Showing posts with label What. Show all posts
Showing posts with label What. Show all posts

Wednesday, July 3, 2013

Important Terms related to Information Security - Random Wednesday

Hey all! :) How are you all doing? I hope everyone's great! :)



Welcome here at this Random Wednesday. I thought to share with you all some terms that I think everyone should know. These are related to security, hacking, and similar stuff. So have fun skimming thorugh these! :) I am using Wikipedia as the source to deliver this information, some added tweaks from my own side. Though I know all these terms, I don't want to be wrong anywhere, so using Wikipedia, else the list of terms are from my own knowledge! :D

CERT


CERT stands for Computer Emergency Response Team. CERT is now a registered service mark of Carnegie Mellon University that is licensed to other teams around the world. Some teams took on the more generic name of CSIRT (Computer Security Incident Response Team) to point out the task of handling computer security incidents instead of other tech support work. Because CERT is a registered trademark owned by Carnegie Mellon University, it should not be used interchangeably with CSIRT.

It is recommended that every country has their own CERT, like my country India has CERT-IN.


Information Security


Information security (sometimes shortened to InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc.)


Cryptography


Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.

Computer Security


Computer security (Also known as IT Security) is information security as applied to computers and networks.

The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.

Incident Management


Incident management (IcM) is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence. These incidents within a structured organization are normally dealt with by a either an Incident Response Team (IRT), or an Incident Management Team (IMT). These are often designated before hand, or during the event and are placed in control of the organization whilst the incident is dealt with, to restore normal functions.

Vulnerability


In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface.

Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" This practice generally refers to software vulnerabilities in computing systems. A security risk may be classified as a vulnerability.

Security Bug


A security bug or security defect is a software bug that benefits someone other than intended beneficiaries in the intended ways.

Security bugs introduce security vulnerabilities by compromising one or more of:
  • Authentication of users and other entities
  • Authorization of access rights and privileges
  • Data confidentiality
  • Data integrity

Security bugs need not be identified, surfaced nor exploited to qualify as such.

Zero Day

A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability.

For example, a Virus named Stuxnet is said to have exploited around 20 Zero Days in one attack on Iranian Nuclear Facility!

Eavesdropping


Eavesdropping is the act of secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary. This is commonly thought to be unethical and there is an old adage that "eavesdroppers seldom hear anything good of themselves...eavesdroppers always try to listen to matters that concern them."

Exploit


An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.

Denial of Service(DoS)


In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. This technique has now seen extensive use in certain games, used by server owners, or disgruntled competitors on games such as Minecraft. Increasingly, DoS attacks have also been used as a form of resistance. DoS they say is a tool for registering dissent. Richard Stallman has stated that DoS is a form of 'Internet Street Protests’. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.

Trojan Horse


Thinking about the Troy one? No this one is the friendly backdoor virus. A Trojan horse, or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These backdoors tend to be invisible to average users. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems. Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.

Computing Virus


A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, ransomware, trojan horses, keyloggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software. The majority of active malware threats are usually trojans or worms rather than viruses. Malware such as trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a trojan horse is a program that appears harmless but hides malicious functions. Worms and trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

Computer Worm


A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Morris Worm is the first Worm created. It was created by Robert Tappan Morris.

Payload


Payload in computing (sometimes referred to as the actual or body data) is the cargo of a data transmission. It is the part of the transmitted data which is the fundamental purpose of the transmission, to the exclusion of information sent with it (such as headers or metadata, sometimes referred to as overhead data) solely to facilitate delivery.

In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads include data destruction, messages with insulting text or spurious e-mail messages sent to a large number of people.

In computer security, payload refers to the part of a computer virus which performs a malicious action.

Rootkit


A rootkit is a stealthy type of software, often malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.

Rootkit installation can be automated, or an attacker can install it once they've obtained root or Administrator access. Obtaining this access is a result of direct attack on a system (i.e. exploiting a known vulnerability, password (either by cracking, privilege escalation, or social engineering). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.

Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment.

Keylogger


Keystroke logging, often referred to as keylogging, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis. Thus Keylogger is the software or hardware(or both) used for Keylogging.

Spyware


Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

"Spyware" is mostly classified into four types: system monitors, trojans, adware, and tracking cookies. Spyware is mostly used for the purposes such as; tracking and storing internet users' movements on the web; serving up pop-up ads to internet users.

Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Tuesday, October 2, 2012

What's ipv4 and ipv6? - Tech Tuesday

Hey all my dear readers! How are you all doing? :D I welcome all of you at my blog on this lovely Tech Tuesday! :D



I thought a lot before making this post. Actually what happened was that I thought of something real cool to be posted today, but by the time Tuesday came, I forgot it! :/ So then after a lot of wondering I thought of something cool, though still unable to recall what I thought earlier! LOL!!

