Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Hackers hawa ni tishio

Discussion in 'Tech, Gadgets & Science Forum' started by Mtazamaji, Jun 14, 2011.

  1. Mtazamaji

    Mtazamaji JF-Expert Member

    #1
    Jun 14, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Hi wakuu. Hawa ndo real hackkers. sidhani watu kama hawa wanaweza kushindiwa kupenetrate computer system yoyote ya Tanzania.

    Ni kundi linajiitai LulzSec. Hawa jamaa kwa sasa ni tisihio na inaoekena ni watu wanaweza kuingia kwenye computer system yeyote.


    Nimefaitilia story zao naona wao wanafanya hacking for fun. lakini kwa sony waliamua kuwakomoa sababu walimshataki mwenzao amabye alichakachaua game zao. Wame waha ck sony zaidi ya mara Nne.


    Zaidi ya sony Ndani ya waki tatu zilizopita wamei hack system ya afya ya UK inaitwa NHS soma habari kamili hapa BBC News - Hackers warn NHS over security

    alafu ona wanachowaandikia
    Na juzi tu wamehakc website ya senate US. Soma hapa BBC News - Lulz attacks: US orders review as Senate site hacked


    Alafu wanavyojiamini wapo twitter Twitter wanakuwa wanaeleza kila wanachofanya.

    Hawa naona wanawazidi wale wanaojiita kundi la Anonymous hackers.
     
  2. mabina

    mabina JF-Expert Member

    #2
    Jun 14, 2011
    Joined: Nov 2, 2009
    Messages: 203
    Likes Received: 5
    Trophy Points: 35

    When we say, New Technology we include ICT SECURY. Most of HACKERS STUDIED ICT SECURY IN ADVANCED LEVEL( i.e at maximum level) dont worry we live in target and with great secury, secury ur info and dont proud of, coz whn u do, there some people for the people
     
  3. Sooth

    Sooth JF-Expert Member

    #3
    Jun 14, 2011
    Joined: Apr 27, 2009
    Messages: 1,894
    Likes Received: 662
    Trophy Points: 280
    No wonder wamarekani wakasema "If we went to war today in cyberwar war, we would loose". USA wanapata wastani wa probes/attemps 1.8billion kwa mwezi!
     
  4. Mtazamaji

    Mtazamaji JF-Expert Member

    #4
    Jun 14, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Sio siri hao jamaa

    mdau mmoja kwenye twitter yao amecooment hivi i
    Sasa hivi wamehac site zingine.
     
  5. Easymutant

    Easymutant JF-Expert Member

    #5
    Jun 15, 2011
    Joined: Jun 3, 2010
    Messages: 2,136
    Likes Received: 177
    Trophy Points: 160
    I love em...
     
  6. Mtazamaji

    Mtazamaji JF-Expert Member

    #6
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Welcome to 2011, Year of the Hacker

    In the 1990s hackers ran rampant, breaking into and compromising some of the most sensitive business and government systems worldwide. Their incredible success led to major industry adjustments. Corporate and government IT departments adjusted their policies and cracked down on security. New security-centered firms were born.

    But this year there has been an explosion of high-profile system intrusions the likes of which have not been seen in a decade. And for all those fancy protections, one thing is clear -- much of the "security" of modern systems appears to be an illusion.

    And the web has yet again became a digital Wild West -- a place where the lines between good and evil blur; a place where the strong victimize the weak; and a place where the line between mercy and destruction rests on the personal prejudices of bands of digital bandits.

    I. 2011: Year of the Hacker

    On Monday, LulzSec ("Lulz Security") published a data dump of a thorough intrusion of the front end of the U.S. Senate's servers. But this is far from the first significant intrusion this year.

    Let's pause to briefly recap a few of the most important hacks:

    Jan. 4: Anonymous uses distributed denial of service (DDoS) attacks to take down Tunisian government websites.

    Jan. 10: Anonymous hacks Irish centre-right party Fine Gael, defacing its website and accusing it of censorship. Over 2,000 party-member accounts are compromised.

    Jan. 18: Members of griefer group Goatse Security are charged by the U.S. Federal Bureau of Investigation for their role in exposing iPad user information.

    Jan. 28: British police arrest five alleged members of Anonymous.

    Jan. 28: CNET reports that Goatse Security's homepage is defaced by an ex-member. We reveal that this appears to be a publicity stunt, though for the record a spokesman for the group firmly denies this.

