Tuesday, May 6, 2014

$1,500 Google Glass Costs Just $80 to Make?


Get this. You know Google Glass, the futuristic headset that sells for $1,500? According to a new report from TechInsight's Teardown.com, the high-tech headpiece only costs around $80 to produce.
The site secured a pair of the pricey specs and then ripped them apart, piece by piece, to determine the estimated price of each component. The surprising finding? Their preliminary analysis revealed that the bill of materials for all the parts and pieces used to make Google Glass adds up to a measly $79.78.
The most expensive component used in Glass is the Texas Instruments OMAP 4430 applications processor, which comes in at around $13.96. The display, touch screen, and glass cost just $3, while the battery comes in at $1.14, and the camera is worth $5.66. Non-electrical material used in the device costs $13.63, while the 16GB of NAND flash memory from Toshiba totals $8.18, and assembly and testing comes in at $2.15.

Google, meanwhile, says Teardown.com's assessment is not accurate.
"The estimate is wrong," a Google spokesperson told PCMag.com in an email. "The Glass Explorer Edition costs significantly more to produce."
Meanwhile, Teardown.com warned that it's still examining the headset and its initial figures are just a rough estimate that will likely change when it gets a closer look.
The bill of materials also doesn't include the research and development costs that went into making the device, or the cost of developing any of the apps and services that run on it.
For more on Teardown.com's analysis, check out the chart below. Also see PCMag's full review of the Google Glass Explorer Edition Version 2.0, which received a "good" rating of three-out-of-five stars.
Meanwhile, Google recently debunked some of the most common "myths" about its high-tech specs — and admitted that they're not quite ready for prime time.


Thursday, April 10, 2014

Massive OpenSSL Bug 'Heartbleed' Threatens Sensitive Data


For a more detailed analysis of this catastrophic bug, see this update, which went live about 18 hours after Ars published this initial post.
Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.
The warning about the bug in OpenSSL coincided with the release of version 1.0.1g of the open-source program, which is the default cryptographic library used in the Apache and nginx Web server applications, as well as a wide variety of operating systems and e-mail and instant-messaging clients. The bug, which has resided in production versions of OpenSSL for more than two years, could make it possible for people to recover the private encryption key at the heart of the digital certificates used to authenticate Internet servers and to encrypt data traveling between them and end users. Attacks leave no traces in server logs, so there's no way of knowing if the bug has been actively exploited. Still, the risk is extraordinary, given the ability to disclose keys, passwords, and other credentials that could be used in future compromises.
"Bugs in single software or library come and go and are fixed by new versions," the researchers who discovered the vulnerability wrote in a blog post published Monday. "However this bug has left a large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitations and attacks leaving no trace this exposure should be taken seriously."
The researchers, who work at Google and software security firm Codenomicon, said even after vulnerable websites install the OpenSSL patch, they may still remain vulnerable to attacks. The risk stems from the possibility that attackers already exploited the vulnerability to recover the private key of the digital certificate, passwords used to administer the sites, or authentication cookies and similar credentials used to validate users to restricted parts of a website. Fully recovering from the two-year-long vulnerability may also require revoking any exposed keys, reissuing new keys, and invalidating all session keys and session cookies. Members of the Tor anonymity project have a brief write-up of the bug here, and a this analysis provides useful technical details.
OpenSSL is by far the Internet's most popular open-source cryptographic library and TLS implementation. It is the default encryption engine for Apache, nginx, which according to Netcraft runs 66 percent of websites. OpenSSL also ships in a wide variety of operating systems and applications, including the Debian Wheezy, Ubuntu, CENTOS, Fedora, OpenBSD, FreeBSD, and OpenSUSE distributions of Linux. The missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension affects OpenSSL 1.0.1 through 1.0.1f.
The bug, which is officially referenced as CVE-2014-0160, makes it possible for attackers to recover up to 64 kilobytes of memory from the server or client computer running a vulnerable OpenSSL version. Nick Sullivan, a systems engineer at CloudFlare, a content delivery network that patched the OpenSSL vulnerability last week, said his company is still evaluating the likelihood that private keys appeared in memory and were recovered by attackers who knew how to exploit the flaw before the disclosure. Based on the results of the assessment, the company may decide to replace its underlying TLS certificate or take other actions, he said.

Attacking from the outside

The researchers who discovered the vulnerability, however, were less optimistic about the risks, saying the bug makes it possible for attackers to surreptitiously bypass virtually all TLS protections and to retrieve sensitive data residing in the memory of computers or servers running OpenSSL-powered software.
"We attacked ourselves from outside, without leaving a trace," they wrote. "Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, user names and passwords, instant messages, emails and business critical documents and communication."
They called on white-hat hackers to set up "honeypots" of vulnerable TLS servers designed to entrap attackers in an attempt to see if the bug is being actively exploited in the wild. The researchers have dubbed the vulnerability Heartbleed because the underlying bug resides in the OpenSSL implementation of the TLS heartbeat extension as described in RFC 6520 of the Internet Engineering Task Force.
The OpenSSL vulnerability is the latest to threaten the HTTPS scheme that's the default and often only method for cryptographically protecting websites, e-mail, an other Internet communications from attacks that allow hackers to eavesdrop on end users or impersonate trusted websites. Last month, developers of the GnuTLS library disclosed an equally catastrophic bug that left hundreds of open-source applications open to similar attacks. And in February, Apple fixed an extremely critical vulnerability in the iOS and OS X operating systems that also made it possible for hackers to bypass HTTPS protections.

