Ads 468x60px

freak2code is the blog about latest geek news,software reviews ,trends in technology and more informative stuff......

Thursday, 16 August 2012

Fruition


Fruition

 
 
 
fruition reviewFruition is an organization based in Denver, Colorado that specialize in search engine marketing (SEM), pay-per-click (PPC) advertising and search engine optimization (SEO). They also have an office in Los Angeles and provide internet marketing services to companies in Europe, Mexico and the Pacific Rim. Their mission is to help new businesses get online and stay there as a significant presence. They promise to help their clients increase their online revenue in a manner that is cost effective. At present, Fruition is constantly optimizing the websites of 500 clients and generates annual revenue for these clients in excess of $300 million.
Pricing
Fruition offer four main packages ranging from self-service SEO to their full-service package which is designed to help large businesses rank for their industry’s most competitive keywords.
  • Self-Service: At $99 a month, this is Fruition’s least expensive package and tracks up to 100 keywords. It comes with an unlimited SEO page grader which was built using their vast SEO experience. This is a great package for an experienced webmaster that can quickly get in touch with Google search engine best practice.
  • Per Keyword: This is Fruition’s pay by performance package. The price depends on the keyword(s) chosen and you only have to pay if your site’s ranking improves for the keyword(s) you have picked. It should be noted that not all keywords are eligible and you need to sign a six month contract. This is one of the most expensive options.
  • Small Business: This option promises to help your company dominate competitive keywords in your industry. The cost ranges from $1800-$4500 with up to 250 keywords being tracked.
  • Enterprise SEO: This is the most expensive package and begins at a minimum of $5000 a month. It is mainly for companies with a million dollar income with up to 50,000 keywords tracked.
Features
Fruition uses normal SEO practices to bring your website up to speed. This includes link building, page speed optimization, site building, content development and mobile web services. However, Fruition is different from most SEO companies because of their willingness to try new and unusual strategies if the client is in need of such innovation.
They begin with SEO research to ensure that your business is targeting the right keywords, geographic areas and demographics. This is followed by an SEO Audit which will make sure that your organization’s website has been properly setup to allow the major search engines to access your site. Other techniques such as lead generation and link building are used with the latter designed to provide information to search engine spiders. Fruition will even help you manage your site on social media networks such as Facebook and Twitter.
Overall
Fruition really leaves no stone unturned in their bid to improve the search engine rankings of their clients. They have a justifiably excellent reputation and their pricing package is far clearer than many of their rivals. You are also entitled to a free 14 day SEO trial to see if Fruition is the right company for you. If you are currently struggling to make an impact on search engine
rtechinsane,icodesource,SEO,SEO Tips,SEO Backlinks,SEO content,SEO tricks,SEO Engine,codes,gadgets,iphones,ipad,4G phones,geeks,reviews,database,DBMS,
warehouse,datamining,datawarehouse

How To Get Reviews And Improve Local Ranking With Google+ Local


How To Get Reviews And Improve Local Ranking With Google+ Local

 
 
Sorting a confusion and improving your Google+ Local listing
This post is designed to help you sort confusion caused by recent actions from Google and improve using newGoogle+ Local profile.
To achieve that we'll go through two important steps: 1) creating and maintaining a proper Google+ Local profile, AND 2) gaining and facilitating customer reviews on Google+ Local profile. But before we go into it, let's discuss the confusion element

Resolving The Confusion

Recently Google has turned all Google Places into Google+ Local properties. Here's a good post detailing the move. The move was a strategic way of moving things under the Google+ umbrella. However, this automatic action has created a problem for Google Places holders. Right now we look at two different properties for a single business: Google+ Local (formerly known as Google Places) AND Google+ Business Page.
In short, at this point there are two completely separate page types: Google+ Business Page AND Google+ Local. The issue is that they serve a very similar purpose but are two different Google products. Google+ Local (formerly known as Google Places) is the only page type that allows reviews. Now Google is working on a way to combine the two page types due to their similar purposes. They will eventually get it but there's no estimate as of when.
Here's a good post on clarifying the confusion between the two pages. Please note that the solution the author offers here (link to form to merge the two is no longer working) no longer works. However what you can do is to submit your email on Google's list. This will ensure that once Google finds a proper solution to the issue of having two listings for a single business you will be the first to know.

