Micro 3-D Printer Creates Tiny Structures in Seconds

Via: MIT Technology Review

Faster printing could see the technology move from research labs to industry. 

By Prachi Patel on March 5, 2013

Nanoscribe, a spin-off from the Karlsruhe Institute of Technology in Germany, has developed a tabletop 3-D microprinter that can create complicated microstructures 100 times faster than is possible today. “If something took one hour to make, it now takes less than one minute,” says Michael Thiel, chief scientific officer at Nanoscribe.

While 3-D printing of toys, iPhone covers, and jewelry continues to grab headlines (see “The Difference Between Makers and Manufacturers”), much of 3-D printing’s impact could be at a much smaller scale. Micrometer-scale printing has shown promise for making medical and electronic devices.

Thiel says it should be possible to speed up his company’s microprinting technique even more in the future.

Nanoscribe plans to start selling its machine in the second half of this year.

Printing microstructures with features a few hundred nanometers in size could be useful for making heart stents, microneedles for painless shots, gecko adhesives, parts for microfluidics chips, and scaffolds for growing cells and tissue. Another important application could be in the electronics industry, where patterning nanoscale features on chips currently involves slow, expensive techniques. 3-D printing would quickly and cheaply yield polymer templates that could be used to make metallic structures.

Read more: here

Advertisements

Aussie Cops: Silk Road TOR Anonymity ‘Not Guaranteed’

Via: cso.com

We monitor Aussie buyers and sellers on Silk Road, says maritime cargo watcher.

Liam Tung (CSO Online (Australia))26 July, 2012 09:42
There is no guarantee of anonymity for Australian buyers and sellers of illicit drugs on the TOR-encrypted e-commerce platform Silk Road, according to the Australian Federal Police and Australian Customers and Border Protection. 
The pair released a joint statement Wednesday pointing to the arrest of one Melbourne man who allegedly imported narcotics via Silk Road. 
“Criminals are attempting to exploit the international mail system through online networks, but the recent arrest demonstrates that we are one step ahead of them,” said AFP Manager Crime Operations Peter Sykora.
Sykora said it was aware Silk Road was operated from an offshore location, but warned Australian users were within the reach of the AFP’s powers. 
The site can only be accessed via TOR, which masks IP address details that could otherwise be stored by an ISP and associated with a user account. Silk Road trade relies on the virtual currency BitCoin for transactions.
Alana Sullivan, acting national of Custom’s cargo and maritime targeting branch, said it monitors Silk Road along with other illicit-drug sites and was aware of the Australian presence on Silk Road as both sellers and buyers. 
“Persons who buy or sell through online market places, on so-called ‘anonymous’ networks should understand that they are not guaranteed anonymity,” said Sullivan.

Read more: here

3-D Printed Car Is as Strong as Steel, Half the Weight, and Nearing Production

Via: Wired

By Alexander George

Picture an assembly line not that isn’t made up of robotic arms spewing sparks to weld heavy steel, but a warehouse of plastic-spraying printers producing light, cheap and highly efficient automobiles.

If Jim Kor’s dream is realized, that’s exactly how the next generation of urban runabouts will be produced. His creation is called the Urbee 2 and it could revolutionize parts manufacturing while creating a cottage industry of small-batch automakers intent on challenging the status quo.

Urbee’s approach to maximum miles per gallon starts with lightweight construction – something that 3-D printing is particularly well suited for. The designers were able to focus more on the optimal automobile physics, rather than working to install a hyper efficient motor in a heavy steel-body automobile. As the Urbee shows, making a car with this technology has a slew of beneficial side effects.

Jim Kor is the engineering brains behind the Urbee. He’s designed tractors, buses, even commercial swimming pools. Between teaching classes, he heads Kor Ecologic, the firm responsible for the 3-D printed creation.

“We thought long and hard about doing a second one,” he says of the Urbee. “It’s been the right move.”

Kor and his team built the three-wheel, two-passenger vehicle at RedEye, an on-demand 3-D printing facility. The printers he uses create ABS plastic via Fused Deposition Modeling (FDM). The printer sprays molten polymer to build the chassis layer by microscopic layer until it arrives at the complete object. The machines are so automated that the building process they perform is known as “lights out” construction, meaning Kor uploads the design for a bumper, walk away, shut off the lights and leaves. A few hundred hours later, he’s got a bumper. The whole car – which is about 10 feet long – takes about 2,500 hours.