With Internet becoming the so called 'lifeline' of many people around the globe(for which I say, Thanks to Social Networking) everyone is looking up for faster and secure internet connections. The IP, i.e., Internet Protocol is one of the things people should be aware of.

The Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (also known as network packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.

IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. For this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram source and destination.

All that simply implies, No Internet without the IP! With the traffic increasing, and so also the density of attacks and hacks, faster and safer connections are preferred. The IP is revised whenever it's development can be widely adopted.

Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet. As of 2012 IPv4 is still the most widely deployed Internet Layer protocol. Not that technical, right?


IPv4 is a connectionless protocol for use on packet-switched Link Layer networks (e.g., Ethernet). It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP).

IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4294967296 (232) addresses. Addresses were assigned to users, and the number of unassigned addresses decreased. IPv4 address exhaustion occurred on February 3, 2011. It had been significantly delayed by address changes such as classful network design, Classless Inter-Domain Routing, and network address translation (NAT).

This limitation of IPv4 stimulated the development of IPv6 in the 1990s, which has been in commercial deployment since 2006.

Interesting, isn't it? The main reason for the development of ipv6 is the limit that might exceed any day! I guess it already would have had if no one were using ipv6. Who knows?


IPv6 implements a new IP address system that allows for far more addresses to be assigned than is possible with IPv4, but as a result the two protocols are not compatible, complicating the transition to IPv6. IPv6 uses 128-bit addresses, allowing for 2128, or approximately 3.4×1038 addresses — more than 7.9×1028 times as many as IPv4, which uses 32-bit addresses. IPv4 allows for only 4,294,967,296 unique addresses worldwide (or less than one address per person alive in 2012), but IPv6 allows for around 4.8×1028 addresses per person — a number unlikely ever to run out. Did ya read that carefully enough?? 4.8 x 1028 PER PERSON!! PER PERSON!!!!!!! Whoa!

IPv6 addresses, as commonly displayed to users, consist of eight groups of four hexadecimal digits separated by colons, for example 2312:0db4:87d3:0642:00a0:842d:0e70:43e4. Now this is quite different than our primary ipv4 with 4 groups like 45.234.123.23, right? According to what I think, because of the longer address, the number of possible combinations increases multifold, just imagine, the domain is doubled means the range would be atleast quadrupled! Well, that's just mathematics and one should know, theories suggest, hackers have a nice hold on mathematics! :O Well, what I was saying is in such a case with so many combinations, it is likely to be safer on ipv6 than on ipv4.

Although according to an article I read on the Internet, it is just a myth to think ipv6 is more secure. It said:

"It would be more accurate to say that IPv6 is no less secure than IPv4. The main security mechanism built into IPv6 is IPsec. IPsec is not new - it can be used with IPv4 as well, and this has been possible since its earliest days. However, a conforming implementation of IPv6 must support IPsec, while there is no such requirement in IPv4. This has led to the misconception that IPv6 is automatically more secure than IPv4: instead, it still requires careful implementation and well-educated system and network staff.

In some other ways IPv6 in fact does support better security: that IPsec can be guaranteed to be supported fosters its use and propagation. The header design in IPv6 is better, leading to a cleaner division between encryption metadata and the encrypted payload, which some analysts consider has improved the IPsec implementation. And the huge address space can, if desired, be used to defeat scanning attacks by simply allocating random addresses within subnets.

However, the bottom line for IPv6, as for all protocols and systems, is that education, training and awareness are the best investments from a security perspective. "



But some article suggest it is way too secure! Now this is kind of dilemma for a common man who is concerned about security than technical details. But well, perhaps we have to live with this, like it has been for years! In any case, it seems more promising to use ipv6 than ipv4, though ipv6 can never overrun ipv4 due to it's already widespread adoption.

I think this article was interesting. Well, to me it was! LOL! :D All sorts of comments and suggestions are welcomed, and as I said earlier, I would love to get your inputs and if you want to me share something, or search the internet for you and give the answer, please feel free to make a request on any post or the CBox on the right. Good Day! :)

Tuesday, July 3, 2012

What is .NET Framework? - Tech Tuesday

Hey all! A happy Tech-Tuesday from me to all of you my dear readers! :D So how are you all doing? I hope fine! :D :D :D



You all must have read the title, of course! What we are gonna discuss today is .NET Framework. We all have installed games/software/update to our Windows PC and have seen this .NET Framework being something quietly present always and sometimes giving up hiccups with our installations saying .NET Framework has some problem! But what exactly is .NET Framework? That's we gonna discuss in our today's Tech-Tuesday! :D


The .NET Framework (pronounced dot net) is a software framework developed by Microsoft that runs primarily on Microsoft Windows. It includes a large library and provides language interoperability (each language can use code written in other languages) across several programming languages. Programs written for the .NET Framework execute in a software environment (as contrasted to hardware environment), known as the Common Language Runtime (CLR), an application virtual machine that provides important services such as security, memory management, and exception handling. The class library and the CLR together constitute the .NET Framework.