Creating A Google+ Local Profile

If you've already had Google Plus listing, check how it looks now by:
  1. Going to Maps.google.com
  2. Search for your business
  3. Click on "more info" for your listing
  4. Google brings you to your new Google+ Local page
Checking your Google Places / Google+ Local listing
You can edit this listing by logging into your Google Places profile here: http://www.google.com/places/. Changes will take effect in your Google+ Local listing.
If you haven't had a Google Places listing before, then it's recommended you create one here. Make sure you complete all required information. Here's another way of creating the Google+ Local page from Google+ Business page interface provided by Google themselves. After you've done that, use these instructions from Google to edit your Google+ Local listing.
Here's a few good posts on how to ensure your Google+ Local listing performs well:

Simplifying "Getting The Reviews" Step

One of the most significant things you can do to improve your listing and rankings is getting native (true) customer reviews. Once your listing is created and verified make sure you ask your most raving fans to create a short review of your business on Google+ Local.
Based on my experience, it can be sometimes tricky for customers to leave a review. So, I created a short deck helping them do just that. Feel free to use and repurpose it for your business.
rtechinsane,icodesource,SEO,SEO Tips,SEO Backlinks,SEO content,SEO tricks,SEO Engine,codes,gadgets,iphones,ipad,4G phones,geeks,reviews,database,DBMS,
warehouse,datamining,datawarehouse

Samsung Galaxy Tab 2 7-inch hits Verizon with 4G LTE August 17th


Samsung Galaxy Tab 2 7-inch hits Verizon with 4G LTE August 17th

This morning along with announcing their new Galaxy Note 10.1 Samsung and Verizon both announced that they’ll be offering up the budget friendly Galaxy Tab 2 7-inch tablet to Verizon customers complete with 4G LTE. This is Samsung’s latest Android 4.0 Ice Cream Sandwich tablet, and now it will be blazing along with 4G LTE speeds.


Not only has the tablet been injected with 4G LTE speeds, but it will be dropped into the market extremely fast. The Verizon Galaxy Tab 2 7-inch will be available starting Friday, August 17th, for the low price of only $349 on contract. It might not be the cheapest tablet, or as powerful as the Nexus 7 — but it has connectivity and a micro-SD slot for expanded storage.
For full details on the Galaxy Tab 2 7-inch be sure and hit the various links below. What you’ll be getting is a 7-inch 1026 x 600 resolution Android 4.0.3 Ice Cream Sandwich tablet with 1GB of RAM, 8GB of internal storage (micro-SD support included) Verizon 4G LTE, as well as a IR-Blaster to use it as a full featured remote control. This is Samsung’s most budget friendly tablet, and will arrive just in time for students shopping for a connected tablet.
This tablet comes with both a 3.2 rear camera, VGA front for video chatting with friends, as well as a micro-SD slot capable of accepting 64GB cards. This makes it a relatively good option for those headed to class this fall. It surely can’t compete with the Nexus 7 power, performance, or OS, but if you like the small size and need 4G LTE this is your best bet. As a reminder, for $10 a month you can add this to your new Verizon Share Everything data plan too.
Who’s buying this tablet, or would you rather use the Nexus 7 and just tether your smartphone data connection?
GALAXY-Tab-2-7.0-Product-Image-2 GALAXY-Tab-2-7.0-Product-Image-4 GALAXY-Tab-2-7.0-Product-Image-3 GALAXY-Tab-2-7.0-Product-Image-1 tab7lte

Humble Bundle returns with five pay-what-you-want games for Android, Mac, Windows and Linux


Humble Bundle returns with five pay-what-you-want games for Android, Mac, Windows and Linux

Humble Bundle returns with five paywhatyouwant games for Android, Mac, Windows and Linux
So let us get this right. You can pay what you want, and get another stack of games for your Android -- or, indeed Mac, Windows or Linux machine? And help charity? And this is actually proving very popular? Yes,FieldrunnersBit.Trip Beat, Uplink and SpaceChem, are the latest games to get the Humble Bundle treatment on the aforementioned platforms (the latter two are tablet-only when buying for Android). Oh, and if you're generous enough to pay above the average, you'll unlock the Spirit platform-puzzler, too. We're finding it pretty hard to argue with, especially as you get to decide the distribution of cash (between charity, the hardworking devs, or the platform-providing Humble). Judging by the real-time stats on the site, people aren't holding back on the cash, either. Still not convinced? Hop on the free-for-life video after the break to see the games in action.