    Feb. 3: Anonymous members uses DDoS to take down the websites of the Egyptian government during the revolution against dictator Hosni Mubarak.

    Feb. 5-6: HBGary, a security contractor is hacked by Anonymous via SQL injection, social engineering, and other tactics. 68,000 emails are dumped, including ones that implicate that the Bank of America hired HBGary to try to attack Wikileaks.

    Feb. 10: Chinese hackers steal information from seven oil companies in an operation dubbed "Night Dragon".

    Feb. 10: White paper states that iPhone passwords can be exposed via a jailbreak-driven attack.

    Feb. 17: China implicated in "unprecedented" attack on Canadian government servers.....................................................


    Read other high rofile hacking done so far at DailyTech - Welcome to 2011, Year of the Hacker.











     
  7. Consigliere

    Consigliere JF-Expert Member

    #7
    Jun 15, 2011
    Joined: Sep 9, 2010
    Messages: 6,453
    Likes Received: 3,314
    Trophy Points: 280
    Kuna washikaji ambao waliwafanya World Bank, IMF na European union wakubali yaishe kwa kukubali kuwalipa hao jamaa alot of many ili wasi hack systems zao...waliwahi freeze shughuli za za taasisi kwa muda mfupi, then wakawaambia ni sisi, so u have to pay us and we will let u live
     
  8. Kaka Mpendwa

    Kaka Mpendwa JF-Expert Member

    #8
    Jun 15, 2011
    Joined: Jan 10, 2008
    Messages: 771
    Likes Received: 4
    Trophy Points: 0
    Anonymous : na wenyewe ni balaa:

    Kuna wenzao watatu walikamatwa wiki hii na Polisi wa Hispania.

    Waka attack website ya Polisi, inaccessible kama kwa lisaa limoja
     
  9. Mtazamaji

    Mtazamaji JF-Expert Member

    #9
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Je sisi au serikali yetu ya Tanzania inao hackers hata wenye ujuzi mdogo tu japo wa kusaidia mara mambo yakiharibika au wa kutafuta info kama wanavyofanya wachina .

    I mean Serikali yetu inao ethical hackers hata hata wenye ujuzi mdogo?
     
  10. Kaka Mpendwa

    Kaka Mpendwa JF-Expert Member

    #10
    Jun 15, 2011
    Joined: Jan 10, 2008
    Messages: 771
    Likes Received: 4
    Trophy Points: 0
    Nchi nyingine hackers ni sehemu muhimu ya intelligence kwa taifa.

    Kwa mfano hivi majuzi, M15/M16 (Intelligence ya Uingereza) wali-hack website ya Alqaeda iliyopost namna ya kutengeneza mabomu. Jamaa walichofanya ni kuweka post ya namna ya kutengeneza Keki....

    Wenzetu kule hackers ni watu wa kutumiwa kwa uangalifu..

    Pia kwa sasa serikali haina namna ya ku-spot intelligent minds, kuwatunza na kuwaendeleza.. Wote wanakimbilia voda, tigo au wanajiajiri.
    Lakini ni muhimu kuwe na juhudi za makusudi kuendeleza watu wenye exceptional talents....iwe kwenye michezo, biashara, udaktari, n.k

    Nchi kama India, China, Russia wanafanya hivyo kwa jamiii yao, hata kuanzisha taasisi kama vyuo kuwaendeleza watu wa namna hii.. Vinginevyo tusahau kurusha rocket
     
  11. Mtazamaji

    Mtazamaji JF-Expert Member

    #11
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Uko sahiihi kabisa lakini kibongo bongo usishangae hata wangekuwepo kazi ambayo wangepwa ni ku bring down jf. teh teh teh. Sometime threat analysis ya hawa watu waliopewa usukani inachekesha.

    Nadhani hata kwenye vyuo vyetu mwanafunzi akisema mfano anataka kuanika project ya virus creation au DDOS mkufunzi anaweza kumtimua.

    Nigekuwa decison maker katika sekta ya ICT ningewasialina na hao Lulzsec japo waje washushe presentation mbili tatu kwa watu wa ICT ili taasisi zijue jinsi ya kujilinda.
     
  12. Kaka Mpendwa

    Kaka Mpendwa JF-Expert Member

    #12
    Jun 15, 2011
    Joined: Jan 10, 2008
    Messages: 771
    Likes Received: 4
    Trophy Points: 0
    Ni kweli..maana hackers wengi wa serikali kama ile ya China ni kukabilana na wanaharakati..nafikiri umeona jinsi wanavyohack email za GMAIL.

