How to prevent cyber terrorism  taragana
Upcoming SlideShare
Loading in...5
×
 

How to prevent cyber terrorism taragana

on

  • 4,773 views

 

Statistics

Views

Total Views
4,773
Views on SlideShare
4,773
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

How to prevent cyber terrorism  taragana How to prevent cyber terrorism taragana Document Transcript

  • Breaking News Entertainment Gadgets Sports PR News WordPress Freebies Shopping Mall « Deal of the Day: Get a Pen, Stylus, Laser Pointer, LED Flashlight and UV Light within $10!!! Apple Releases iPhone 2.2 Software Update - Happy Holidays! » Voted 11 Angsuman Chakraborty November 22nd, 2008 Topics (map) » News (1973) » Web (1916) » Technology (1252) » How To (910) » Web Services (840) » India (689) » Information Technology (663) » Microsoft (627) » Google (609) » Pro Blogging (470) Taragana Network Enterprise Blog Free Book on Eye Care by Natural Therapy Gadgetophilia - Gadget guide for gadget addicts Hot Computer Jobs Blog Startup Database Taragana - Software Outsourcing Blog Stats There are currently 5,842 posts and 15,385 comments in this weblog. Enjoy! Translate Subscribe by Email... 9748644 translated pages served by Angsuman's Translator Plugin Gold since May 2007. Cache hit : 96.65% Cache miss : 3.35% Simple solutions for complex problems. How to Prevent CyberTerrorism and Software Piracy Through Validy SoftNaos - A Technical Perspective Cyber terrorism, data theft and piracy are three of the most concerning factors for any software developer or a learned internet user. We have always looked forward to numerous softwares as they claim to prevent any trespasser but in vain. None of them have been efficient enough and that is the reason why we are here to tell you about a new and unknown technology, Validy Softnaos (which was given to us to for reviewing purpose and have a technological insight) It uses a hardware-software bridge that works efficiently to prevent any unauthorized activity. What is Validy Technology Validy Technology (VT) is a system which protects software against piracy and ensures software integrity. It uses a combination of software compilation techniques and of a small secure hardware device called a token. If you look at this following pic, you will understand the technology behind Validy's. You can see that there is a co-processor that works under a Secure Token (an USB dongle) and executes the program there itself Validy Softnaos Validy SoftNaos for Java is a software protection product targeted at software publishers who develop Java applications. It prevents software piracy and ensures software integrity by combining software transformation with a piece of secure hardware (a secure token of USB dongle). How Does it Work To perform the protection by Validy SoftNaos for Java, a post-compiler transforms the Java bytecode of the application. Unless a Validy SoftNaos USB token is attached to the PC, the protected application can not run anymore. At runtime, the token becomes an extension of the main processor. It contains a subset of the application's state and executes the parts of the application that use or modify this state. The token is a slave co-processor, receiving a flow of encrypted instructions and exchanging data with the main processor through the USB interface. The whole concept of Validy Softnaos protection works on enciphering and deciphering of encryption. Because the only link between a protected application and the token is a cryptographic key. The post-compiler enciphers instructions using a secret key at protection time and the token deciphers them at runtime using the same key. Protection over Data in Co Processor (Technical Aspect) How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 1 sur 4 05/09/2010 10:42
  • Poll What is your favorite Open Source Database MySQL PostgreSQL Firebird GNU SQL Server SAP MaxDB ScimoreDB DXstore database system HSQLDB CloudDB Other (please specify in comments below) View Results Comments Show all Polls Latest Tweets How To ronpruett If you need rtention in your group I know how to know how to do it. namurien Learn How To Live Off The Grid http://bit.ly/Q8vsX thisuserexists Just updated my blog @ articles24.com :-) How To Make Money As A Kid Online? http://tinyurl.com/yjm2gzq gottchacheater How To Come Back Stronger Than Ever After Infidelity http://bit.ly/17Cbq3 ReneMGuru Internet Marketing 101: How to increase cause email efforts: Several email marketing businesses can help market.. http://bit.ly/vuPCp Berthavsksy How to you make a dish washer into a snow blower? Give the bitch a shovel _beccaboo_ Man I wish my chemistry teacher knew how to write proper instructions. Confused. I'll figure it out eventually though. JimmyJames70 For some reason I'm getting flashbacks of Jeremy Giambi forgetting how to slide in an A's playoff game from many years ago paulosuzart how to pass an http session to #lift session? i will try to mock