Iowa State scientist developing materials, electronics that dissolve when triggered


A medical device, once its job is done, could harmlessly melt away inside a person's body. Or, a military device could collect and send its data and then dissolve away, leaving no trace of an intelligence mission. Or, an environmental sensor could collect climate information, then wash away in the rain. It's a new way of looking at electronics: "You don't expect your cell phone to dissolve someday, right?" said Reza Montazami, an Iowa State University assistant professor of mechanical engineering. "The resistors, capacitors and electronics, you don't expect everything to dissolve in such a manner that there's no trace of it."
But Montazami thinks it can happen and is developing the necessary materials.
He calls the technology "transient materials" or "transient electronics." The materials are special polymers designed to quickly and completely melt away when a trigger is activated. It's a fairly new field of study and Montazami says he's making progress.
The research team he's leading, for example, is developing degradable polymer composite materials that are suitable platforms for electronic components. The team has also built and tested a degradable antenna capable of data transmission.
The team presented some of its research results at the recent meeting of the American Chemical Society in Dallas.
And, a paper describing some of the team's work, "Study of Physically Transient Insulating Materials as a Potential Platform for Transient Electronics and Bioelectronics," has just been published online by the journal Advanced Functional Materials.
The paper focuses on the precise control of the degradation rate of polymer composite materials developed for transient electronics.
Montazami is the lead senior author of the paper. Iowa State co-authors are Nastaran Hashemi, an assistant professor of mechanical engineering; Handan Acar and Simge Cinar, postdoctoral research associates in mechanical engineering; and Mahendra Thunga, a postdoctoral research associate in materials science and engineering and an associate of the U.S. Department of Energy's Ames Laboratory. Michael Kessler, formerly of Iowa State and now professor and director of Washington State University's School of Mechanical and Materials Engineering in Pullman, is also a co-author.
The research has been supported by Montazami's startup funds from Iowa State. He's pursuing grants to support additional projects.
"Investigation of electronic devices based on transient materials (transient electronics) is a new and rarely addressed technology with paramount potentials in both medical and military applications," the researchers wrote in the paper.
To demonstrate that potential, Montazami played a video showing a blue light-emitting diode mounted on a clear polymer composite base with the electrical leads embedded inside. Add a drop of water and the base and wiring begin to melt away. Before long the light goes out and a second drop of water degrades what little is left.
The researchers have developed and tested transient resistors and capacitors. They're working on transient LED and transistor technology, said Montazami, who started the research as a way to connect his background in solid-state physics and materials science with applied work in mechanical engineering.
As the technology develops, Montazami sees more and more potential for the commercial application of transient materials.
Just think, he said, if you lose your credit card, you could send out a signal that causes the card to self-destruct. Or, sensors programmed to degrade over certain times and temperatures could be stored with food. When the sensors degrade and stop sending a signal, that food is no longer fresh. Or, when soldiers are wounded, their electronic devices could be remotely triggered to melt away, securing sensitive military information.

How Google Glass is helping Parkinson's sufferers

Newcastle University is trialling new technology to help patients suffering from Parkinson's disease live more independently by reminding them to swallow, speak up and take their medication


Google Glass is being used by people suffering from Parkinson’s disease in a groundbreaking experiment to see if the technology can help improve their day-to-day lives.
The technology, which is not yet available in Britain, reminds the patients to take their medication, contacts relatives in an emergency and can even prevent debilitating episodes of paralysis – known as ‘freezing.’
The system works like a hands-free smartphone, displaying information on the lens of the Glass. It is voice-operated and linked to the internet.
Doctors at Newcastle University have created a programme that helps control behaviour associated with Parkinson's, such as reminding the individual to speak up or to swallow to prevent drooling.
“The beauty of this research project is we are designing the apps and systems for Glass in collaboration with the users so the resulting applications should exactly meet their needs,” said Dr John Vines of the School of Computing Science

"What was really encouraging from this early study was how well our volunteers took to the wearable technology and the factthat they could see the potential in it."
Parkinson's disease is a progressive neurological condition affecting around 127,000 people in Britain, one in 500.
It effects motor symptoms and can cause the muscles to go rigid, tremor or slow down which affects balance, gait and arm and facial movements.
‘Motor blocks’ affect people's legs during walking causing them to 'freeze'; speech and voice are typically affected in terms of volume and clarity and the automatic swallowing mechanism is switched off so individuals often drool.
PhD student Roisin McNaney, a speech and language therapist, said the big challenge is finding technology that is not only useful to people but is also discreet.
"People with Parkinson's are already coping with so much and one of the main causes of social isolation is the stigma around behaviours such as drooling and tremor which they have no control over.
"The last thing we want is a system of cueing which is so obvious it adds to people's overall embarrassment.”
Ken Booth, 56, from County Durham, who was first diagnosed with Parkinson's in 1991 has been trialling the new system.

