Saturday, February 23, 2008

SPOOFING FEVER

In the context of cyber crime spoofing is a technique to masquerade a MAC address and by this a spoof er can gain an illegitimate advantage.

For example if i am a spoof er between two persons A and B. I'll be able to attack person B by making him believe that i am a person A and similarly i can attack A by making him believe that i am person B. For this the attacker has to trace the packets coming from A and after the sequence of packets is guessed it knocks out A and injects his own packets. However the spoofing can be blocked by A,s firewall.



Spoofing has made progress in almost every kind of computer networking and hance it is having a lot of types:

1> URL Spoofing: URL spoofing is also known as "web spoofing" and "Phishing". In this type of spoofing the attacker selects a "look a like" URL address of some legal website (e.g. of the bank,or orkot in place of orkut) making the visitors fool and gaining access to their username and passwords.
This type of spoofing can be done by illegal use of web browser bugs that displays incorrect URLs or by DNS poisoning. So that uers are distracted from the legitimate URLs.

2>Referer Spoofing: Some websites, especially pornographic paysites allow access to their materials only from certain approved (login-) pages. This is enforced by checking the referer header of the request. This referer header however can be changed , allowing users to gain unauthorized access to the materials.

3>Spoofing file sharing networks: Most of the file sharing websites use this type of spoofing to discourage downloading from these sources by using distorted data, uploading empty or mislabeled files. e.g. RIAA (Resource Industry Association of America) started spoofing their file sharing servers last summer. They began uploading files that seemed to be popular song but actually it contains the song chorus or recording of an artist scolding file sharing server. By this a person has to find a lot for his/her favourite song.

4>Email address spoofing: Email spoofing is very common now a days. Attacker or Spammers hide the origin and this leads to problems such as misdirected bounces. Spammer uses a reliable form so that it can get authority and trust, thus if some victim replies ,the reply is delivered to spammers email address.

5>Caller ID Spoofing: when ever someone gets a call it also gets the caller ID of caller at his respective phone or mobile. But now there is a technology that a caller can hide or falsify his ID because there are services and gateways on the network, the false caller ID can be sent.

6>Login spoofing: A victim is presented an ordinary username and password login page of a legitimate website but he/she does'nt knows that a malacious program is running behind.

As described above spoofing has made much progress in computer network world and it has many faces which are beyond the scope of this blog.

The illegal use of spoofing as described above is definitely a cyber crime because most of spammers or spoofers are actually misleading, cheating and trying to peek into the privicy of their victims.But there is also a good aspect of spoofing i.e. if the MAC or IP address were unique for each person then it were very easy for a government or authority to trace it out and length of IP address would also increase as well.

Thus spoofing has both the good as well as bad aspects and it has to be controlled no to be finnished.

REVIEW OF "THE FUTURE OF IDEAS" : CHAPTER 1 "FREE"

1) How does copyright impede creativity?
Copyright imposes restriction on one's ability to think creatively by restricting the resources he/she want to use in his work. And if the creative work is done out of the scope of copyright, is considered illegal. Creativity is the ability to create a unique thing, but to do this one needs an open atmosphere where he/she breathe easily with no suppression. It impedes one’s freedom to express his/her thoughts and blocks one’s ability of thinking.

2) What 'blindness' is Lessig talking about on page 6?·
The struggle or craze for property.

3) Why are costs of production falling?·
Innovation in new technological developments is the real fact for falling of cost of production. Features in the production are increased by keeping in mind the economy and efficiency.For this the tool used is called technology. For example, the innovation of digital technology which left behind non-digital technology as it is more efficient and radically reduced the cost of non-digital technology.

4) What, according to Lessig, does the word 'consumer' signify? [p9] Do you think that blog writers, digital artists and music mixers are strictly consumers of Internet services? Why or why not?·
Consumer is an ordinary person, who utilizes economic goods such as digital technology. He/she uses other creativity and become part of a creative process.

5) How does 'socialism' differ with 'capitalism' in the regulation of resources?·
In socialism, property and the regulation of resources are subjected to control by the community while in capitalism means of production or regulation of resources are predominantly private which is privately owned and operated. Investments, distribution, income, production, prices of goods and services are determined through the operation of market economy.

6) What defines 'free resource' in a society? ·
If no permission is required to use a cirtain resource then it is called a free resource.

7) How is resource production different from resource access?

In simple words the production of resource is thecreation of resource and requires the capital and the usage of a resource is resourse access and that resource can help us in some other resouce production

8) What might be the disadvantage of forcing all resources to be free?·
Control yield more innovation and creativity, otherwise, one would have little incentive to work to produce the resource.
You can download "THE FUTURE OF IDEAS" by clicking here