it. :) Claim Blogussion Claim Your Facebook Fan Page Username http://bit.ly/ljjHA APCPro We'd like to give a mini gallery wrap to 5 APC tweeps that help fight diabetes w/ @rhedpixel http://bit.ly/4iBNrs DM 2 claim. imabima planning to go to the Claim Company at Northbrook Court for lunch tomorrow. The whole world is telling me it's the greatest. wiselark Waitangi 262 claim for cultural and intellectual property affects Archives [along with @NLNZ and @TePapa] #lianza09 JamesPinnell Amazon claim "higher operating costs outside the US" for a 40% increase in costs for Aussie Kindle. Umm, what? http://is.gd/4eFPU GameTheSystem Twitter Nope Were Not Doing Video Tweets: We commented a few hours ago on a claim in the Telegraph newspaper th.. http://bit.ly/NxuYO elpie Sorting out insurance claim for the storm damage. Shame we can't claim for trees and destroyed plants. KingMikeMac I commented on a YouTube video -- laci, what is this I hear about you filing a false DMCA claim because... http://bit.ly/3aCvZz Latest Friend Feeds Technology petrbuben Training to Climb an Everest of Digital Data petrbuben Link by Link: Is It a Day to Be Happy Check the Index petrbuben Closing the Deal at the Virtual Checkout Counter tombiro Powermat Cuts the Cord seyedkamal 2006 � �!! // http://www.guardian.co.uk/technology /2006/oct/11/news.iran // // ... livechina China Techfaith Wireless Communication Technology Up 113.4% Since smartrend's ... - FOXBusiness erikmitk [Geeks Are Sexy] Technology News - We make technology sexy randomnescence 13th Rajiv Gandhi Science and Technology lecture organised - Times of India ludtke Twitter to introduce live video-tweeting mattis RT @yorkshireforum #classified ads, #discussions, #technology help, #video forums,#joke forum, #leeds,#sheffield,#doncaster,#york,#bradford deeped 50 things that are being killed by the internet - Telegraph pacepe How Google Wave could transform journalism | Technology | Los Angeles Times hanifisko i am tired using technology ksna - POS ... cashflowco Who might see the value of receiving mental health services via "live" web casted therapy sessions. cantorjf Tiny 'nuclear batteries' unveiled - BBC NEWS petrbuben Tough choices for feds giving out broadband money ruv TwittMaster.Com � Technology as of October 11, 2009 jamesketchell NewScientist #Innovation: The #psychology of #Google Wave (http://bit.ly/3629QM) #GoogleWave #human #brain #mind #technology wonojo @adrt80 for what i've paid on the n96 i was really hoping the technology wouldn't be obsolete in less than a year. nokia makes me sad. Java Software The protection of an application with Validy Technology begins with the relocation of some of the instance and static fields of some of its classes inside the memory of the secure coprocessor. When such a transformed class is loaded or such a transformed object is created, a chunk of memory is allocated in the heap of the coprocessor to hold the values of the relocated fields. In the transformed classes, the relocated instance and static fields are replaced by the address of these chunks of memory. These addresses are stored in two fields named k$this and k$class for instance and static fields respectively. Figure 3.1 shows an object of class A and its fields before and after the relocation of two fields to the coprocessor. What's More? What I liked the most about this product was its use of tags. The tags mechanism is easy to implement and runs fast because it involves only simple operations. It is however extremely powerful because additional instructions can be tied to the original ones using tags. This makes it simple, fast and yet secure. Validy USB Token The Validy USB token is built around a secure micro-controller running the firmware for one or more of the following Validy applications: Validy Softnaos, Validy WebBusiness, Validy FileCrypt, or Validy SmartLicense. The main characteristics of the micro-controller are: 32 bit architecture 256 Kbytes of ROM (for the code) 32 Kbytes of EPROM (for permanent data) 8 Kbytes of RAM (for the working set of applications) 256 Kbytes of external ciphered RAM (used as a paging area by Validy SoftNaos) USB full speed interface (12 Mbit/s) Cryptographic accelerator for DES and Triple DES Cryptographic accelerator for RSA up to 1024 bit keys (or 2048 bits using the Chinese Remainder Theorem) Countermeasures to protect against physical attacks. Advantages * strong protection against software piracy without undue control of the user's machine or breach of privacy * low impact on the development and distribution of the software: protection is mostly automated, application updates can be produced after the tokens are in the field * integrity checks or accesses to token cryptographic resources (for authentication or signature) can be added and securely tied to other token instructions How to Install Simply run the vldy-softnaos-eval-1.0.x.y.jar installer. After execution, you will find the following directories under the install root location you have chosen: lib: The jar files for the translator, annotations, Ant task, virtual coprocessor, and interface with the secure coprocessor. liblibs: The third party libraries used by the translator. doc: This evaluation guide in PDF and HTML formats. examples: Sample applications. To use the actual secure coprocessor, the runtime that communicates with a hardware token instead of simulating it must be used. The jar file vldy-tech- vruntime.jar must be replaced by vldy-tech-runtime.jar on the class How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 2 sur 4 05/09/2010 10:42
