IMP Info

Latest things in Softwares,Freewares,Open Source,Internet,Programming…

Archive for February, 2006

Free CD/DVDs on Net

Posted by Parth Barot on February 28, 2006

Free eBooks DVD/CD:
http://www.gutenberg.org/cdproject/dvdf-int.html

Free UBUNTU Linux CDs:
http://shipit.ubuntulinux.org/

Free PETA DVD of vegetarianism:
http://www.goveg.com/feat/chewonthis/order.asp

Free Photoshop Tutorials CD:
http://www.totaltraining.com/dnld/sampler.asp?mscsid=

Free 2 CDs on Bible and How the World Will End:
http://www.scripturessay.com/freecd.html

Free BIBLE and booklet on CD:
http://en.bibleinfo.com/gift/

Free MEDITATION CD:
http://www.meditationandtransformation.com/optin.html

Free WIN XP Service Pack 2 CD:
http://www.microsoft.com/windowsxp/downloads/updates/sp2/cdorder/en_us/default.mspx

Free Hindi/Tamil software tools from India Government:
http://www.ildc.in/

Aga-Rayburn free CD:
http://www.aga-rayburn.co.uk/AgaBrRequest.asp

Free Linux/Windows SEK CD sets:
http://www-128.ibm.com/developerworks/offers/sek/?S_TACT=105AGX22&S_CMP=DEMOS

Free Trend Micro evaluation CD:
http://www.trendmicro.com/download/free_cd/

Free Confucius Saying CD:
http://www.confucius.org/main03.htm

Free Keil CD:
http://www.keil.com/demo/cdrom.asp

Free Microsoft accesibility CD:
http://ms.kpcorp.com/msaccessxp/AspxFiles/OrderForm.aspx

Free Chipworks software demo CD:
http://www.chipworks.com/forms/CDROM_form.asp

Free RJCooper Software demo CD:
http://www.rjcooper.com/form.html

Free Nortel Networks CD:
http://www94.nortelnetworks.com/events/multimedia_collaboration_freecd/index.php

Free Daveschool Animation DVD:
http://daveschool.longtermsolutions.com/

Free ChemSoft DVD:
http://www.cambridgesoft.com/

Free NATO DVD and other wallcharts, booklets, etc. (DVD no longer available)
http://www.nato.int/docu/pub-form.htm

Free RAGNAROK Game CD:
http://www.level-up-games.co.in/freecd.php

Free Photoshop Academy CD:
http://www.photoshopacademy.com/free_cd.html

Some other links:

http://www.lynuxworks.com/

http://www.arteraturbo.com/

http://www.keil.com/demo/cdrom.asp

http://www.chrissummerhayes.com/Pages/free_cd!.htm

Posted in Uncategorized | 1 Comment »

Spyware – What Is It? Why Should You Care?

Posted by Parth Barot on February 24, 2006

Not many disagree that the expansion of the internet and technology related to advances with the various aspects of interacting on the internet continues to accelerate at a dizzying pace. As with most advances, with the good side, also comes a not so good – dark side. More than ever, the criminal element continues to make great strides in finding ways to perpetrate mischief, mayhem, and mal-intended scams.

One of the latest growing ways criminals have employed to profit at the expense of unsuspecting internet users is the spread of spyware viruses. Spyware and adware quickly are becoming all too prevalent for anyone. It has become vitally important that everyone take precautions to protect themselves from the malicious effects through the use of virus protection software.

Spyware: What Is It?

By definition, a spyware virus includes a wide variety of virus, some of which are the good kind; some are relatively harmless in nature. For example some spyware programs are “documenters, or scribes” if you will. Their primary purpose is to keep a record of basic information on users’ activities. This can include such things as what websites and other actions you have taken over a period of time. This allows the program to target your IP address with advertisements (many of which are popups) that are related to the theme of the sites you frequent. Giving you what you want, based on where you visit on the internet is the general method for this type of spyware. Again, being a nuisance is the primary offense of this type of virus.

Spyware: Why Should I Care?

Spyware’s “evil cousin” is not so virtuous and clearly much more harmful. These types seek to target financial related information (all personal and private information of course), using the information for criminal purposes. Identity theft is the more common example of this type of spyware virus. The sheer number of attacks, severity of the attacks is growing at alarming rates.

And just when we thought identity theft was bad enough, another type of spyware virus is growing with even more damaging effects. These are essentially key logger programs. This type of spyware is designed to capture highly sensitive data (account numbers and passwords to online banking, financial records, etc.) by recording actual keystrokes by a user on the keyboard. This data is collected and reported back to the author – who in turn uses the information or gives the information to others to undertake criminal actions to steal all they can using this information.