"They're just fantastic. The potential for someone with Parkinson's is endless. For me the biggest benefit was confidence. When you freeze your legs stop working but your body carries on moving forward and it's easy to fall.
"Because Glass is connected to the internet you can link it to computers and mobile phones. So if you're alone you just have to look through the Glass and carers, friends or relatives will be able to see exactly where you are and come and get you. Or you just tell it to call someone and it rings them."
Using it as a medication reminder is another of the applications the Newcastle University team is looking at.
"The drugs don't cure Parkinson's, they control it so it's really important to take the medication on time," said Mr Booth.
"I was taking two or three different drugs every two hours, different combinations at different times of the day; some with water, some with food, the instructions are endless. Having a reminder that is literally in your face wherever you are and whatever you are doing would really help.
Lynn Tearse, 46, a retired teacher who was diagnosed with Parkinson's in 2008, added: “eople would probably say you can do all these things on a smartphone but actually, with Parkinson's, negotiating a touch screen is really difficult.
"It's not just the tremor. During a 'down time' when the medication is starting to wear off and you're waiting for the next lot to kick in it can be like trying to do everything wearing a pair of boxing gloves. Your movements are very slow and your body won't do what you want it to."
Miss Tearse said Google Glass could also be hugely helpful to unlock the brain when is 'freezes'.
"No-one really understands why it happens," explains Lynn, "but it happens when the flat surface in front of you breaks up or the space in front of you narrows such as a doorway. Revolving doors are particularly bad.
"Your legs gradually freeze up and the difficulty is getting started again. The brain seems to need a point beyond the blockage to fix on and people use different things.
“This is where Glass could really make a difference."

Saturday, March 29, 2014

Snoopy: Distributed Tracking and Profiling Framework

Snoopy is a distributed tracking and profiling framework to perform some pretty interesting tracking and profiling of mobile users through the use of WiFi. The talk was well received (going on what people said afterwards) by those attending the conference and it was great to see so many others as excited about this as we have been.

In addition to the research, we both took a different approach to the presentation itself. A 'no bullet points' approach was decided upon, so the slides themselves won't be that revealing. Using Steve Jobs as our inspiration, we wanted to bring back the fun to technical conferences, and our presentation hopefully represented that. As I type this, I have been reliably informed that the DVD, and subsequent videos of the talk, is being mastered and will be ready shortly. Once we have it, we will update this blog post. In the meantime, below is a description of the project.
Background
There have been recent initiatives from numerous governments to legalise the monitoring of citizens' Internet based communications (web sites visited, emails, social media) under the guise of anti-terrorism. Several private organisations have developed technologies claiming to facilitate the analysis of collected data with the goal of identifying undesirable activities. Whether such technologies are used to identify such activities, or rather to profile all citizens, is open to debate. Budgets, technical resources, and PhD level staff are plentiful in this sphere.
Snoopy
The above inspired the goal of the Snoopy project: with the limited time and resources of a few technical minds could we create our own distributed tracking and data interception framework with functionality for simple analysis of collected data? Rather than terrorist-hunting, we would perform simple tracking and real-time + historical profiling of devices and the people who own them. It is perhaps worth mentioning at this point that Snoopy is compromised of various existing technologies combined into one distributed framework.
"Snoopy is a distributed tracking and profiling framework."
Below is a diagram of the Snoopy architecture, which I'll elaborate on:



Snoopy runs client side code on any Linux device that has support for wireless monitor mode / packet injection. We call these "drones" due to their optimal nature of being small, inconspicuous, and disposable. Examples of drones we used include the Nokia N900Alfa R36 routerSheeva plug, and the RaspberryPi. Numerous drones can be deployed over an area (say 50 all over London) and each device will upload its data to a central server.

2. WiFi?

A large number of people leave their WiFi on. Even security savvy folk; for example at BlackHat I observed >5,000 devices with their WiFi on. As per the RFC documentation (i.e. not down to individual vendors) client devices send out 'probe requests' looking for networks that the devices have previously connected to (and the user chose to save). The reason for this appears to be two fold; (i) to find hidden APs (not broadcasting beacons) and (ii) to aid quick transition when moving between APs with the same name (e.g. if you have 50 APs in your organisation with the same name). Fire up a terminal and bang out this command to see these probe requests:
tshark -n -i mon0 subtype probereq
(where mon0 is your wireless device, in monitor mode)

2. Tracking?
Each Snoopy drone collects every observed probe-request, and uploads it to a central server (timestamp, client MAC, SSID, GPS coordinates, and signal strength). On the server side client observations are grouped into 'proximity sessions' - i.e device 00:11:22:33:44:55 was sending probes from 11:15 until 11:45, and therefore we can infer was within proximity to that particular drone during that time.
We now know that this device (and therefore its human) were at a certain location at a certain time. Given enough monitoring stations running over enough time, we can track devices/humans based on this information.
3. Passive Profiling?
We can profile device owners via the network SSIDs in the captured probe requests. This can be done in two ways; simple analysis, and geo-locating.
Simple analysis could be along the lines of "Hmm, you've previously connected to hooters, mcdonalds_wifi, and elCheapoAirlines_wifi - you must be an average Joe" vs "Hmm, you've previously connected to "BA_firstclass, ExpensiveResataurant_wifi, etc - you must be a high roller".
Of more interest, we can potentially geo-locate network SSIDs to GPS coordinates via services like Wigle (whose database is populated via wardriving), and then from GPS coordinates to street address and street view photographs via Google. What's interesting here is that as security folk we've been telling users for years that picking unique SSIDs when using WPA[2] is a "good thing" because the SSID is used as a salt. A side-effect of this is that geo-locating your unique networks becomes much easier. Also, we can typically instantly tell where you work and where you live based on the network name (e.g BTBusinessHub-AB12 vs BTHomeHub-FG12).
The result - you walk past a drone, and I get a street view photograph of where you live, work and play.
4. Rogue Access Points, Data Interception, MITM attacks?

