Wednesday, April 18, 2012

****Forensic FOCA *****

*** Forensic FOCA - Power of Metadata in digital forensics ***

~~~~THIS INFORMATION I'M SHARING IS FOR EDUCATIONAL PURPOSES ONLY.PLEASE USE IT TO YOUR DISCRETION. HAPPY HACKING..~~!  

Forensic FOCA - Power of Metadata in digital forensics

foca in Spanish= The seal
FOCA means is=Fill Our Coffers Again.
                             =Fool Our Children to Abort.
                             =Force Our Citizens to Abort.
                             = Fragment Our Culture Over Abortion.







Most of the e ort in today's digital forensics community lies in the retrieval and analysis of existing information from computing systems. 

Metadata is data about data. Metadata plays a number of important roles in computer forensics. It can provide corroborating information about the document data itself. It can reveal information that someone tried to hide, delete, or obscure. It can be used to automatically correlate documents from different sources.

More simply, electronic information about a file but not seen on a printed copy of the file. It is embedded and provides additional information, including when and by whom it was created, accessed, or modified.

Informatica64 release Forensic FOCA (Fingerprinting Organizations with Collected

Archives), tool for forensic analysts focused on the use of metadata files to generate a forensic case. Several other metadata extraction tools exist but FOCA is combination of all their features and much more.

Office applications like Microsoft Office or Star Office (including Word, Excel & PowerPoint) are not the only applications that create and embed metadata. In fact, most applications do. PDF files often have embedded author, title, and other information. Digital photographs and movies often contain large amounts of information about the image or film, often including the make, model and serial number of the device they were created on. In 
fact just about any data object can have metadata.

Forensic FOCA is capable of analyzing the metadata of a different document formats Microsoft Office 2007and later, Microsoft Office 97 to 2003, Open Office, PDF documents, EXIF information in JPG, WordPerfect, SVG images, In design documents.It's possible to see the number of computers in an office, which ones are connected to printers and get a good idea for how a network is structured. Forensic FOCA allows you to view the metadata for each document analyzed, ideal for an analysis of an interest document. Provide two types of view tree or files explorer and timeline. In timeline view it will show the events related to files organized by date. This makes it possible to quickly view the events of a certain date. The different events that exist are creating, modifying and printing documents.





FOCA can also identify OS versions and application versions, making it possible to see if a particular computer or user has up-to-date patches. That information is of particular use to hackers, who could then do a spear phishing attack, where a specific user is targeted over e-mail with an attachment that contains malicious software.

Recent Example, Last week we reported about 
arrest of an Anonymous Hacker Higinio O Ochoa III aka w0rmer , member of CabinCr3w, after he posted the image of his Girl Friend , which included a gloating message to his online victims. Specifically, the picture includes meta data and GPS information. The GPS information identifies the location as 37° 51' 25.20" S, 145° 15' 1.20" E. That's a suburb of Melbourne, Australia. Using Metadata Information FBI was able to trace the Hacker.

Forensics and security were not design objectives for the most commonly used file systems. Some of our desired information could be easily obtained by, for example, recording more information on one-time events such as the creation of a file. The "create" timestamp, the user who created a file, and the user agent path could be recorded in a fixed amount of space.

Forensic FOCA allows you to export all information obtained in XML or HTML to use this information as more appropriate, and print this data.

You can 
download a Forensic FOCA Click on me J
Trial version. This version It is limited to one document type (only Microsoft Office Word supported). We recommend , buy the full version available just at Price 20 € per year. to Feel the power of Metadata with Forensic FOCA!

Wednesday, April 04, 2012

** 7 Web Security **


~~~~THIS INFORMATION I'M SHARING IS FOR EDUCATIONAL PURPOSES ONLY.PLEASE USE IT TO YOUR DISCRETION. HAPPY HACKING..~~!  


Admins looking to improve on their company’s web security often turn to software solutions to help assess and automate their security tasks. Good web security software can make surfing the web safe and secure by protecting users from potential vulnerabilities in their operating systems or browsers, as well as helping them to avoid policy violations. The top web security software packages can help you to improve your network’s web security in many ways. Here are seven of the major benefits web security software offers:
 


1. Automatic blocking of malicious content =>

   Compromised websites can lead to compromised workstations. Whether it’s a malicious script or a media file, web security software can scan and block data before displaying it in a browser compromises a machine.

2. Scan downloads for malware =>
   
   Users frequently go to the Internet to download files, whether those are programs, music, or screensavers. Web security software can scan those downloads with multiple anti-malware engines to ensure maximum protection for your users.

3.Supportacceptable use/appropriate content policies =>

   There’s a time and a place for most things; but many of those things are not appropriate at the workplace. Web security software can proactively block access to websites containing content that is not right for access during working hours, which helps users avoid policy violations or other situations that can impact others.

 4. HTTPS inspection =>

   Many times, HTTPS is used to get around filters and proxies because they cannot inspect encrypted traffic. With all the Certificate Authorities that have been compromised in the past few months, this could be a huge risk, but the best web security software can use PKI to scan even HTTPS traffic while still protecting the confidentiality of data.

5. Bandwidth controls prevent impact to mission critical apps =>

  Web security software can also enforce bandwidth limits on users’ browsing, so that your ecommerce site, email system, etc., don’t suffer from slow performance due to Internet access.

6. Block phishing sites =>

   You can read a new story every week about a company that lost data, money, and customer confidence because an employ fell victim to a phishing attack. Web security software can stop these kinds of scams dead in their tracks by blocking access to phishing sites.

7. The exception is the rule =>


   The best web security software should use a combination of lists, categories, reputation, whitelists and blacklists to control Internet access, and easily allow admins to create exceptions when a site may be categorized one way, but is still necessary for a business purpose.
With good web security software, administrators can allow their users safe and secure access to the Internet, while protecting them, the company’s data and reputation, and their customers from the worst the web has to offer. Web security software is the right way to take advantage of the best that Internet access has to offer, while avoiding the worst threats that are out there. Web security software is one of the must-have applications every network admin needs.

   This guest post was provided by Casper Manes on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. Learn more on what to include in your web security strategy.

  All product and company names herein may be trademarks of their respective owners.