Sony Playstation 3, rumors of a Sony Playstation 4A new Sony Playstation, the PS4 could be released within 18 months, sometime during Christmas of 2008, claims a “Sony Insider”. The report on Smarthouse.com suggests that the insider has indicated that the new PlayStation would feature the same chipset as the current PlayStation 3, but will have hardware enhancements in the drive bay and the attachment area. It would also include a software suite that would help manage streaming TV/HD content. The company is also looking at creating some kind of PS3 based home server.

“We have even looked at a Sony home server based on PlaySration technology,” the unnamed source told smarthouse.com.au. “This would allow consumers to connect home automation devices to the Sony server while also delivering online gaming and access to an extensive movie and music library.”

Ken Kutaragi, the father of the Sony PlayStation says that previously he has been unable to talk about “the next step” because the PS3 still hadn’t launched worldwide. “We’ve introduced PS3 in Europe, so now I can openly talk about [future plans]”, he says. “As a matter of course, I have the vision of PlayStation 4, 5 and 6, which will merge into the network.”

Vistawired had an excellent tip yesterday on how you can increase the number of simultaneous downloads using Microsoft’s Internet Explorer 7.

IE7 currently has a limitation on the number of simultaneous downloads at 2. This can be a problem for those who do not use any Download managers or Mozilla Firefox. Firefox does not have this limitations and considered a more secure browser. Now, you too can

In order to remove this limitation, follow the guide below where you need to make some small tweaks in your registry and increase the number of simulaneous downloads in Internet Explorer.

Step # 1: Click on Start. Go to run and type in regedit. If you are using Windows Vista, type regedit in the search bar. Or best tip, type in <windows key> + R to launch the run prompt and then type in regedit

launch the registry editor using the run prompt

Hacking Competition, Red vs Blue TeamInformit.com is providing a good coverage of the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Students put their skills to the test, trying to lock down systems against intrusion from an invading hacker team. All in the name of learning.How many times have you heard a commercial telling you how much money an Information Technology professional can earn in a year? Well, trust me; the job is not as easy as it sounds. Just ask the eight teams that participated in the annual Collegiate Cyber Defense Competition (CCDC). During the event they are under immense pressure to a build web application, maintain a web server with an ecommerce system, manage an Exchange server, keep a DNS server up and running and more — all while protecting their network from four seriously determined hackers.

From the article: “When the three hour grace period was over, the Red Team slowly worked their way into attack mode. One member started to sort through the information they gleaned from their scans and investigated each possible exploit. Another member fired up a MySQL database client and started to poke around the students databases looking for sensitive data. The two others were adding/changing accounts to routers, firewalls, and systems. However, for the most part, the students were not being pelted with attacks. And this continued for the next several hours.”

The rules were fairly simple — at least at first glance. Basically, the Red Team could do anything but hurt someone or perform a denial of service attack (network flood). The student teams were a bit restricted, with regard to changing IP addresses and messing with the infrastructure.

Communication was allowed between team members, but only the team leader could talk to the white cell members about problems, etc. The feds could be called over for an investigation and the Red Team was allowed to try to talk to the teams to put a social engineering twist on the games. Finally, all business objectives and administrative requests are sent to the CEO via email.

I’m all for this and from TFA, this sounds like a great thing (and lots of fun!). It seems that this includes even the social enginnering aspect. In other words, it’s a trivial matter to get into somebody’s system; it takes a whole another skill set to convince that person to hand you the keys to their data. That is to say, attempting to gain access to a computer system through it’s weakest link: THE USERS! It’s one thing to pit technical skill againt the threat of hacking, but it’s been done over and over, all that technical skill accounts for nothing if you have a user that has his/her password written down on a sticky – on their MONITOR! Users must be educated and kept up to task on things like this, and it’s my opinion that the IT/Security industry does not place enough emphasis in that area.

In this contest, Social engineering was allowed. It seems that a few members of the Hacker/Red team would often walk around the room and try and to watch what people were doing. A few times they even stopped and tried to get information out of the student/blue teams. However, they had to leave our team area when asked. It seems that one team actually left sheets with the wrong passwords on the tables in hopes that they(Red Team) would waste their time.

Google Fight between Red vs Blue TeamsEven GoogleFight thinks that the Red Team actually whupped the Blue Team with the Red Team(Hackers) returning 267,000,000 results compared to the Blue Team(Students) which returned 146,000,000 results.

For those who read French here is a press release [web.crim.ca] about a team of Scheme hackers headed by Marc Feeley [umontreal.ca] participating in a Quebec security competition who won both the first prize for keeping the other nine teams out and the second prize for finding the most security problems in the other teams’s servers.

According to a member of the student team

This article was first published on SkunkLabs. Visit Skunklabs for more Tech news, information and Reviews

Established in July 2003, The Mozilla Foundation, a non-profit organization dedicated to preserving choice and promoting innovation on the Internet.  Firefox users and fans were always at the forefront in their effort to speak out for their favorite browser and express themselves in front of a worldwide audience.

The ad campaigns are usually promoted by Spread Firefox, a volunteer run Mozilla advocacy site, with over 50,000 registered members. During this phase of Firefox 1.0 promotion, community marketing into the mainstream was mainly through written testimonials.

#5: NY Times Spread Firefox Ad:

The Mozilla Foundation, places a two page ad in the December 16th 2004 edition of the New York Times. The ad, coordinated by Spread Firefox, features the names of thousands of people worldwide who contributed to the Mozilla Foundation’s fundraising campaign to support the launch of the Mozilla Firefox 1.0 web browser.

A year later after the NY Times Ad, Firefox 1.5 was released and during this phase, the Mozilla Foundation started a contest, promising prizes for users who submit the best homemade 30-second Firefox advertisements.

Firefox NY Times Ad

TrueCrypt LogoTrueCrypt is a free open source disk encryption software that works on both Windows and Linux platforms. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. TrueCrypt does this by creating a virtual hard drive that will read and write encrypted files on the fly. The advantage of using TrueCrypt is that you need not download it everywhere. All you need are the files truecrypt.exe, truecrypt.sys and the volume file you create which you can carry on your flash drive.

Step by Step Tutorial on how to encrypt your Hard disk or data or message using TrueCrypt

Step # 1: Download and install TrueCrypt

Step # 2: Once you Launch TrueCrypt, Click on “Create Volume” button. This launches the Volume Creation wizard that prepares the encryped drive location. Next, choose ” Create a Standard TrueCrypt Volume” and hit Next. Next, click on “Select File” button. Browse to a place where you want to store your encryped files. In this case, I am selecting askstudent.ajit Note: This is not the file you want to encrypt. Think of this as a Folder Name which in turn would contain the files you want to encrypt later on. Hit Next

Store Encryped Files 

Ever wished to send anonymous text messages to someone? Ever wished you can send free text messages to your girl friend or someone else … ? How about the time you wanted to send holiday greetings or anonymous tips? Okay, if you don’t care about privacy or anonymous text messages, how about the fact that you hate paying 10c for each outgoing and incoming text message. Yes we feel ya.

In this article, we will show you how you can achieve this objective of sending FREE anonymous text messages to any cell phone in the United States

Option # 1: Send SMS messages via Google

Google has a service where you can send a text message to any cell phone based in the United States. You can achieve this by using the Google Send to Phone service. All you need to do is enter the phone number, select your phone’s cellular carrier, an optional subject and send your message.

SMS text messages using Google

Link: Visit Google Send to Phone

Option # 2: Send SMS messages via AnonTxt.