Snoopy drones have the ability to bring up rogue access points. That is to say, if your device is probing for "Starbucks", we'll pretend to be Starbucks, and your device will connect. This is not new, and dates back to Karma in 2005. The attack may have been ahead of its time, due to the far fewer number of wireless devices. Given that every man and his dog now has a WiFi enabled smartphone the attack is much more relevant.
Snoopy differentiates itself with its rogue access points in the way data is routed. Your typicalPineappleSilica, or various other products store all intercepted data locally, and mangles data locally too. Snoopy drones route all traffic via an OpenVPN connection to a central server. This has several implications:
(i) We can observe traffic from all drones in the field at one point on the server. (ii) Any traffic manipulation needs only be done on the server, and not once per drone. (iii) Since each Drone hands out its own DHCP range, when observing network traffic on the server we see the source IP address of the connected clients (resulting in a unique mapping of MAC <-> IP <-> network traffic). (iv) Due to the nature of the connection, the server can directly access the client devices. We could therefore run nmap, Metasploit, etc directly from the server, targeting the client devices. This is a much more desirable approach as compared to running such 'heavy' software on the Drone (like the Pineapple, pr Pwnphone/plug would). (v) Due to the Drone not storing data or malicious tools locally, there is little harm if the device is stolen, or captured by an adversary.
On the Snoopy server, the following is deployed with respect to web traffic:
(i) Transparent Squid server - logs IP, websites, domains, and cookies to a database (ii) sslstrip - transparently hijacks HTTP traffic and prevent http upgrade by watching for http links and redirecting. It then maps those links into either look-alike HTTP links or homograph-similar http links. All credentials are logged to the database (thanks Ian & Junaid). (iii) mitmproxy.py - allows for arbitary code injection, as well as the use of self-signed SSL certificates. By default we inject some JavaScipt which profiles the browser to discern the browser version, what plugins are installed, etc (thanks Willem).
Additionally, a traffic analysis component extracts and reassembles files. e.g. PDFs, VOiP calls, etc. (thanks Ian).
5. Higher Level Profiling?

Given that we can intercept network traffic (and have clients' cookies/credentials/browsing habbits/etc) we can extract useful information via social media APIs. For example, we could retrieve all Facebook friends, or Twitter followers.

6. Data Visualization and Exploration?

Snoopy has two interfaces on the server; a web interface (thanks Walter), and Maltego transforms.
-The Web Interface The web interface allows basic data exploration, as well as mapping. The mapping part is the most interesting - it displays the position of Snoopy Drones (and client devices within proximity) over time. This is depicted below:



 -Maltego Maltego Radium has recently been released; and it is one awesome piece of kit for data exploration and visualisation.What's great about the Radium release is that you can combine multiple transforms together into 'machines'. A few example transformations were created, to demonstrate:
  1. Devices Observed at both 44Con and BlackHat Vegas Here we depict devices that were observed at both 44Con and BlackHat Las Vegas, as well as the SSIDs they probed for. 
2. Devices at 44Con, pruned Here we look at all devices and the SSIDs they probed for at 44Con. The pruning consisted of removing all SSIDs that only one client was looking for, or those for which more than 20 were probing for. This could reveal 'relationship' SSIDs. For example, if several people from the same company were attending- they could all be looking for their work SSID. In this case, we noticed the '44Con crew' network being quite popular. To further illustrate Snoopy we 'targeted' these poor chaps- figuring out where they live, as well as their Facebook friends (pulled from intercepted network traffic*). 




Snoopy Field Experiment

We collected broadcast probe requests to create two main datasets. I collected data at BlackHat Vegas, and four of us sat in various London underground stations with Snoopy drones running for 2 hours. Furthermore, I sat at King's Cross station for 13 hours (!?) collecting data. Of course it may have made more sense to just deploy an unattended Sheeva plug, or hide a device with a large battery pack - but that could've resulted in trouble with the law (if spotted on CCTV). I present several graphs depicting the outcome from these trials:
The pi chart below depicts the proportion of observed devices per vendor, from the total sample of 77,498 devices. It is interesting to see Apple's dominance. pi_chart
The barchart below depicts the average number of broadcast SSIDs from a random sample of 100 devices per vendor (standard deviation bards need to be added - it was quite a spread). 

The barchart below depicts my day sitting at King's Cross station. The horizontal axis depicts chunks of time per hour, and the vertical access number of unique device observations. We clearly see the rush hours.