    Ila serikali ni muhimu iwaendeleze hackers wake...labda wanafanya hivyo , si unajua tena haya mambo ya siri.
    wasipokuwa makini siku moja watazima mitambo yote ya BOT waanze kushikana mashati
     
  13. Mtazamaji

    Mtazamaji JF-Expert Member

    #13
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Au inabidi watanzania wenye uwezo na nia njema wajitolee kutest loopholes kwenye system za serikali alafu wakizigunud wawajulishe.

    Nadhani system nyeti zinazohitaji system Audit ya nguvu kwa Tanzania ni za BOT, TRA na Wizara ya fedha. na Benki .
     
  14. Kaka Mpendwa

    Kaka Mpendwa JF-Expert Member

    #14
    Jun 15, 2011
    Joined: Jan 10, 2008
    Messages: 771
    Likes Received: 4
    Trophy Points: 0
    mkuu hata sasa hivi ukitaka kuingia, unaingia bila wasi wasi...
    mwezi wa Januari watu wamehack IMF.....Pentagon nao wamelalamika...itakuwa TRA?.

    Ninaamini huko TRA unaweza ukafanya social engineering tu, ukamaliza kila kitu
     
  15. Mtazamaji

    Mtazamaji JF-Expert Member

    #15
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Yes unajua mbaya zaidi sio kuwa hacked Issue ni hata tukiwa hacked tunaweza tusijue.

    CAG anatakiwa kuwa na kitego cha ICT system Audit. Auditing zilizopo ni za kukagua balance sheet na Asset.

    But nadhani kuna tatizo kubwa sijui kam wahusika wameliona. Wakati taasisi nyingi zina mifumo ya computer hakuna IS Auditors wengi wenye uwezo wa ku evaluate hizo system zinavyofanya kazi. Evaluation nyingi zinazofanyika ni za financial tu. Hili ni tatizo.
     
  16. Kaka Mpendwa

    Kaka Mpendwa JF-Expert Member

    #16
    Jun 15, 2011
    Joined: Jan 10, 2008
    Messages: 771
    Likes Received: 4
    Trophy Points: 0
    nafikiri watakuwa wanazifanyia auditing. Labda ni kujua kama kweli hizo auditing zinaleta majibu na kukidhi haja.. PWC na Delloite wanafanya hizi kazi
     
  17. Mtazamaji

    Mtazamaji JF-Expert Member

    #17
    Jun 15, 2011
    Joined: Feb 29, 2008
    Messages: 5,972
    Likes Received: 27
    Trophy Points: 0
    Kaka Mpendwa

    But kwa serikali sidhani kama CAG ana watu au kitego cha wa Audting ya mifumo ICT. sijawai kusikia hata siku moja akitoa statemet eg ya mapungufu ya website nyingi za serikali na taaisis zake mara zote nasikia CAG anaongelea cash book. teh teh teh. Sijawai kusikia akitoa ripoti ya mambo ya USABILTY, ACCESIBILITY na SECURITY japo kwenye ya web za serikali.

    Naweza kupataje hiyo document ya PWC na Delloite wanayotumia ku evaluate mfano tovuti
     
  18. Washawasha

    Washawasha JF-Expert Member

    #18
    Jun 15, 2011
    Joined: Aug 7, 2006
    Messages: 8,368
    Likes Received: 146
    Trophy Points: 160
    Kwani si naweza ku hack website yoyote kwa kutumia ile style ya Sharobalo aliyotufundisha kuhusu ku hack Facebook? au kama kuna njia nyingine tumwagieni hapa ili na sisi tuweze ku hack, nina usongo na website za Wabunge(kama zipo) wanaokwenda Bungeni na kulala
     
  19. Washawasha

    Washawasha JF-Expert Member

    #19
    Jun 15, 2011
    Joined: Aug 7, 2006
    Messages: 8,368
    Likes Received: 146
    Trophy Points: 160
    Mie nataka kuw hacker nifanyeje?
     
  20. Sniper

    Sniper JF-Expert Member

    #20
    Jun 15, 2011
    Joined: Mar 8, 2008
    Messages: 1,942
    Likes Received: 9
    Trophy Points: 135
    Mimi naomba serikali isiendelee kuwatia hasira wananchi wake, mana naamini Tanzania kuna vichwa ambavyo ukiviuthi vikawa againts na serikali vitafanya mambo ya hatari sana na system zetu ni nyepesi mno zina security flaws nyingin tu
     
Loading...