Read more: here

Cool Downloading Software

Via: http: Down Them All!

This is handy for downloading everything on a page…unattended…

DownThemAll (or just dTa) is a powerful yet easy-to-use Mozilla Firefox extension that adds new advanced download capabilities to your browser.

It lets you download all the links or images contained in a webpage and more: you can refine your downloads by fully customizable criteria to get only what you really want.

Read more: here

Blocking China and Bots

Via: Cryptome

Subject: Re: NYT covers China cyberthreat
On Thu, Feb 21, 2013 at 01:34:13AM +0000, Warren Bailey wrote:

> I can’t help but wonder what would happen if US Corporations simply
> blocked all inbound Chinese traffic. Sure it would hurt their business,
> but imagine what the Chinese people would do in response.

Would it hurt their business? Really?

Well, if they’re eBay, probably. If they’re Joe’s Fill Dirt and Croissants in Omaha, then probably not, because nobody, NOBODY in China is ever actually going to purchase a truckload of dirt or a tasty croissant from Joe. So would it actually matter if they couldn’t get to Joe’s web site or Joe’s mail server or especially Joe’s VPN server? Probably not.

Nobody in Peru, Egypt, or Romania is likely to be buying from Joe any time soon either.
This is why I’ve been using geoblocking at the network and host levels for over a decade, and it works. But it does require that you make an effort to study and understand your own traffic patterns as well as your organizational requirements. [1]

I use it on a country-by-country basis (thank you ipdeny.com) and on a service-by-service basis: a particular host might allow http from anywhere, but ssh only from the country it’s in. I also deny selected networks access to selected services, e.g., Amazon’s cloud doesn’t get access to port 25 because of the non-stop spam and Amazon’s refusal to do anything about it. Anything on the Spamhaus DROP or EDROP lists (thank you Spamhaus) is not part of my view of the Internet. And so on. Combined, all this achieves lossless compression of abusive traffic.

This is not a security fix, per se; any services that are vulnerable are still vulnerable. But it does cut down on the attack surface as measured along one axis, which in turn reduces the scope of some problems and renders them more tractable to other approaches.

Read more: here

Temporary Tattoos Could Make Electronic Telepathy and Telekinesis Possible

Via: IO9

Charles Q. Choi – Txchnologist

Temporary electronic tattoos could soon help people fly drones with only thought and talk seemingly telepathically without speech over smartphones, researchers say. Electrical engineer Todd Coleman at the University of California at San Diego is devising noninvasive means of controlling machines via the mind, techniques virtually everyone might be able to use.

Commanding machines using the brain is no longer the stuff of science fiction. In recent years, brain implants have enabled people to control robotics using only their minds, raising the prospect that one day patients could overcome disabilities using bionic limbs or mechanical exoskeletons.

 But brain implants are invasive technologies, probably of use only to people in medical need of them. Instead, Coleman and his team are developing wireless flexible electronics one can apply on the forehead just like temporary tattoos to read brain activity.

Read more: here

Cain and Able

Via: oxid.it
 
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

Read more: here

Top 15 Security/Hacking Tools & Utilities

Via: Dark Net

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.

Read more: here

Network Intrusion Prevention and Detection System

Via: Snort.org

Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for IPS.

Read more: here

Using Netcat To Spawn A Remote Shell

Via: The Tech Cafe

Netcat is one of those old school hacking tools that has been around for what seems like an eternity. Its stable release was made available back in March 20, 1996 and is currently available for download at http://netcat.sourceforge.net. That being said…I didn’t even get my first real computer until 1999, which was a Compaq Presario. My knowledge of computers and the Internet was nonexistent but I thought it was so amazing that shortly afterwards enrolled in Computer Career Center and never looked back.

Anyway, Netcat is known as the “Swiss-army knife” of the hacker’s toolkit and is currently at #4 on the list of the Top 100 Network Security Tools. Very few other tools have held up as well as Netcat so it’s probably something you might want to spend some time playing with…and by play I mean hack…or hack not…it’s up to you..