Potential Use

What could be done with Snoopy? There are likely legal, borderline, and illegal activities. Such is the case with any technology.
Legal -Collecting anonymized statistics on thoroughfare. For example, Transport for London could deploy these devices at every London underground to get statistics on peak human traffic. This would allow them to deploy more staff, or open more pathways, etc. Such data over the period of months and years would likely be of use for future planning. -Penetration testers targeting clients to demonstrate the WiFi threat.
Borderline -This type of technology could likely appeal to advertisers. For example, a reseller of a certain brand of jeans may note that persons who prefer certain technologies (e.g. Apple) frequent certain locations. -Companies could deploy Drones in one of each of their establishments (supermarkets, nightclubs, etc) to monitor user preference. E.g. a observing a migration of customers from one establishment to another after the deployment of certain incentives (e.g. promotions, new layout). -Imagine the Government deploying hundreds of Drones all over a city, and then having field agents with mobile Drones in their pockets. This could be a novel way to track down or follow criminals. The other side of the coin of course being that they track all of us...
Illegal -Let's pretend we want to target David Beckham. We could attend several public events at which David is attending (Drone in pocket), ensuring we are within reasonable proximity to him. We would then look for overlap of commonly observed devices over time at all of these functions. Once we get down to one device observed via this intersection, we could assume the device belongs to David. Perhaps at this point we could bring up a rogue access point that only targets his device, and proceed maliciously from there. Or just satisfy ourselves by geolocating places he frequents. -Botnet infections, malware distribution. That doesn't sound very nice. Snoopy drones could be used to infect users' devices, either by injection malicious web traffic, or firing exploits from the Snoopy server at devices. -Unsolicited advertising. Imagine browsing the web, and an unscrupulous 3rd party injects viagra adverts at the top of every visited page?

Similar tools

Immunity's Stalker and Silica Hubert's iSniff GPS

Snoopy in the Press

FAQ

Q. But I use WPA2 at home, you can't hack me! A. True - if I pretend to be a WPA[2] network association it will fail. However, I bet your device is probing for at least one open network, and when I pretend to be that one I'll get you.
Q. I use Apple/Android/Foobar - I'm safe! A. This attack is not dependent on device/manufacture. It's a function of the WiFi specification. The vast majority of observed devices were in fact Apple (>75%).
Q. How can I protect myself? A. Turn off your WiFi when you l leave home/work. Be cautions about using it in public places too - especially on open networks (like Starbucks). A. On Android and on your desktop/laptop you can selectively remove SSIDs from your saved list. As for iPhones there doesn't seem to be option - please correct me if I'm wrong? A. It'd be great to write an application for iPhone/Android that turns off probe-requests, and will only send them if a beacon from a known network name is received.
Q. Your research is dated and has been done before! A. Some of the individual components, perhaps. Having them strung together in our distributed configuration is new (AFAIK). Also, some original ideas where unfortunately published first; as often happens with these things.
Q. But I turn off WiFi, you'll never get me! A. It was interesting to note how many people actually leave WiFi on. e.g. 30,000 people at a single London station during one day. WiFi is only one avenue of attack, look out for the next release using Bluetooth, GSM, NFC, etc :P
Q. You're doing illegal things and you're going to jail! A. As mentioned earlier, the broadcast nature of probe-requests means no laws (in the UK) are being broken. Furthermore, I spoke to a BT Engineer at 44Con, and he told me that there's no copyright on SSID names - i.e. there's nothing illegal about pretending to be "BTOpenzone" or "SkyHome-AFA1". However, I suspect at the point where you start monitoring/modifying network traffic you may get in trouble. Interesting to note that in the USA a judge ruled that data interception on an open network is not illegal.
Q. But I run iOS 5/6 and they say this is fixed!! A. Mark Wuergler of Immunity, Inc did find a flaw whereby iOS devices leaked info about the last 3 networks they had connected to. The BSSID was included in ARP requests, which meant anyone sniffing the traffic originating from that device would be privy to the addresses. Snoopy only looks at broadcast SSIDs at this stage - and so this fix is unrelated. We haven't done any tests with the latest iOS, but will update the blog when we have done so.

Source : sensepost.com 

Friday, March 21, 2014

The Unix Tip of the Day - Running Commands remotely using ssh

Today we will create a small script that will allow us to run one or more commands on multiply Unix/Linux servers ..

List of Commands / Tools :

SSH :    (SSH client) is a program for logging into a remote machine and
for executing commands on a remote machine.  It is intended to replac
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network.  X11 connections and  
arbitrary TCP ports can also be forwarded over the secure channel.  

CAT :    cat reads each file in sequence and writes it on the standard output.

FOR :    for will allow us to run in loop until the end of input .

ECHO :  echo writes its arguments separated by blanks and terminated by a
new-line on the standard output

VI :   it's just a text editor

CHMOD :  The chmod command changes the permissions of one or more files
according to the value of symbolic_mode_list or numeric_mode



and the script :

#!/bin/ksh
for u in `cat "$1"`; do
echo "########################################"
echo "             working on $u"
echo "########################################"
ssh $u "$2"
done


save this script in a file , and give it run permissions :

1.  vi Run_My_Commands.sh

      a. click "i" , to start input mode .
     
      b. bust the script .

2.  chmod +x Run_My_Commands.sh


3. and that is it you can run the script like the following : " ./Run_My_Commands.sh  "


the script will get 2 argoments , the first one is a file contain list of users@hosts , and the second argument will be the commands the we willing to run ..

here is an example of the run :


the file_list of users :


the command run :   and here what i run :   ./Run_My_Commands.sh users.txt "ps -efl;bdf .;ls -lrt"



running this will give you the run of the commands :

a.  ps -efl
b.  bdf .
c.  ls -lrt

on all the users in the users.txt fiel .