Okay, you got it? NO? OMG! Let's take things line-by-line one at a time. The first line ain't that worthy of demanding an explanation so please! Improve upon thy English if you don't get it! :P Now the next one means that, for example, I wrote a code in C++ and made that program under the .NET technology, once my program is built, I can use that program in some program I made in C# also! Simple, interoperability between languages! That's so cooool! :D The next line which tells about the CLR is another outstandingly amazing feature of the .NET! Actually when we interact with the hardware directly we are at a risk of overwriting something important which is stored in the hardware already. In such a case a virtual environment helps duplicate the hardware virtually, that is, providing our program virtual hardware which actually is software mimicking hardware for our that program. Now that means, we are at no risk to over-write something too important! That makes it a superb feature of the .NET Technology. It's in-built features of memory-management and garbage collection help us make the programs without worrying about such things which sometimes get things messy!

The .NET Framework's Base Class Library provides user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. Programmers produce software by combining their own source code with the .NET Framework and other libraries. The .NET Framework is intended to be used by most new applications created for the Windows platform. Microsoft also produces a popular integrated development environment largely for .NET software called Visual Studio. The above tonnes of features that come inside this technology makes things go easier for the developers. For example, I need to make a big software which uses Sorting, Fibonacci Series, and many such similar mathematical operations. Of course I would need to make functions in my program for all these. Now that makes the things go messy again since it adds to much labor to an already big project. Since the base Class Library provides such functions already, my task goes easier and I have to make optimal logic for my software and not my basic requirements anymore! Next, the Visual Studio is perhaps the best IDE(Integrated Development Environment) I have ever used, no doubt in that. It's one the most superb feature that I love is the IntelliSense. It helps me identates my code itself and moreover assists with idiotic mistakes a programmer may commit during the course of development.


Microsoft started the development on the .NET Framework in the late 1990s originally under the name of Next Generation Windows Services (NGWS). By late 2000 the first beta versions of .NET 1.0 were released.

Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. Version 3.5 is included with Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family of operating systems. On 12 April 2010, .NET Framework 4 was released alongside Visual Studio 2010.

The .NET Framework family also includes two versions for mobile or embedded device use. A reduced version of the framework, the .NET Compact Framework, is available on Windows CE platforms, including Windows Mobile devices such as smartphones. Additionally, the .NET Micro Framework is targeted at severely resource-constrained devices.


For details about some specific cool components of the .NET Technology, you may refer to the following Wikipedia Articles which do contain a good bibliography for interested readers.

.NET Framework

Common Language Runtime

Common Language Infrastructure

Common Intermediate Language

Common Type System

Metadata

Virtual Execution System

Thursday, June 21, 2012

What are javascripts?


Hey all! How are you doing my dear readers?! :) I hope all of you are just great, like always! ;) :D :D




So, it was the fourth day of training an this training thing will extend upto 30th July. That means all my holidays are gonna be ransacked by acute busy schedules! >_< But whatever, it's not so interesting though because I'm not liking the place, but still it's okay, I hope I'll start enjoying it soon. Anyways, I'm learning web development that means I might tweak my blog a little once my training is over! LOL! MAYBE!! :P

Maybe my today's post is a result of this training only! LOL! Whatever! Today they were discussing about javascripts there and it were an interesting discussion, still I said that I ain't enjoying much because the teacher is unable to answer some questions that makes me irritated! >_< So this post is more of a self-reference post that would be a bit too knowledgeable for me! :D




JavaScript (sometimes abbreviated JS) is a prototype-based scripting language that is dynamic, weakly typed and has first-class functions. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.


JavaScript was formalized in the ECMAScript language standard and is primarily used in the form of client-side JavaScript, implemented as part of a Web browser in order to give enhanced user interfaces and dynamic websites. This enables programmatic access to computational objects within a host environment.


JavaScript's use in applications outside Web pages — for example in PDF documents, site-specific browsers, and desktop widgets — is also significant. Newer and faster JavaScript VMs and frameworks built upon them have also increased the popularity of JavaScript for server-side web applications.


JavaScript uses syntax influenced by that of C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. Example - Termination of each line is compulsory in JAVA but not in javascript. The key design principles within JavaScript are taken from the Self and Scheme programming languages.


JavaScript was originally developed in Netscape, by Brendan Eich. Battling with Microsoft over the Internet, Netscape considered their client-server solution as a distributed OS, running a portable version of Sun Microsystem's Java. Because Java was a competitor of C++ and aimed at professional programmers, Netscape also wanted a lightweight interpreted language that would complement Java by appealing to nonprofessional programmers, like Microsoft's VB.


Developed under the name Mocha, LiveScript was the official name for the language when it first shipped in beta releases of Netscape Navigator 2.0 in September 1995, but it was renamed JavaScript when it was deployed in the Netscape browser version 2.0B3.