Compile Web Articles and Create a Niche Ebook with Readlists


Compile Web Articles and Create a Niche Ebook with Readlists

Ebooks allow us to organize our collections of reading materials, and making it easier than ever to distribute to friends and readers with similar interests. There are some of us who like to curate contents from several sites down to one source that we can access even without an Internet connection. However, there are limited options for converting reading materials to an ebook format, especially from websites and blogs.
Readlist
The standard way is by spending time to copy and paste content to MS Word, or Pages on Mac, where you can save the file as PDF, or in the standard ePub format. This is quite a hassle considering the time needed to complete the process, and that is why we’d suggest you try the alternative: a web application called Readlist.
Recommended Reading: E-Book Readers & Managers – Best Of

Creating Ebook with Readlist

Now to start converting web articles into ebook format, go to the Readlist official site and click on the buttonMake a Readlist at the top right corner of the page.
Make a Readlist
You will be redirected to the content curation page. What you need to do here is to copy the link to the article and paste it in the curation page. Click Add. Readlist will crawl over the contents like the author, title and the website and the content.
Add Link
After completing your curation process, look at the left sidebar and add a name to your list, a description and then select the option to send it directly to your Kindle, iPhone/iPad or Readmill. You can also email the list or directly download the ebook in ePub format. There is no registration required.
Sidebar
If you select to send the ebook to your iPhone or iPad, click on the Send to iPhone/iPad option, fill up your email address and click the Send button. Then open your email from your iOS devices to download the ebook, it’s that easy!
Send to iOS device
In my case, I prefer to download the ebook directly to my Mac, and open it with my Nook for Mac ebook application.This is what I get.
ebook cover
And this is what the contents of the ebook looks like.
Content

[Chromium OS Blog] Announcing Pwnium 2


[Chromium OS Blog] Announcing Pwnium 2



The first Pwnium competition held earlier this year exceeded our expectations. We received two submissions of such complexity and quality that both of them won Pwnie Awards at this year’s Black Hat industry event. Most importantly, we were able to make Chromium significantly stronger based on what we learned.
We’re therefore going to host another Pwnium competition, called... Pwnium 2. It will be held on Oct 10th, 2012 at the Hack In The Box 10 year anniversary conference in Kuala Lumpur, Malaysia.
This time, we’ll be sponsoring up to $2 million worth of rewards at the following reward levels:
  • $60,000: “Full Chrome exploit”: Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.
  • $50,000: “Partial Chrome exploit”: Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows kernel bug.
  • $40,000: “Non-Chrome exploit”: Flash / Windows / other. Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver.
  • $Panel decision: “Incomplete exploit”: An exploit that is not reliable, or an incomplete exploit chain. For example, code execution inside the sandbox but no sandbox escape; or a working sandbox escape in isolation. For Pwnium 2, we want to reward people who get “part way” as we could definitely learn from this work. Our rewards panel will judge any such works as generously as we can.
Exploits should be demonstrated against the latest stable version of Chrome. Chrome and the underlying operating system and drivers will be fully patched and running on an Acer Aspire V5-571-6869 laptop (which we’ll be giving away to the best entry.) Exploits should be served from a password-authenticated and HTTPS Google property, such as App Engine. The bugs used must be novel i.e. not known to us or fixed on trunk. Please document the exploit.

You may have noticed that we’ve compressed the reward levels closer together for Pwnium 2. This is in response to feedback, and reflects that any local account compromise is very serious. We’re happy to make the web safer by any means -- even rewarding vulnerabilities outside of our immediate control.
Another well-received piece of feedback from the first Pwnium was that more notice would have been nice. Accordingly, we’re giving about two months notice. We hope this gives enough time for the security community to craft more beautiful works, which we’d be more than happy to reward and celebrate.

How to Use Mind Maps Effectively in a Meeting


How to Use Mind Maps Effectively in a Meeting

Want to be a super star in meetings? Want to impress your boss by providing great summaries of meetings? Learning to use mind maps in meetings will help you achieve that goal. We already added some meeting mind map templates to make things easier and now we’ll discuss how to effectively use mind maps in meetings.
When it comes to mind maps in meetings many associate it with taking notes. But mind maps can be use for many other things like planning the agenda and preparing the meeting minutes. With Creatly’s real time collaboration capabilities, every participant in the meeting can modify the mind map and instantly see the changes made by each other.
Use mind maps to effectively in meetings to plan, summarize and brainstromMind map template fit for meetings, click on the image to use the template