So what makes this tools so versatile you ask…and if you didn’t ask it was certainly on your mind..Some of its major features are…

Port scanning with randomization
Hex dump of transmitted\received data
Full DNS forward\reverse checking
Outbound\inbound connections, TCP\UDP, to or from any ports
Client\Server chat

Read more: here

The Power of netcat

Via: The Genius

Netcat actually not a hacking tool. It is networking tools. We can use it to communicate with other computers remotely, data transfer etc. But We can also use it as Backdoor or hacking tools. “ping” is not hacking or DoS tool but we can DoS using “Ping” …no? That is why we can’t call it DDOSER tool.

Anyway, Often netcat called “Swiss Army Knife”

I will explain the basic usage of it now

All option in netcat:

nc -h
[v1.10-38]
connect to somewhere:   nc [-options] hostname port[s] [ports] …
listen for inbound:     nc -l -p port [-options] [hostname] [port]
options:
        -c shell commands       as `-e’; use /bin/sh to exec [dangerous!!]
        -e filename             program to exec after connect [dangerous!!]
        -b                      allow broadcasts
        -g gateway              source-routing hop point[s], up to 8
        -G num                  source-routing pointer: 4, 8, 12, …
        -h                      this cruft
        -i secs                 delay interval for lines sent, ports scanned
        -k                      set keepalive option on socket
        -l                      listen mode, for inbound connects
        -n                      numeric-only IP addresses, no DNS
        -o file                 hex dump of traffic
        -p port                 local port number
        -r                      randomize local and remote ports
        -q secs                 quit after EOF on stdin and delay of secs
        -s addr                 local source address
        -T tos                  set Type Of Service
        -t                      answer TELNET negotiation
        -u                      UDP mode
        -v                      verbose [use twice to be more verbose]
        -w secs                 timeout for connects and final net reads
        -z                      zero-I/O mode [used for scanning]
port numbers can be individual or ranges: lo-hi [inclusive];
hyphens in port names must be backslash escaped (e.g. ‘ftp\-data’).

We can use netcat as backdoor, banner grabbing, port scanning, chatting, file transfer, traffic redirection etc.

Read more: here

Port Knocking

Via: About.com

Good Guys and Bad Guys Are Using This Method To Open Ports

From Tony Bradley, CISSP, MCSE2k, MCSA, A+

Ideally you want to restrict and control the traffic that is allowed into your network or computer. This can be done in a variety of ways. Two of the primary methods are to make sure that unneccesary ports on your computer are not open or listening for connections and to use a firewall- either on the computer itself or at the network perimeter- to block unauthorized traffic.

By monitoring traffic and manipulating firewall rules based on events it is possible to create a sort of “secret knock” that will open the gate and let you through the firewall. Even though no ports may be open at the time, a specific series of connection attempts to closed ports may provide the trigger to open a port for communication.

In a nutshell, you would have a service running on the target device which would watch network activity- typically by monitoring firewall logs. The service would need to know the “secret knock”- for example failed connection attempts to port 103, 102, 108, 102, 105. If the service encountered the “secret knock” in the correct order it would then automatically alter the firewall rules to open a designated port to allow remote access.

The malware writers of the world have unfortunately (or fortunately- you’ll see why in a minute) begun to adopt this technique for opening backdoors on victimized systems. Basically, rather than opening ports for remote connection that are readily visible and detectable, a Trojan is planted which monitors the network traffic. Once the “secret knock” is intercepted the malware will awaken and open the pre-determined backdoor port, allowing the attacker access to the system.

Read more: here

Introduction to Packet Sniffing

Via: About.com

It’s a cruel irony in information security that many of the features that make using computers easier or more efficient and the tools used to protect and secure the network can also be used to exploit and compromise the same computers and networks. This is the case with packet sniffing.

A packet sniffer, sometimes referred to as a network monitor or network analyzer, can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic. Using the information captured by the packet sniffer an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help maintain efficient network data transmission.

In its simple form a packet sniffer simply captures all of the packets of data that pass through a given network interface. Typically, the packet sniffer would only capture packets that were intended for the machine in question. However, if placed into promiscuous mode, the packet sniffer is also capable of capturing ALL packets traversing the network regardless of destination.

By placing a packet sniffer on a network in promiscuous mode, a malicious intruder can capture and analyze all of the network traffic. Within a given network, username and password information is generally transmitted in clear text which means that the information would be viewable by analyzing the packets being transmitted.

Read more: here