Thursday, March 20, 2014

The Unix Tip of the Day

Hi ALL

it's Been  long time since last unix/linux tips , so today we will learn to use ps / grep / awk / xargs / kill in one long command .. .

ps :    prints information about selected processes. Use options to specify which processes to select and what information to print about them .

grep :  The grep command searches the input text files (standard input
default) for lines matching a pattern.  Normally, each line found is
copied to the standard output.  grep supports the Basic Regular
Expression syntax (see regexp(5)).  The -E option (egrep) supports
Extended Regular Expression (ERE) syntax (see regexp(5)).  The -F
option (fgrep) searches for fixed strings using the fast Boyer-Moore
string searching algorithm.  The -E and -F options treat newlines
embedded in the pattern as alternation characters.  A null expression
or string matches every line.

awk :   awk scans each input file for lines that match any of a set of
patterns specified literally in program or in one or more files
specified as -f progfile.  With each pattern there can be an
associated action that is to be performed when a line in a file
matches the pattern.  Each line is matched against the pattern portion
of every pattern-action statement, and the associated action is
performed for each matched pattern.  The file name - means the
standard input.  Any file of the form var=value is treated as an
assignment, not a filename.  An assignment is evaluated at the time it
would have been opened if it were a filename, unless the -v option is
used.

An input line is made up of fields separated by white space, or by
regular expression FS.  The fields are denoted $1, $2, ...; $0 refers
to the entire line.

xargs :   xargs combines the fixed initial-arguments with arguments read from
standard input to execute the specified command one or more times.
The number of arguments read for each command invocation and the
manner in which they are combined are determined by the options
specified.

kill :   The kill command sends a signal to each process specified by a pid
process identifier.  The default signal is SIGTERM, which normally
terminates processes that do not trap or ignore the signal.


now , it's time to run some examples :

>ps    # that is what we have running on the Back Ground ..


>ps | grep sleep    # here we filter from the general output the rows with the word sleep



>ps | grep sleep | awk '{print $2}'      # here we cut the second string form every row , which is the PID



> ps | grep sleep | awk '{print $2}' | xargs -i kill -9 {}   # here we kill the process we filtered on by one by using xargs and the stoping the process with signal 9 by using kill .



and here is the final status :





Monday, March 17, 2014

EU law to require that all cellphones charge through a common standard


The EU successfully pushed for voluntary adoption of a cellphone charging standard a few years ago, and it's now close to making that standard mandatory. The European Parliament has voted in favor of a draft law requiring that cellphones work with a common charger. Provided the Council of Ministers green lights the regulation, EU countries will have until 2016 to put it into their local laws; phone makers will have until 2017 to change their hardware. The charger requirement is a formality when many phone designers already support the concept, but it could force some companies to shape up -- and spare more Europeans from tossing out power adapters when they switch handsets.

Samsung's new smartphone case uses ultrasound to detect people and objects

Samsung's Galaxy S5 may be getting lots of smart new accessories, but the Korean smartphone maker is also making sure its lower-powered phones get some love too. After including various software usability functions in the Galaxy Core Advance at the end of last year, the company today introduced three new accessories that have been designed specifically to help disabled or visually impaired users do more with their Android device. First up is the Optical Scan Stand, a raised bracket that automatically triggers the phone's OCR features to recognize and read aloud text placed in front of the phone. There's also Voice Labels, which are similar to Samsung's NFC-equipped TechTile stickers, but let visually impaired users make voice notes or record short explanations on how to use various devices around the home.
Perhaps the most impressive accessory of the three is Samsung's Ultrasonic Cover: a specialized case that uses sound waves to detect people or objects (in a two-meter radius), helping users navigate new surroundings by sending vibration or spoken alerts. Even without the accessories, the Galaxy Advance Core features a trio of physical buttons on the front and dedicated camera and voice recorder buttons on the side, assisting smartphone owners that don't want to rely solely on on-screen controls.

Wednesday, March 12, 2014

Raspberry Pi gets its own sound card and more ..

When UK Prime Minister David Cameron gave a speech at CeBIT this year, what examples did he use to highlight tech innovation in Britain? Yes, ARM and Imagination were on his list, but he also referred to the tiny, Linux-based computer called Raspberry Pi, which has now sold over 2.5 million units. In a timely fashion, the Pi's makers, element 14, have just announced a new $33,Wolfson-powered audio card that should give the device a broader range of functions.
The add-on board fits right onto the Pi's P5 pins and carries a Wolfson audio processor that supports high-res audio up to 24-bit / 192KHz, which can be played via a direct connection to an amp over 3.5mm line-out or alternatively via a digital S/PDIF output. Audio recording, meanwhile, comes courtesy of two onboard MEMS mics (useful for things like voice control), a 3.5mm mic jack and a digital S/PDIF input. It's true that some of these audio capabilities have already been possible on the Pi through USB peripherals such as DACs, but the Wolfson Audio Card gets into the DIY spirit of things with a $33 price tag and an emphasis on experimentation and community support. Speaking of which, some Pi owners have already gotten their hands on the board prior to today's global release

Sunday, March 9, 2014

Want An RFID Chip Implanted Into Your Hand? Here's What The DIY Surgery Looks Like (Video)



Amal Graafstra snaps on a pair of black rubber gloves. “Do you want to talk about pain management techniques?” he asks. The bearded systems administrator across the table, who requested I call him “Andrew,” has paid Grafstra $30 to have a radio-frequency identification (RFID) chip injected into the space between his thumb and pointer finger, and as Graafstra describes Lamaze-type breathing methods, Andrew looks remarkably untroubled, in spite of the intimidatingly high-gauge syringe sitting on the table between them.
Graafstra finishes his pain talk, fishes a tiny cylindrical two-millimeter diameter EM4012 RFID chip out of a tin of isopropyl alcohol, and drops it into the syringe’s end, replacing the RFID tag intended for pets that came with the injection kit. He swabs Andrew’s hand with iodine, carefully pinches and pulls up a fold of skin on the top of his hand to create a tent of flesh, and with the other hand slides the syringe into the subcutaneous layer known as the fascia, just below the surface.
Then he plunges the plastic handle and withdraws the needle. A small crowd of onlookers applauds. The first subject of the day has been successfully chipped.
Here’s a video of the procedure.