The change of name from LiveScript to JavaScript roughly coincided with Netscape adding support for Java technology in its Netscape Navigator web browser. The final choice of name caused confusion, giving the impression that the language was a spin-off of the Java programming language, and the choice has been characterized by many as a marketing ploy by Netscape to give JavaScript the cachet of what was then the hot new web programming language. It has also been claimed that the language's name is the result of a co-marketing deal between Netscape and Sun, in exchange for Netscape bundling Sun's Java runtime with its then-dominant browser.


Today, "JavaScript" is a trademark of Oracle Corporation. It is used under license for technology invented and implemented by Netscape Communications and current entities such as the Mozilla Foundation.


The most common use of JavaScript is to write functions that are embedded in or included from HTML pages and that interact with the Document Object Model (DOM) of the page. Some simple examples of this usage are:
  • Loading new page content or submitting data to the server via AJAX without reloading the page (for example, a social network might allow the user to post status updates without leaving the page)
  • Animation of page elements, fading them in and out, resizing them, moving them, etc.
  • Interactive content, for example games, and playing audio and video
  • Validating input values of a web form to make sure that they are acceptable before being submitted to the server.
  • Transmitting information about the user's reading habits and browsing activities to various websites. Web pages frequently do this for web analytics, ad tracking, personalization or other purposes.


Because JavaScript code can run locally in a user's browser (rather than on a remote server), the browser can respond to user actions quickly, making an application more responsive. Furthermore, JavaScript code can detect user actions which HTML alone cannot, such as individual keystrokes. Applications such as Gmail take advantage of this: much of the user-interface logic is written in JavaScript, and JavaScript dispatches requests for information (such as the content of an e-mail message) to the server. The wider trend of Ajax programming similarly exploits this strength.


Because JavaScript runs in widely varying environments, an important part of testing and debugging is to test and verify that the JavaScript works across multiple browsers.


The DOM interfaces for manipulating web pages are not part of the ECMAScript standard, or of JavaScript itself. Officially, the DOM interfaces are defined by a separate standardization effort by the W3C; in practice, browser implementations differ from the standards and from each other, and not all browsers execute JavaScript.


To deal with these differences, JavaScript authors can attempt to write standards-compliant code which will also be executed correctly by most browsers; failing that, they can write code that checks for the presence of certain browser features and behaves differently if they are not available. In some cases, two browsers may both implement a feature but with different behavior, and authors may find it practical to detect what browser is running and change their script's behavior to match. Programmers may also use libraries or toolkits which take browser differences into account.


Source of this info


A nice Javascript Tutorial is available here.




In short we see that javascript is a light-weight scripting language that helps convert static HTML based pages into dynamic pages which interact in real-time! :) Now I must take a leave since I have to go somewhere! All suggestions and comments are welcomed as always! :) Good evening everyone, See you all soon! ^_^

Wednesday, May 2, 2012

What are some popular Viruses? - Random Wednesday



Hello all my dear readers! :) A splendid day it seems to be! How are you all doing? :)



Today's topic of discussion is rather a straightforward one. Viruses, we have dealt with them in some or the other walk of life. Maybe in real life those disease causing viruses, or in computer world, those data destroying ones. But what we are gonna discuss is Computer ones, not the disease ones.

Let's first do a quick overview on what viruses are, what is their nature, how they attack, et-cetera. Then we shall jump on the topic of today, the popular and deadly computer viruses. Go ahead, it's gonna be an interesting article, no doubt! Do read it! :)

What is a Computer Virus?!


A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. What I mean by reproductive ability is not that they gonna come out of your computers and make you pregnant with some stupid transformer sort of! LOL! :P It means they replicate themselves in the computer system, infecting other files on the disks attached permanently or temporarily. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. Perhaps the reason for the success of Total Security Suites in the market! I wonder! :|

Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses - Blah! Blah! Blah! :P Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. So what's the moral of the story?! Duh!! Viruses have the capability to reproduce! Others seem to be impotent! LOL! :P

Any virus will by definition make unauthorised changes to a computer, which is undesirable even if no damage is done or intended. Often confused with viruses, but actually different, let's discuss the Trojan Horse first:

Trojan Horse is different from a Virus!


A Trojan horse, or Trojan, is a program with a benign capability that conceals another malicious program. When the user executes a Trojan horse, the program performs the expected task, however, the program is also performing actions unknown to, and not in the best interests of the user. Mark the set of words very carefully - "not in the best interests of the user". A Trojan horse will generally not generate direct hazards to the computer except controlling the computer. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers (just as the Trojans were tricked into taking the Trojan Horse inside their gates). Now don't you give me that look as if you don't know the story of the Trojan War! :P It is generally used for data theft.



Back to the Topic! :D


Anyways, enough of the introductory discussion, let's get back to our primary topic that was to discuss some popular viruses, some viruses that have rather created history!