  • scorpfromhell Larry Ellison - Oracle is committed to Sun - hardware, software, Java, MySql, more R&D $$$ #oow09 intellibitz RT @Mrgareth Father of Java James Gosling says he is "absolutely" excited about working for the #1 business software co http://ff.im/9DHFh intellibitz #java #job - FAT32 Software developer Software engineer ($16/hr) - http://donanza.com/t/990718 #jobs brhubart Bob #oow09 - Gosling on Java at Oracle: "I've never worked for a software company." mrgareth1 Father of Java - James Gosling - says he is "absolutely" excited about working for the number one business software company #OOW09 brhubart #oow09 - Gosling on Java at Oracle: "I've never worked for a software company." edans An Oyster Card has more computing power than the first computer I wrote software for, and it runs on Java... tonybaer For #Java best news is Java now managed by SOFTWARE company #oow09 gotti Object-Oriented Software Engineering: Practical Software Development using UML and Java by Robert Laganiere intellibitz Graduate Java Developer J2EE JEE Travel Industry job in Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev itjobstweet Graduate Java Developer J2EE JEE Travel Industry job in Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev rezvaneh - eddieawad Enterprise Software Development with Java: Oracle OpenWorld Live jamessmith24 #Java Java Swing Developer - Algorithmic Trading - Software: My client are a technology driven software ho.. http://bit.ly /KSP4x tysonlundbech GetJar: Free Java, Symbian, Windows Mobile, BlackBerry, Palm and Flash Lite mobile games and applications projectjobs Senior Java Engineer - (Marin county/San Francisco) < projectjobs Java J2EE Guru for Start-of-the Art NTS Software Application: MA-Boston, Location Boston, MA; Cambridge, MA Sal.. http://bit.ly/J5PGY ronhagenhoff Java Platform intellibitz Exploring the world of Android :: Part 3 � JTeam Blog / JTeam: Enterprise Java, Open Source, software solutions, Amsterdam projectjobs Senior Software Engineer - Java - MVC - Spring - Hibernate: CA-San Francisco, Location San Francisco, CA; South.. http://bit.ly /1mKEDn avec Google Friend Connect Membres (4449) Plus » Vous êtes déjà membre ? Connexion path. You can find more about running the tools here Conclusion Validy Technology is very competent to fight against such bigger threats but there are some points they should consider on. 1. The documentation is too technical (though I know its for software developers). But even a software developer can feel lost under all these technicalities. So improvement upon documentation is a must. 2. It is too much java dependent and I will surely want it to grow over it and be as diverse as possible. Predictions tell us that we will have 12 million dongles attached to computers by 2012. So you can understand that what a magnanimous influence will it be if it becomes a success. Having said all that, Validy Softnaos is worth a try. If you are concerned over piracy and sabotages, then you may use it and tell us your experience too. Filed under How To, Java Software, Programming, Software Review, Technology, Windows Software Review | Tags: 2012, Claim, Cyber terrorism, Lost, Piracy, Validy Softnaos, Validy technology | Comment Below | Email this Article Windows Software Review News How to check what has been changed in your Windows Registry Firefox 3.5 Review To-Do list ToBeeDo Review Top 5 Free Antivirus Software Easeus Data Recovery Wizard Professional: Comprehensive Review Xobni- Free Plugin Manager for Microsoft Outlook: Review Radmin Remote Control Software - Overview Top 10 Hard Drive Cloning &amp; Backup Software 2012 News Outsourcing signals boom in India's publishing industry AP aiming for more lucrative deals with major Web sites as offline media slump worsens The Complete story of Who benefited and who lost in this recession NEC to withdraw from Japan supercomputer project due to slump e-Commerce Marketing is gaining momentum due to recession Infosys to pick up most of IBM's support contract with Australia's Telstra CDM Authority Goes Hitech Intel Warns AMD on Legal Terms about GlobalFoundries $4.2 Billion Project Related Articles Judge rules against Real Networks, prohibits company from marketing DVD copying software August 12th, 2009 Judge bars sales of RealNetworks' DVD softwareSAN