Over the course of the weekend, Andrew would be one of eight people to undergo the RFID implantation among the 500 or so attendees of Toorcamp, a hacker conference and retreat near the northwest corner of Washington State. Graafstra’s “implantation station” was set up in the open air: Any camper willing to spend $30 and sign a liability waiver could have the implantation performed, and after the excitement of Andrew’s injection, a small line formed to be next.
And why volunteer to be injected with a chip that responds to radio signals with a unique identifier, a procedure typically reserved for tracking pets and livestock? “I thought it would be cool,” says Andrew, when we speak at a picnic table a few minutes after his injection. (The pain, he tells me, was only a short pinch, followed by a “weird feeling of a foreign body sliding into my hand.”)


The practical appeal of an RFID implant, in theory, is quick authentication that’s faster, cheaper and more reliable than other biometrics like thumbprints or facial scans. When the chip is hit with a radio frequency signal, it emits a unique identifier number that functions like a long, unguessable password. Implantees like Andrew imagine the ability to unclutter their pockets of keys and keycards and instead access their cars, computers, and homes with with a mere wave of the hand.
Andrew says he initially hoped to use his RFID implant instead of the HID identity card his office uses for entry, but wasn’t deterred from the injection when Graafstra told him that HID uses a proprietary system whose chips Graafstra couldn’t implant. “I don’t have anything specific in mind, now, but I didn’t know when I’d have another opportunity to do it,” says Andrew. “And it’s a good excuse to start learning more about RFID.”
Another young hacker who underwent the procedure at Toorcamp said he hopes to install an RFID access system at the door of his local hackerspace. A young woman with a small collection of rings and studs in her ears compared her new implant to aesthetic body modifications like piercings and tattoos, or even the fringier culture of erotic “needleplay.” “I guess I have an interest in my body’s response to pain and modification,” she says. “There’s a certain thrill of the new.”

For Graafstra himself, the chips are more than a novelty or a hacker hobby. Graafstra uses them to access his home near Seattle, to turn on his motorcycle, to open a safe in his house, even to authenticate into his phone, a Samsung Galaxy Nexus that’s capable of near-field communications. He had his first chip installed in 2005 by a doctor client of his IT services firm, and has since become one of a few vocal RFID body implant evangelists, chronicling his experiences with the chip on his website and in a book,RFID Toys.
The enthusiasm of hackers like those at Toorcamp for RFID implants may seem a bit surprising–privacy advocates have long warned that the chips could allow individuals to be tracked by governments and corporations, even when they’re merely housed in passports or clothing, not to mention injected subcutaneously. But Graafstra says that the chips he’s implanting are difficult to read from more than a few inches away. And he argues the idea of someone trying to read his chip in order to spoof its signal and access his house or other property is far less of a threat than other potential privacy invasions.
“If someone manages to read this, it’s just as if they found a piece of paper with a number on the ground,” he says. “For any kind of attack, they would have to also know me and where I live and want to gain access to the things I’ve enabled. There are easier ways to do that, like breaking into my window.”
That hasn’t stopped privacy advocates and religious types from attacking Graafstra as a harbinger of evil–Some link his hand chip with the Bible’s “mark of the beast,” a number stamped by the Devil on hands and heads in the Book of Revelations. Graafstra ignores their emails or responds politely. “Some people view the body as a sacred temple,” he says. “Some view it as a sports utility vehicle they can upgrade. I’m definitely in the second category.”
Even so, he says his Toorcamp implantation station was a one-off. Outside of the camp’s community of hacking and experimentation, he worries that the risk of unhappy customers would be too high. “I trust that the people here have put a little thought into it and know what they’re getting into,” he says. “For everyone else, I recommend you contact your local piercing artist.”


and finally if you like to try it !! :

then visit : https://dangerousthings.com/


Wednesday, February 26, 2014

The Samsung Galaxy S5




By:CNN.com

The Samsung Galaxy S5 probably isn't the reinvention of the smartphone. But unlike last year's Galaxy S4, there's a good chance some of the new features announced could be of actual use to normal human beings.