ILOVEYOU


ILOVEYOU, sometimes referred to as Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.". The first file extension 'VBS' was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

The ILOVEYOU script (the attachment) was written in Microsoft Visual Basic Scripting (VBS) which ran in Microsoft Outlook and was enabled by default. The script added Windows Registry data for automatic startup on system boot. The worm then searched connected drives and replaced files with extensions JPG, JPEG, VBS, VBE, JS, JSE, CSS, WSH, SCT, DOC, HTA, MP2, and MP3 with copies of itself, whilst appending the additional file extension VBS. The worm propagated itself by sending out copies of the payload to the first 50 entries in the Microsoft Outlook address book (Windows Address Book). It also downloaded the Barok trojan renamed for the occasion as "WIN-BUGSFIX.EXE".

Code Red


Although Code Red is actually a worm and not virus, but since most of the people consider all these malicious programs to be viruses only, let me not try to draw the line and create confusion in the minds of you all because I don't know how many of you really wish to differentiate between a virus and worm! Code Red was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server.

The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh. The worm was named the .ida "Code Red" worm because Code Red Mountain Dew was what they were drinking at the time, and because of the phrase "Hacked by Chinese!" with which the worm defaced websites. Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000. Wow! That number certainly makes it a notable one, right! :)

Creeper


Creeper was an experimental self-replicating program written by Bob at BBN in 1971. It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer worm. Creeper infected DEC PDP-10 computers running the TENEX operating system. The Reaper program was a computer worm, like Creeper, but its purpose was to delete the latter.

Creeper is said to be the first ever computer virus seen in 1971!

Nimda


Nimda is a computer worm, and is also a file infector. It quickly spreads, eclipsing the economic damage caused by past outbreaks such as Code Red. Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.

The worm was released on September 18, 2001. Due to the release date, exactly one week after the attacks on the World Trade Center and Pentagon, some media quickly began speculating a link between the virus and Al Qaeda, though this theory ended up proving unfounded.

Nimda affected both user workstations (clients) running Windows 95, 98, Me, NT, 2000 or XP and servers running Windows NT and 2000. The worm's name origin comes from the reversed spelling of it, which is "admin". F-Secure found the text "Concept Virus(CV) V.5, Copyright(C)2001 R.P.China" in the Nimda code.

Melissa


The Melissa virus, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a mass-mailing macro virus. As it is not a standalone program, it is not a worm. First found on March 26, 1999, Melissa shut down [Internet] E-mail systems that got clogged with infected e-mails propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused problems.

Melissa was first distributed in the Usenet discussion group alt.sex. The virus was inside a file called "List.DOC", which contained passwords that allowed access into 80 pornographic websites. The virus' original form was sent via e-mail to many people.

Zeus


Zeus is a Trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009, security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.

The various Zeus' botnets are estimated to include millions of compromised computers (around 3.6 million in the United States). As of October 28, 2009 over 1.5 million phishing messages were sent on Facebook with the purpose of spreading the Zeus' trojan. On November 3, 2009 a British couple was arrested for allegedly using Zeus to steal personal data. From November 14–15, 2009 Zeus spread via e-mails purporting to be from Verizon Wireless. A total of nine million of these phishing e-mails were sent.

In 2010 there were reports of various attacks, among which one, in July, disclosed by security firm Trusteer, indicating that the credit cards of more than 15 unnamed US banks were compromised. On October 1, 2010, FBI announced it had discovered a major international cyber crime network which had used Zeus to hack into US computers and steal around $70m. More than 90 suspected members of the ring were arrested in the US, and arrests were also made in the UK and Ukraine.

In May 2011, the then-current version of Zeus's source code was leaked and in October the abuse.ch blog reported about a new custom build of the trojan that relies on more sophisticated peer-to-peer capabilities.

Mocmex


Mocmex is a trojan, which was found in a digital photo frame in February 2008. It was the first serious computer virus on a digital photo frame. The virus was traced back to a group in China. Mocmex collects passwords for online games. The virus is able to recognize and block antivirus protection from more than a hundred security companies and the Windows built-in firewall. Mocmex downloads files from remote locations and hides randomly named files on infected computers. Therefore, the virus is difficult to remove. Furthermore, it spreads to other portable storage devices that were plugged into an infected computer. Industry experts describe the writers of the Trojan Horse as professionals and describe Mocmex as a "nuclear bomb of malware".

Here you have


Here you have, is a computer worm that successfully attacked many Windows computers in 2010 when it was sent as a link inside an email message with the text "Here you have" in the subject line. The worm arrived in email inboxes on and after September 9, 2010 with the simple subject of "Here you have". The final extension of the link was hidden by default, leading unsuspecting users to think it was a mere PDF file. Upon opening the attachment, the worm sent a copy of itself to everyone in the Windows Address Book.