Using Mind Maps for Taking Notes in a Meeting

If you intend to take notes in a meeting using mind maps you need a bit of a practice. It isn’t something you can do instantly but once you master it you can be a superstar in meetings. Mind maps have few advantages compared to traditional hand written notes as shown below
  • Take seconds compared to hand written notes – Mind maps show keywords or important points. So you can quickly add the keyword in your mind map and participate in the meeting so you wont miss anything. With traditional hand written notes you spend time writing sentences which hinders you participation of the meeting.
  • Easy to Visualize Connections – A mind map is a visual tool that shows connections. Arrows show the connection between each flow and the direction of the flow. This makes if easy to figure out what needs to be done first, which task is blocking what etc.
  • Improves Your Memory – As mentioned in the above point, mind maps only have keywords. So when your summarizing or going through the mind map after the meeting you need to recall the context and the underlying details of the point, all of which helps to improve your memory.
  • Helps Others to Visualize – If you use a tool like Creately Mind Map Software, you can share the mind map with all the participants and see each others changes in real-time. So a note you added to the mind map is instantly visible to the others, helping everyone get a clear picture of the meeting. You can never do this with traditional hand written notes.

Use Mind Maps to Plan the Agenda

As mentioned before most people use mind maps in a meeting to take notes. This is mostly because of traditional mind map software and mind map templates. But with real-time enable software you can use mind maps to plan the agenda as well. The great thing is you can share as you build the mind map. You can only share the mind map with managers while planning the agenda and share it with the other participants when the actual meeting starts.
For example the mind map above can be shared with a crime boss and he can expand it like show below. With Creately it just take three clicks and typing in the text.
Use Mind Maps to Plan the Agenda of a meeting with easeShare the mind map and others can expand on the mind map with ease

Summarize the Meeting Using Mind Maps

When you have the final mind map of the meeting summarizing the the meeting becomes very easy. You have a clear breakdown of the agenda, notes from the meeting and more importantly how each notes connect with each other, decided actions to be taken after the meetings and many other things you need to summarize the event. Because the mind map shows the keywords or the main points only the recalling part is very important here.

Use Mind Maps in Meeting to Increase Productivity and Impress Peers

As explained in the above sections, mind maps are a very effective tool to in a meeting and with some practice you can use it to increase your productivity and impress your peers. If you are not using mind maps yet, 

Sony Cuts Some Corners, Delivers an $800 Ultrabook


Sony Cuts Some Corners, Delivers an $800 Ultrabook


<
Sony Vaio T Series
  • Sony Vaio T Series
  • Sony Vaio T Series
  • Sony Vaio T Series
  • Sony Vaio T Series
  • Sony Vaio T Series
  • Sony Vaio T Series

x

To counterbalance the excess of its sky-high Vaio Z, Sony has another option for you. The scaled-back Vaio T Series is a little more restrained, offering a slimmed-down computing experience complete with third-generation Core i5 CPU for just 800 bones.
The specs aren’t exactly earth-shaking. A surprisingly dim 13.3-inch screen at 1366×768 pixels, the usual 1.7GHz Core i5, 4GB of RAM, and integrated graphics. One curiosity here is the hard drive, a hybrid model that adds 32GB of SSD storage to the 500GB traditional hard disk system. This helps to earn the system slightly better benchmark scores than you’d expect, but the numbers are generally in line with the competition.
Want an ultrabook for 800 bucks? This slab of silver gets the job done about as well as anything else.
That said, the T Series can be sluggish at times and occasionally pokey to boot up. Without getting too wonky about it, one of the reasons for this is that the SSD portion of the drive used in the T Series incorporates MLC (multi-level cell) technology, which is slower — and cheaper — than the SLC (single-level cell) technology used in higher-end drives.
Connectors include two USB ports (one 2.0, one 3.0), HDMI, SD card, Ethernet (full size), and VGA. One thing you’ll particularly miss if you’re a frequent flier is the lack of a dedicated wireless on/off switch. In fact, you can’t even turn Wi-Fi off via an Fn key combo; Sony has instead relegated the wireless system to a homegrown Control Panel, a truly awful decision. Of course, Sony has plenty more Sony-branded software preinstalled on this laptop, including the intrusive Vaio Gate toolbar that lives at the top of the screen. If for some reason you prefer to get to Skype via this system instead of the Windows taskbar, you’ll be in hog heaven. I expect most users will quickly turn it off.
The Vaio’s speakers are loud but noticeably tinny, but the volume is necessary to drown out the occasionally loud fan. The five hours of battery life is impressive, however, and the keyboard is spacious and easy to work with, though the key travel could be better.
At 19mm thick and 3.4 pounds, the T Series is a bit on the bloated side versus most 13.3-inch ultrabooks, and the brushed aluminum body with shiny chrome trim comes off as a bit garish in a world of more restrained designs.
But ultimately there’s nothing that really urges me to dissuade you from the T Series, though there’s nothing special to really recommend it, either. Want an ultrabook for 800 bucks? This slab of silver gets the job done about as well as anything else.
WIRED Generally good keyboard and clickpad. Slightly above-average performance. Good battery life. Upgrade to Windows 8 (when it comes out in October) for $15.
TIRED Needs more USB ports. As usual, bundled Sony software overwhelms even simple tasks. Washed out color on dim LCD.rtechinsane,icodesource,SEO,SEO Tips,SEO Backlinks,SEO content,SEO tricks,SEO Engine,codes,gadgets,iphones,ipad,4G phones,geeks,reviews,database,DBMS,

