hi-tech, it is better that IT workers should develop our modern lives for the good of our community.