Brain


Brain is the industry standard name for a computer virus that was released in its first form in January 1986, and is considered to be the first computer virus for MS-DOS. It infects the boot sector of storage media formatted with the DOS File Allocation Table (FAT) file system.

Kenzero


Kenzero is a virus that is spread across Peer to Peer networks and is programmed to monitor the browsing history of victims. The Kenzero virus was first discovered on the 15th of September 2010, but researchers think it went undetected for a few months prior to the initial discovery. Kenzero attacks computers that download files through Peer-to-peer networks (P2P). Once the file is opened, the virus locates the victim's browsing history and publishes it online. People can then view the files.

Wednesday, April 25, 2012

What is a Nobel Prize - Random Wednesday





Hey all! :) How are you doing? I hope my new post finds all my dear readers in a great state of health! :)

It's Wednesday, The Random Wednesday! :D And today I wanted to talk about Nobel Prize. Before which let me ask, do you find any changes in my blog? NO?! O_O LOL! I removed 3 adzones to clear make a more stable content-to-ads ratio, I hope it looks better now. Even I thought that my blog seemed a bit odd with all those ads, more of an adzone only! Anyways, I wanted to do that myself before someone asked me and the process got accelerated! haha! :D Alright! Alright, I'm getting back to the topic, hush!


Let's first check what the internet says about it?

A simple definition, erm sort of


So our Wikipedia said to me that, "Nobel Prize is a set of annual international awards bestowed in a number of categories by Scandinavian committees in recognition of cultural and scientific advances. The will of the Swedish chemist Alfred Nobel, the inventor of dynamite, established the prizes in 1895. The prizes in Physics, Chemistry, Physiology or Medicine, Literature, and Peace were first awarded in 1901." Now don't look at me at using that phrase, "Scandinavian Committee". Well it is group of individuals responsible for selecting the annual winners of the Nobel Prize. Cool! Are you sure they are unbiased, I sometimes doubt! :/


Alfred Nobel
The Man Behind the Nobel Prize


Since 1901, the Nobel Prize has been honoring men and women from all corners of the globe for outstanding achievements in physics, chemistry, medicine, literature, and for work in peace. The foundations for the prize were laid in 1895 when Alfred Nobel wrote his last will, leaving much of his wealth to the establishment of the Nobel Prize. Alfred Nobel, a scientist, inventor, entrepreneur, author and pacifist. Alfred Nobel (1833-1896) was born in Stockholm, Sweden, on October 21, 1833. His family was descended from Olof Rudbeck, the best-known technical genius in Sweden in the 17th century, an era in which Sweden was a great power in northern Europe. Nobel was fluent in several languages, and wrote poetry and drama. Nobel was also very interested in social and peace-related issues, and held views that were considered radical during his time. On November 27, 1895, Alfred Nobel signed his last will in Paris. When it was opened and read after his death, the will caused a lot of controversy both in Sweden and internationally, as Nobel had left much of his wealth for the establishment of a prize! His family opposed the establishment of the Nobel Prize, and the prize awarders he named refused to do what he had requested in his will. It was five years before the first Nobel Prize could be awarded in 1901.

You may check out more about Alfred Nobel, on the "official website of Nobel Prize". An article about him is written in just an amazing manner. The article is divided into various subsections, you can browse through which from the left-side widget on the website. Check it out over here.


More about the Nobel Prize


The Peace Prize is awarded in Oslo, Norway, while the other prizes are awarded in Stockholm, Sweden. The Nobel Prize is widely regarded as the most prestigious award available in the fields of literature, medicine, physics, chemistry, peace and economics.

The Royal Swedish Academy of Sciences awards the Nobel Prize in Physics, the Nobel Prize in Chemistry, and the Nobel Memorial Prize in Economic Sciences. The Nobel Assembly at Karolinska Institutet(A renowned medical university of Sweden) awards the Nobel Prize in Physiology or Medicine. The Swedish Academy grants the Nobel Prize in Literature. The Nobel Peace Prize is not awarded by a Swedish organisation but by the Norwegian Nobel Committee.

Each recipient, or laureate, receives a gold medal, a diploma, and a sum of money which depends on the Nobel Foundation's income that year. In 2011, each prize was worth SEK 10 million (US$1.46 million or you may say, €1.16 million). The prize is not awarded posthumously; however, if a person is awarded a prize and dies before receiving it, the prize may still be presented. A prize may not be shared among more than three people. The average number of laureates per prize has increased substantially over the 20th century.

Each medal features an image of Alfred Nobel in left profile on the obverse. The medals for physics, chemistry, physiology or medicine, and literature have identical obverses, showing the image of Alfred Nobel and the years of his birth and death. Nobel's portrait also appears on the obverse of the Peace Prize medal and the medal for the Economics Prize, but with a slightly different design. For instance, the laureate's name is engraved on the rim of the Economics medal. The image on the reverse of a medal varies according to the institution awarding the prize. The reverse sides of the medals for chemistry and physics share the same design. I think we shouldn't talk about the details of the gold, etc. content, Man! It get's tempting then! haha! :D

The best part I came to know about Nobel Prize was that yes, the winners do get a prize money. I mean with all the work they id which was worthy of a Nobel prize, shouldn't just leave their economic conditions poor if some excellent mind is not economically strong!