What Can I Do? Read the rest of this entry »

Posted in Tutorials | 2 Comments »

Computer Security – It’s Bigger Than Spyware And Viruses

Posted by Parth Barot on February 23, 2006

Computer security, in basic terms means keeping your computer and the data that’s in it safe and secure. More of our personal data is stored in or accessed from our computer, now more than ever before. Yet most people lack even the basic understanding of how to keep their computers safe and secure. By following just a few simple rules you can dramatically improve the overall security of your computer.

The first thing to understand is what exactly it means to be connected to the internet. Your computer connected to the internet is similar to your house in many ways. There are many ways into your house. Windows, doors, etc. The more windows and doors you have, the more ways someone has into your house. An open door doesn’t necessarily mean you are going to be robbed, but it does improve the chances. Complicating matters, the ones that you think are locked, may not be because the lock is faulty or even the door itself may have an as of yet undiscovered flaw that would allow an intruder easy access to your home.

Your computer has many windows and doors, not all of which are locked. New flaws are being found everyday, often with the fix not coming until days after. Just like you wouldn’t leave your front door unlocked, you shouldn’t leave your computer wide open either. The first two things we will discuss to help with this task are installation of a quality firewall and regularly updating your installed software.

Updating your software is becoming easier these days, especially your Operating System. We don’t have the time here to go into detail about the many ways to update the many software packages you may have or use, but generally speaking the software manufacturer will provide you a way to do this automatically via the internet. A good example of this is the Microsoft Windows Update feature. Be sure to get the updates for everything installed on your computer, nothing is too trivial.

There are two basic types of firewalls and both perform the same functions. Read the rest of this entry »

Posted in Tutorials | Comments Off on Computer Security – It’s Bigger Than Spyware And Viruses

KGB Archiver

Posted by Parth Barot on February 23, 2006

KGB Archiver is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities. Unfortunately although its powerful compression rate, it has high hardware requirements (I recommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryptions known for human.
Read the rest of this entry »

Posted in Uncategorized | 1 Comment »

I2P

Posted by Parth Barot on February 2, 2006

What is I2P?

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other. The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points (“destinations”) are cryptographic identifiers (essentially a pair of public keys).

How does it work?

To anonymize the messages sent, each client application has their I2P “router” build a few inbound and outbound “tunnels” – a sequence of peers that pass messages in one direction (to and from the client, respectively). In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client’s inbound tunnels, eventually reaching the destination. Every participant in the network chooses the length of these tunnels, and in doing so, makes a tradeoff between anonymity, latency, and throughput according to their own needs. The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender’s and the receiver’s threat model.

The first time a client wants to contact another client, they make a query against the fully distributed “network database” – a custom structured DHT based off the Kademlia algorithm. This is done to find the other client’s inbound tunnels efficiently, but subsequent messages between them usually includes that data so no further network database lookups are required.

More details about how I2P works are available.

What can you do with it?

Within the I2P network, applications are not restricted in how they can communicate – those that typically use UDP can make use of the base I2P functionality, and those that typically use TCP can use the TCP-like streaming library. We have a generic TCP/I2P bridge application (“I2PTunnel“) that enables people to forward TCP streams into the I2P network as well as to receive streams out of the network and forward them towards a specific TCP/IP address.

I2PTunnel is currently used to let people run their own anonymous website (“eepsite”) by running a normal webserver and pointing an I2PTunnel ‘server’ at it, which people can access anonymously over I2P with a normal web browser by running an I2PTunnel HTTP proxy (“eepproxy”). In addition, we use the same technique to run an anonymous IRC network (where the IRC server is hosted anonymously, and standard IRC clients use an I2PTunnel to contact it). There are other application development efforts going on as well, such as one to build an optimized swarming file transfer application (ala BitTorrent), a distributed data store (ala Freenet / MNet), and a blogging system (a fully distributed LiveJournal), but those are not ready for use yet.

I2P is not inherently an “outproxy” network – the client you send a message to is the cryptographic identifier, not some IP address, so the message must be addressed to someone running I2P. However, it is possible for that client to be an outproxy, allowing you to anonymously make use of their internet connection. To demonstrate this, the “eepproxy” will accept normal non-I2P URLs (e.g. “http://www.i2p.net”) and forward them to a specific destination that runs a squid HTTP proxy, allowing simple anonymous browsing of the normal web. Simple outproxies like that are not viable in the long run for several reasons (including the cost of running one as well as the anonymity and security issues they introduce), but in certain circumstances the technique could be appropriate.

The I2P development team is an open group, welcome to all who are interested in getting involved, and all of the code is open source. The core I2P SDK and the current router implementation is done in Java (currently working with both sun and kaffe, gcj support planned for later), and there is a simple socket based API for accessing the network from other languages (with a C library available, and both Python and Perl in development). The network is actively being developed and has not yet reached the 1.0 release, but the current roadmap describes our schedule.

More @ I2P.net

Posted in Uncategorized | Comments Off on I2P