Nintendo’s Bigger Handheld Fixes All the Little Problems


Nintendo’s Bigger Handheld Fixes All the Little Problems



Nintendo 3DS XL
  • Nintendo 3DS XL
  • Nintendo 3DS XL
  • Nintendo 3DS XL
  • Nintendo 3DS XL
  • Nintendo 3DS XL




In early 2010, when Nintendo’s DSi handheld game machine was racking up record-breaking sales, the Kyoto gamemaker introduced an unexpected new model, the DSi XL. It was a classic example of Nintendo zigging where others zagged; as its competitors raced to make handheld gaming smaller and smaller, Nintendo increased its screens to giant size, sacrificing pure portability to create a more impressive gaming experience and a larger touch-screen input area.
Nintendo’s XL model doesn’t just need to supplement the existing 3DS, it needs to redefine the platform. And it might just do that.
Back then — ages ago, in videogame industry terms — Nintendo was introducing the DSi XL as an optional new form factor for a platform that was already incredibly popular. The 3DS XL, which will arrive in the U.S. on August 19 at a price of $200, is being released into a less friendly marketplace, one in which smartphones and tablets are sucking up players’ — and game developers’ — attention.
This time, the XL model doesn’t just need to supplement the existing 3DS, it needs to redefine the platform. And it might just do that.
When Nintendo introduced the revolutionary Game Boy in 1989, its portability alone made it unique: If you wanted to play games without a TV, you needed one. These days, practically everyone carries around a portable gaming device in their pocket or purse at all times. Why would they need to carry two?
Studies have shown [PDF] that a significant amount of mobile gameplay takes place in the home: On the couch, in bed, on the toilet. I would not be surprised to find that those numbers are significantly larger for 3DS. And if that’s the case, the supersized XL is designed much more appropriately for the way gamers are going to use it. Screw fitting it in your pocket: What’s important is the giant screen, the more comfortable grip and the longer battery life afforded by the larger device.
When I reviewed the 3DS in early 2011, it felt like a downgrade from the DSi XL I had been using for the previous year. The screens on the 3DS were smaller than what I was used to and the stylus pen wasn’t as comfortable. XL fixes that. The big new screens, nearly twice the size of the originals, make the games look even better. If you were disappointed by the way that games from the original DS hardware were either blurry or miniature on 3DS depending on your screen settings, they look much better now.

The classic Game Boy games that you can download from the 3DS’ eShop look especially good when you force them to boot into the 1:1 pixel-exact display mode (hold down the Start button when you start the games up).
The 3DS’ stylus pen was crammed into a tiny space on the top left of the machine, meaning you had to reach around awkwardly and fumble blindly to remove it. On the XL, the solid-body stylus — the same size as the DSi XL’s but a little shorter than the extended telescoping stylus from the original 3DS — is conveniently located on the right-hand side. I just wish it included the giant Sharpie-size stylus pen that came with the DSi XL.
There are a few other little tweaks. The “3-D volume” slider that changes the strength of the 3-D effect can now be clicked off, meaning that you won’t accidentally turn the 3-D on unless you really want to. And the Select, Home and Start buttons underneath the screen are now sculptured buttons instead of hard-to-press membranes.
Unlike Sony’s PlayStation Vita, which uses expensive proprietary memory cards and does not include one in the box, 3DS XL comes with a 4GB SD card pre-installed, double the size of the one included with the original model. That’s especially helpful since Nintendo is going to start selling its retail cartridge games as direct downloads, beginning with the launch of New Super Mario Bros. 2 on the same day the XL hits stores.
If you are upgrading from an original 3DS, make sure to use the “System Transfer” software immediately to move all of your downloaded games and other data to the new system. The process can be done without an internet connection and requires a lot of waiting, but it’s the only way to get everything moved over since Nintendo has no online account system that allows for cloud saves or changing content authorizations.
Nintendo says that the 3DS XL has 3.5 to 6.5 hours of battery life, versus the original 3DS’ 3 to 5 hours. That doesn’t sound like much of an improvement on paper. But in practice, I have found that the XL doesn’t constantly run out of battery and ask me to recharge it nearly as much as its little brother.
Ultimately the only real problem with the 3DS XL is that it’s still built on a platform that seems hopelessly backward in today’s gaming market. I do not join with the chorus of those saying Nintendo should give up on making top-flight games and start cranking out Angry Birds clones for smartphones. But the anemic content library slated for the rest of the year shows that 3DS still has a ways to go before it’s where it should be.
More comfortable and convenient to play in the home, 3DS XL is a big step along that journey.
WIRED Colossal-size screens make old and new games look their best. Larger form factor and battery life make a more comfortable, convenient experience. Double the included memory.