There aren't any Nobel Prize for Mathematics?


Now one thing for which I felt really bad was that there ain't any Nobel Prize for Mathematics, when in essence there is nothing better than Mathematics in the whole world! I know I have been someone who never liked mathematics, but hey! I don't hate it completely. There are some parts of it, especially the discrete mathematics(Probability, Combinatorial, Set Theory, etc.) that are deeply loved by me. When I know that yes, there have been great great great Mathematicians around the world without whom Physic's Inventions would have been lacking the precision and of course theoretical explanations, how could you rule out such a subject out the most prestigious award list? Mathematics has the answer of everything! I mean from Astrology, to astronomy, from drawing, art, literature, to Computers, just everything has Mathematics, and ruling it out of such an prestigious honor is really something that hurts! :/

There are some rather idiotic claims about why there ain't any Mathematics Nobel Prize. One such is that Alfred Nobel's wife was having an affair with a mathematician. OMG! HE WAS NEVER MARRIED! LOL! How could they make such an idiotic reason! duh! Other similar do exist, but well just forget about them. A more concrete one is that it wasn't mentioned in his will, then why the hell did they accept the Swedish Bank's donation and made another prize "The Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel" to be a part of Nobel Prize lists? And what about the Computer Scientists? They say mathematics wasn't something Nobel was interested in that's why he didn't state it in his will, but well! if there were computers I'm dead sure he would have been interested in them! I found an extremely amazing comment by some Internet user. Let me quote it for you all:

"When Nobel Prizes are dished out each fall, the most accomplished professionals in computing, telecom and IT have usually been left out in the cold. That's because there is no Nobel Prize for these fields, and it's unlikely there will be one any time soon. According to the Nobel Foundation: 'The Nobel Prizes, as designated in the Will of Alfred Nobel, are in physics, chemistry, physiology or medicine, literature and peace. Only once has a prize been added — a Memorial Prize — The Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel, donated by Sweden's central bank to celebrate its tercentenary in 1968. The Nobel Foundation's Board of Directors later decided to keep the original five prizes intact and not to permit new additions.' So, if IBM, Google, Apple or some other deep-pocketed tech company wanted to make a big donation along the lines of what Sweden's central bank did in 1968, maybe it could sway the Nobel Foundation to add a prize. But it most likely wouldn't be officially called a Nobel Prize."

According to me the person is correct! There must be, but well, we cannot call them official Nobel Prize then all because Alfred Nobel himself never made it an official one :/


A list of notable people who won Nobel Prizes


Let me quote the list issued by Telegraph as the 10 most important winners of Nobel Prize:
  1. Marie Curie - First woman to win a Nobel Prize in 1903 when she was recognised, along with her husband Pierre and Antoine Henri Becquerel, with the Physics award for their research into radiation. She later became the first person to receive two Nobel Prizes when she was given the Chemistry Prize in 1911 for her discovery of radium and polonium, and her further research into radium.
  2. Martin Luther King Jr. - Won the Peace Prize in 1964, at the age of 35, for his work to end racial discrimination through non-violent means.
  3. Albert Einstein - Arguably the world's most famous scientist, Einstein was given the Nobel Prize for Physics in 1921 for his services to physics, especially his discovery of the law of the photoelectric effect.
  4. Francis Crick, James Watson and Maurice Wilkins - These three scientists were awarded the Nobel Prize in Physiology or Medicine in 1962 for their discovery of the "double helix" structure of DNA nine years earlier. The award was deemed controversial because of the death of Rosalind Franklin, a collaborator with Wilkins, four years earlier. Nobel foundation rules, which state the prizes cannot be given posthumously, meant her work was not recognised. That's sad! :/
  5. Jean-Paul Sartre - The French existentialist philosopher, writer and literary critic was the first person to turn down a Nobel Prize in 1964 when he declined the Prize for Literature. Sartre is still recorded as the winner by the Nobel federation for his influential work which was "filled with the spirit of freedom and the quest for truth".
  6. Sir Alexander Fleming - Sir Alexander shared the 1945 Nobel Prize in Physiology or Medicine with Ernst Chain and Sir Howard Florey for the discovery of penicillin and its curative effect on infectious diseases. The Scot made his discovery accidentally when he returned to his untidy laboratory from a holiday to discover a fungus had developed that destroyed the bacteria immediately surrounding it. Wow! it was an accidental discovery that led him to the Nobel Prize! Lucky, eh?! :D
  7. Hermann Muller - The American won the same prize as Fleming a year later, in 1946, for his discovery of the mutating effects of X-ray radiation.
  8. Aleksandr Solzhenitsyn - The Russian novelist and dissident, who spent time in a Soviet labour camp after writing letters that criticised the communist regime, received the Nobel Prize for Literature in 1970. His most famous novels, The Gulag Archipelago and One Day in the Life of Ivan Denisovich, for which he received the award, exposed the brutality of the Soviet Union's forced labour camps.
  9. The International Committee of the Red Cross - The highest number of Nobel Prize wins goes to the International Committee of the Red Cross with three separate Nobel Peace Prizes. In 1917 and 1944 the organisation was recognised for its work during the First and Second World Wars, and it was named as a winner again in 1963, along with the League of Red Cross Societies, to mark its 100th anniversary.
  10. Sir Clive Granger - The Welsh economist won the 2003 Nobel Memorial Prize in Economic Sciences for his methods of analysing economic statistics, which revolutionised the way economists interpret financial data. His prize was shared with Robert Engle III, for his research in a similar area.