Of course, a few minutes with the Galaxy S5 wasn't enough time to reach a full verdict on the phone, but it was enough to get a basic feel for what Samsung's (SSNLF) latest offering can and can't do.
Display
The 5.1 inch display has the same 1080p resolution as last year's 5-inch screen, but due to some new technology, it's definitely brighter, which at the very least, makes everything look nicer. And according to Samsung, the special technology which makes that screen brighter also improves performance in direct sunlight. At the expense of your battery, of course.
Fingerprint Scanner
Like the iPhone 5S, the fingerprint scanner is probably the most eye-catching of the new features, which adds an extra level of security and/or convenience to the device. While it does require you to swipe your whole finger pad over the sensor (unlike the iPhone, which simply lets you place it on the sensor), it worked smoothly the few times I was able to use it.
Power Saver
Battery life matters! Samsung put a slightly bigger battery in the Galaxy S5, but the more important thing was to offer up a useful power saver feature which lets you know what parts of the phone to turn off, and how much battery life that will gain you. It's most extreme mode will actually shut down LTE, cut you off from the vast majority of your apps, and turn the screen grey scale, apparently allowing it to last for days without a charge
Camera
Samsung's new phase detection auto-focus means that the camera is now capable of a nice blur effect in the background when you photograph an object up close. The shutter was reasonably fast with bright indoor light, though it did seem to have trouble handling a couple of weird lighting situations and slowed down considerably. How much the image quality has or hasn't improved over the S4 is still to be determined, however.
Weatherproofing
There was no way to really test how worthy the water and dust-resistant features were (save for dumping a bottle of water on it?), but if the weatherproofing is half as good as Samsung claims it is, everyone wins.
Hardware Design
The hardware design of the phone isn't much better, or even different, than it has been in years' past. If you like it, you like it. (I don't.) The texture and material used on the back is much improved and makes the phone feel less cheap when you're holding it, but the colors to choose from are mildly depressing. And when it comes to size and pocketability, at this point, everyone should already know what they're getting into when they buy a 5-inch phone. The Galaxy S5 is big, but it's not completely unwieldy.
Software Design
Samsung's TouchWiz UI is back in its same fundamental form, but it does look better, visually speaking. Fonts and icons generally look cleaner, but everything is still organized in the same manner as past TouchWiz iterations. That said, it doesn't seem like a huge improvement over anything offered up by the likes of Google (GOOGFortune 500),Apple (AAPLFortune 500)Nokia (NOK), or even HTC. And Samsung still hasn't done much to improve the experience running two apps side-by-side.
Heart Rate Monitor
I mean, I guess it's cool Samsung put this on the phone? It doesn't detract from anything at all, but this sensor definitely seems more useful in its new Gear Fit wearable.
At the very least, many of the features included in the Galaxy S5 have more potential than the new features included in last year's model. To what extent that potential is realized will take a little more hands-on time however. To top of page

and from the technical View from GSMArean.com

GENERAL2G NetworkGSM 850 / 900 / 1800 / 1900
3G NetworkHSDPA 850 / 900 / 1900 / 2100
4G NetworkLTE 800 / 850 / 900 / 1800 / 2100 / 2600
SIMNano-SIM
Announced2014, February
StatusComing soon. Exp. release 2014, April
BODYDimensions142 x 72.5 x 8.1 mm (5.59 x 2.85 x 0.32 in)
Weight145 g (5.11 oz)
 - Fingerprint sensor
- IP67 certified - dust and water resistant
- Water resistant up to 1 meter and 30 minutes
DISPLAYTypeSuper AMOLED capacitive touchscreen, 16M colors
Size1080 x 1920 pixels, 5.1 inches (~432 ppi pixel density)
MultitouchYes
ProtectionCorning Gorilla Glass 3
 - TouchWiz UI
SOUNDAlert typesVibration; MP3, WAV ringtones
LoudspeakerYes
3.5mm jackYes
MEMORYCard slotmicroSD, up to 128 GB
Internal16/32 GB storage, 2 GB RAM
DATAGPRSYes
EDGEYes
SpeedHSDPA, 42.2 Mbps; HSUPA, 5.76 Mbps; LTE, Cat4, 50 Mbps UL, 150 Mbps DL
WLANWi-Fi 802.11 a/b/g/n/ac, dual-band, DLNA, Wi-Fi Direct, Wi-Fi hotspot
BluetoothYes, v4.0 with A2DP, EDR, LE
NFCYes
Infrared portYes
USBYes, microUSB v3.0 (MHL 2), USB On-the-go, USB Host
CAMERAPrimary16 MP, 5312 x 2988 pixels, autofocus, LED flash
FeaturesDual Shot, Simultaneous HD video and image recording, geo-tagging, touch focus, face and smile detection, image stabilization, HDR
VideoYes, 2160p@30fps, 1080p@60fps, video stabilization, dual-video rec.
SecondaryYes, 2 MP,1080p@30fps, dual video call
FEATURESOSAndroid OS, v4.4.2 (KitKat)
ChipsetQualcomm MSM8974AC Snapdragon 801
CPUQuad-core 2.5 GHz Krait 400
GPUAdreno 330
SensorsAccelerometer, gyro, proximity, compass, barometer, temperature, humidity, gesture, heart rate
MessagingSMS(threaded view), MMS, Email, Push Mail, IM, RSS
BrowserHTML5
RadioNo
GPSYes, with A-GPS support and GLONASS
JavaYes, via Java MIDP emulator
ColorsBlack, White, Blue, Gold
 - Wireless charging (market dependent)
- ANT+ support
- S-Voice natural language commands and dictation
- Smart stay, Smart pause, Smart scroll
- Air gestures
- Dropbox (50 GB cloud storage)
- Active noise cancellation with dedicated mic
- TV-out (via MHL 2 A/V link)
- SNS integration
- MP4/DivX/XviD/WMV/H.264/H.263 player
- MP3/WAV/eAAC+/FLAC player
- Organizer
- Image/video editor
- Document viewer (Word, Excel, PowerPoint, PDF)
- Google Search, Maps, Gmail,
YouTube, Calendar, Google Talk, Picasa
- Voice memo/dial/commands
- Predictive text input (Swype)
BATTERY Li-Ion 2800 mAh battery
Stand-byUp to 390 h
Talk timeUp to 21 h