Secunia’s Auto-patching Tool Gets Makeover


Secunia’s Auto-patching Tool Gets Makeover

 
 
Vulnerability management firm Secunia has shipped a new version of its auto-patching tool — Personal Software Inspector 3.0 – a program for Windows users that can drastically simplify the process of keeping up-to-date with security patches for third-party software applications.
The final release of PSI 3.0 supports programs from more than 3,000 software vendors, and includes some key changes that address shortcomings identified in the beta version that I highlighted back in February.
The 3.0 version of PSI still keeps auto-patching on by default at installation, although users can uncheck this box and choose to manually install all available updates for third-party programs. Unlike the beta version — which was radically devoid of tweakable options and settings — the version released this week provides a more configurable interface that should be more appealing to longtime users of this tool.
Users also can review the history of installed updates, and select which hard drives should be scanned, options absent from the beta release. PSI 3.0 also lets users create rules that tell the software to ignore updates for particular programs.
Overall, the new PSI strikes a fair balance between configurability and ease-of-use, and is a notable improvement over the beta version. However, I had trouble with the program after installing it on my test machine — a Windows 7 64-bit machine with 8 GB of memory. The program seemed to get stuck on scanning for updates, and for an excruciating eight minutes or so the software sucked up most of my machine’s available memory and processing power. The only way I could get my system back to normal was to reboot the system.

I thought I’d give it a second try, but I could not replicate the problem after removing and reinstalling PSI 3.0. Neither could Secunia, apparently, even after I shared with them the program’s event logs.
“From the log file it seems that the application stopped for about 8 minutes and then continued scanning, but we have not been able to reproduce this behaviour at our end,” wrote Morten R. Stengaard, director of product management and quality assurance at Secunia.  “And despite +100,000 users trying the product during the beta, we have not had this type of issue reported before, so we are struggling a bit here. But perhaps we will see more users with the same issue now that we have launched the final product, and have more users signing up.”
Secunia also released some updated stats on the most commonly outdated pieces of software for Windows, based on a random sample of PSI scans from May 2012. According to Secunia, the top three most exposed programs by risk exposure (calculated by percent of market share x the average percentage of unpatched users) are:

New Java Exploit to Debut in BlackHole Exploit Kits


New Java Exploit to Debut in BlackHole Exploit Kits

Malicious computer code that leverages a newly-patched security flaw in Oracle’s Java software is set to be deployed later this week to cybercriminal operations powered by the BlackHole exploit pack. The addition of a new weapon to this malware arsenal will almost certainly lead to a spike in compromised PCs, as more than 3 billion devices run Java and many of these installations are months out of date.
I first learned about the new exploit from a KrebsOnSecurity reader named Dean who works in incident response for a financial firm. Dean was trying to trace the source of an infected computer in his network; he discovered the culprit appeared to be a malicious “.jar” file. A scan of the jar file at Virustotal.com showed that it was detected by just one antivirus product (Avira), which flagged itas “Java/Dldr.Lamar.BD”. The description of that threat says it targets a Javas vulnerability tagged as CVE-2012-1723, a critical bug fixed in Java 6 Update 33 and Java 7 Update 5.
The attack may be related to an exploit published for CVE-2012-1723 in mid-June by Michael ‘mihi’ Schierl. But according to the current vendor of the BlackHole exploit pack, the exact exploit for this vulnerability has only been shared and used privately to date. Reached via instant message, the BlackHole author said the new Java attack will be rolled into a software update to be made available on July 8 to all paying and licensed users of BlackHole.