FRANCISCO — DVD copying software sold by RealNetworks Inc. appears to be an illegal pirating tool, a federal judge ruled Tuesday in a legal battle that's been closely watched in Hollywood and elsewhere. Microsoft Windows Genuine Advantage Check Cracked under 24 hours July 28th, 2005 Microsoft's effort to refuse access to updated versions of Windows Operating System has been foiled by hackers within 24 hours. Microsoft demanded that those who wanted Windows updates, other than security updates, will have to download an Active X program that sniffed their operating system to see if their OS copy had been pirated. How to prevent robots (Google Bot, MSNBot, Yahoo Slurp! etc.) from displaying cached pages of your site April 12th, 2005 Site Owners often detest the fact that google caches an old copy of their site and displays it on searches which brings up the site pages. A simple way to prevent robots (including Google, Yahoo etc.) from caching your site contents is to include the following within the head section of your web page. How To Prevent Search Engines Like Google & MSN Search From Using ODP Title & Description For Site August 23rd, 2006 Search engines like Google often fetch your site description from ODP (Open Directory Project) description instead of fetching it from the site content or meta-tags. This may not always be desirable as it may not represent your site properly. India Set to be Technical Backend for All New .org Web Sites October 4th, 2005 India’s global image and reputation is rapidly growing. Top Internet decision makers, PIR, have decided to make India a hub for the technical backend of all new websites, a move that is expected to significantly reduce time to resolve websites. Compuware sells application testing software line to Britain's Micro Focus for $80M May 6th, 2009 Compuware sells software line to British companyDETROIT — Business software and services provider Compuware Corp. says it's selling an applications testing software line to Britain's Micro Focus International PLC for $80 million. A Plan for Stopping Online Music & Book Piracy August 14th, 2007 Online piracy is assuming alarming proportions and will continue to do so with the popularization of internet and better bandwidth availability to customers. Online piracy affects every material that can be moved online - music, video, books and software. How To Use .htaccess to Prevent Apache HTTPD Directory Listing March 16th, 2008 Apache HTTPD servers are configured by default to display directory listing, when index files like index.htm or index.html of index.php etc. are not present in the directory. How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 3 sur 4 05/09/2010 10:42
  • Corporate | Products | About Me | How to use this site | Submit News | Archives | Forum | Contact | Privacy Policy Understanding the Role of Manuals in Software Development June 8th, 2005 Understanding the Role of Manuals in Software development; Debunking the XP Myth of Code is Documentation; Additional value of Good Documentation; Role of Technical Writers in XP project; Summary I Don't Want to Restart My PC after Every Automatic Windows Updates - Solution March 13th, 2009 Okay letting automatic updates wasn't enough. When they finish, you are prompted to restart your computer. How to Distribute Your Software Products Securely over the Internet? - IntellProtector - A Comprehensive Review October 16th, 2008 Software vendors like us always looks for ways to easily and cheaply protect their software from getting stolen. Microsoft with billions of dollars of resources has done it with Windows Genuine Advantage program. How To Prevent Browser Caching of HTML Pages November 4th, 2006 This is old news for most of us and yet when I wanted to quickly find it, it took some searching. So here it is, in simple language, what you can do to prevent your web pages from being cached by browsers. Corporate Blogging: Meet Fortune 500 Blogger - Sun's CEO Jonathan Schwartz June 1st, 2006 Jonathan Schwartz is probably the highest profile individual to blog as CEO of Sun Microsystems, a Fortune 500 company. But that is not what this article is about. Answering Joel Spolsky's Questions On Enterprise Development September 4th, 2006 Joel Spolsky was asked four important questions on enterprise development. Joel didn't offer a clear answer on some of them. Nginx: How To Redirect /index.php To / To Avoid Content Duplication August 8th, 2008 Normally any website that responds to /index.php also responds to /. This has the potential to duplicate content. Discussion Name (required) Mail (will not be displayed; required) Website (optional) Notify me of followup comments via e-mail "The whole of science is nothing more than a refinement of everyday thinking." - Albert Einstein Copyright© 2003-2009 Angsuman Chakraborty Protected by Comment Guard Pro How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror... 4 sur 4 05/09/2010 10:42