Regardless of which operating system you use, if you have Java installed, I would advise you to update it, neuter it or remove it as soon as possible. The reason I say this is that Java requires constant patching, and it appears to be the favorite target of attackers these days.
Windows users can find out if they have Java installed and which version by visiting java.com and clicking the “Do I have Java? link. Mac users can use the Software Update feature to check for any available Java updates.
If you primarily use Java because some Web site, or program you have on your system — such as OpenOffice or Freemind — requires it, you can still dramatically reduce the risk from Java attacks just by disabling the plugin in your Web browser. In this case, I  would suggest a two-browser approach. If you normally browse the Web with Firefox, for example, consider disabling the Java plugin in Firefox (from the Add-ons menu, click Plugins and then disable anything Java related, and restart the browser), and then using an alternative browser (ChromeIE9Safari, etc.) with Java enabled to browse only the site that requires it.
Apple stopped bundling Java by default in OS X 10.7 (Lion), it offers instructions for downloading and installing the software framework when users access webpages that use it. The latest iteration of Java for OS X configures the Java browser plugin and Java Web Start to be deactivated if they remain unused for 35 days.

How to Break Into Security, Grossman Edition


How to Break Into Security, Grossman Edition


I recently began publishing a series of advice columns for people who are interested in learning more about security as a craft or profession. For the third installment in this series, I interviewed Jeremiah Grossman, chief technology officer of WhiteHat Security, a Web application security firm.
A frequent speaker on a broad range of security topics, Grossman stressed the importance of coding, networking, and getting your hands dirty (in a clean way, of course).
BK: How did you get started in computer security?
Grossman: For me it was…I could hack stuff and I did it in my spare time and someone offered me a job — which was Yahoo. But before that, I was just a UNIX admin. I was thinking about this question a lot, and what occurred to me is that I don’t know too many people in infosec who chose infosec as a career. Most of the people who I know in this field didn’t go to college to be infosec pros, it just kind of happened. They followed opportunity.
BK: You might have seen that the last two experts I asked had somewhat different opinions on this question, but how important is it that someone interested in this field know how to code?
Grossman: It’s tough to give solid advice without knowing more about a person. For instance, are they interested in network security or application security? You can get by in IDS and firewall world and system patching without knowing any code; it’s fairly automated stuff from the product side. But with application security, it is absolutely mandatory that you know how to code and that you know software. So with Ciscogear, it’s much different from the work you do with Adobe software security. Infosec is a really big space, and you’re going to have to pick your niche, because no one is going to be able to bridge those gaps, at least effectively.
BK: So would you say hands-on experience is more important that formal security education and certifications?
Grossman: The question is are people being hired into entry level security positions straight out of school? I think somewhat, but that’s probably still pretty rare. There’s hardly anyone coming out of school with just computer security degrees. There are some, but we’re probably talking in the hundreds. I think the universities are just now within the last 3-5 years getting masters in computer security sciences off the ground. But there are not a lot of students in them.
BK:  What do you think is the most important qualification to be successful in the security space, regardless of a person’s background and experience level?
Grossman: The ones who can code almost always [fare] better. Infosec is about scalability, and application security is about scalability. And if you can understand code, you have a better likelihood of being able to understand how to scale your solution. On the defense side, we’re out-manned and outgunned constantly. It’s “us” versus “them,” and I don’t know how many of “them,” there are, but there’s going to be too few of “us “at all times.  So whatever your solution is or design criteria, you’re going to have to scale it. For instance, you can imagine Facebook…I’m not sure many security people they have, but…it’s going to be a tiny fraction of a percent of their user base, so they’re going to have to figure out how to scale their solutions so they can protect all those users.

BK: What kind of programming languages do you think are most relevant, useful and applicable to today’s environments?
Grossman: Learning to program in something, anything, is really helpful. My personal preference is Javascript and browser based languages. That seems to be the future, and it’s also what I like to code in. But it’s good to know software — for example .NET and Java on the server and Javascript on the client.
BK: What’s the best way for people who have already have coding skills to cut their teeth on security work?

Grossman: If they’re at an established organization, they can go to their security department and ask how they can get involved. If they can code, believe me there’s stuff they can do in security to help automate the process. Most every place that has a CSO or IT department where they do some stuff in security, someone interested in this field could ask to take on some projects to start cutting their teeth – code some things and implement things, and start that way. At least for me, I find learning on the job far superior to going back to school or going to get a cert. Just try to start finding areas where you can add value.
BK: I’m guessing you’re not big on certifications?
Grossman: At least in security, I never had one. But I might be an anomaly. A lot of people that have them seem to derive value from them. But I hire people all the time, and I never gave a crap about security certs.
BK: Well, then how do you determine whether someone knows what they’re doing or talking about?
Grossman: I think we’re the exception and not the rule, but we try not to hire security people, because they have bad habits. We prefer to train our own. So we’ll take programmers or computer science students and train them in our way of security. But again, other Fortune 500 companies, I’ve heard CISSPs are mandatory. For good or bad reasons, it is what it is.
BK: So is Web application security where it’s at? Is this a relatively safe field for people to specialize in?
Grossman: It seems to be. It’s probably not the only one. But Web security is a subset of all application security, and anything in appsec seems to be hot.  Finding 0days, working for governments, things like that…those seem to be pretty interesting, up-and-coming fields. VUPEN is on the record saying they wouldn’t sell their Google chrome 0day for a million dollars, because they’re going to get more money from other governments. And the field of exploit writing and development has gotten a whole lot of PR recently with Stuxnet and Flameand Duqu and all that.
BK: I would think you’d have to be fairly advanced at what you do to play in that field, no?
Grossman: Well, I think if you’re a really good, let’s says C# developer, and you know the guts of ASLR andDEP, I don’t think it’s more than a couple of months past that point to actually understand how to go about finding vulnerabilities and exploiting them. I don’t do that myself, but there are a couple of core technologies that you absolutely must learn to do this stuff.
BK: But if nobody is teaching security and programming securely, how do people — even if they endeavor to grasp something like C# and understand how it’s supposed to be written — how can they be confident of learning it well enough to find the bugs in the security stuff? Or should they be thinking about that from the get-go — to question their own assumptions?
Grossman: What’s interesting is all that all the new 0days that are coming out, none of them are using new techniques. They’re using techniques that are already well known, and then chaining them together. I think it was a 19-year-old kid who won a competition this year at CanSecWest by chaining together [a number of] bugs to make a full bypass in Google Chrome’s security. It only gets difficult when you’re finding a brand-new technique and bringing the industry forward. But if you’re willing to research all the white papers and read about the different ways to manipulate software…it’s only first time that’s hard. The second time is easy. If you’re building the next Stuxnet for the government and you need to find some zero days to do so, you don’t need to break new ground. You just need to use some known techniques in the existing software to find bugs no one else has found yet. And they’re there.
BK: So, focusing on finding zero-day vulnerabilities is a career path you’d recommend in infosec?
Grossman: For better or for worse, ethics or not, this is the future that we’re going to have to deal with infosec. A recent quote resonated with me, by Haroon Meer; he said everyone is one zero-day away from compromise. And if that’s the case, if you take a particular piece of software, whether it’s Flash or IE, ask yourself what does a zero day cost? And that cost is how much money it takes to break into a target, provided they have perfect security today.
BK: What advice would you give to folks who want to get hands-on and learn how to break and fix stuff?
Grossman: It depends on what they want to break, whether it’s web sites or, say, mobile devices. OWASPhas something called Webgoat, which is something you can install yourself to practice your hacking skills on. It’s a purposely broken webapp, and you can use it to start learning some tricks. If you want to do some live exploration, there are a number of sites out there that let you safely, legitimately hack them.  Google,FacebookMozilla, and you can try your hand at it. There are a bunch of them listed at Dan Kaminsky’s site. Some will pay you money if you find and report bugs, and some won’t. But either way, they’re public and they’re legal. They all have bugs, and at it seems like at least one is posted in Google like every week or two.
BK: Well, you know what they say: It’s not what you know but who you know. Any advice for getting to know some security geeks who might one day introduce you to your future boss?
Grossman: That’s easy…go to a security conference. They’re not all expensive. There are at least one or two every week now, all over the world and in just about every country. I think 200-300 days out of the year there’s a security conference going on.

Have you seen:

How To Break Into Security: Schneier Edition…Last month, I published the first in a series of advice columns for people who are interested in learning more about security as a craft or profession. In this second installment, I asked noted cryptographer, author and security rock star Bruce Schneier for his thoughts.
rtechinsane,icodesource,SEO,SEO Tips,SEO Backlinks,SEO content,SEO tricks,SEO Engine,codes,gadgets,iphones,ipad,4G phones,geeks,reviews,database,DBMS,
warehouse,datamining,datawarehouse

Recent Posts