A list of 2011 Nobel Prize Winners


  • The Nobel Prize in Physics - Saul Perlmutter, Brian P. Schmidt and Adam G. Riess "for the discovery of the accelerating expansion of the Universe through observations of distant supernovae"
  • The Nobel Prize in Chemistry - Dan Shechtman "for the discovery of quasicrystals"
  • The Nobel Prize in Physiology or Medicine - Bruce A. Beutler and Jules A. Hoffmann "for their discoveries concerning the activation of innate immunity"
  • The Nobel Prize in Physiology or Medicine - Ralph M. Steinman "for his discovery of the dendritic cell and its role in adaptive immunity"
  • The Nobel Prize in Literature - Tomas Tranströmer "because, through his condensed, translucent images, he gives us fresh access to reality"
  • The Nobel Peace Prize - Ellen Johnson Sirleaf, Leymah Gbowee and Tawakkol Karman "for their non-violent struggle for the safety of women and for women’s rights to full participation in peace-building work"
  • The Prize in Economic Sciences - Thomas J. Sargent and Christopher A. Sims "for their empirical research on cause and effect in the macroeconomy"

The most amazing thing I came across was that Nobel Prize has an official Website! O_O I was like, WHAT?! O_O Check here. If I talk more about this website first, let me tell you all it's worth a visit! I mean it's just too good. They have got an educational page on the website which is filled with information that could make anyone spellbound! Just superb it is. Do check out the website! :)

Thanks for reading the article. I hope I wrote it nicely! :D All your comments and suggestions are welcomed always! :) Thanks for your time and attention. Good Day friends! :)

Wednesday, April 11, 2012

Who was Adolf Hitler and What is Nazism?




Hello All! :) I hope all my readers are doing just great! :) Taking on the Who and What thing for the Random Wednesday, I would like to talk today about Adolf Hitler and Nazism. Adolf Hitler, a name that fills your mind with terror and gives you a sight of people facing repercussions. But if we don't look the negative side of the man, he was one from whom we could learn a lot. His quotes are awesome to understand that yes, a person who can make himself or herself happy in the most sad situations, when he/she is the loneliest, emerges to be the one who can win over all the fights! But alas! his unjustified norms and procedures shadow his greatness as a man of words and his individuality, making him to be seen nothing more than a terror.


Adolf Hitler
(20 April 1889 – 30 April 1945)


Adolf Hitler was an Austrian-born German politician and the leader of the National Socialist German Workers Party. He was chancellor of Germany from 1933 to 1945 and dictator of Nazi Germany from 1934 to 1945. Hitler is commonly associated with the rise of fascism in Europe, World War II, and the Holocaust.

A decorated veteran of World War I, Hitler joined the German Workers' Party, precursor of the Nazi Party, in 1919, and became leader of the NSDAP in 1921. In 1923 he attempted a coup d'état, known as the Beer Hall Putsch, in Munich. The failed coup resulted in Hitler's imprisonment, during which time he wrote his memoir, Mein Kampf (My Struggle). After his release in 1924, Hitler gained popular support by attacking the Treaty of Versailles and promoting Pan-Germanism, antisemitism, and anticommunism with charismatic oratory and Nazi propaganda. After his appointment as chancellor in 1933, he transformed the Weimar Republic into the Third Reich, a single-party dictatorship based on the totalitarian and autocratic ideology of Nazism. His aim was to establish a New Order of absolute Nazi German hegemony in continental Europe.

Hitler's foreign and domestic policies had the goal of seizing Lebensraum ("living space") for the Germanic people. He directed the rearmament of Germany and the invasion of Poland by the Wehrmacht in September 1939, leading to the outbreak of World War II in Europe. Under Hitler's rule, in 1941 German forces and their European allies occupied most of Europe and North Africa. These gains were gradually reversed, and in 1945 the Allied armies defeated the German army. Hitler's supremacist and racially motivated policies resulted in the systematic murder of eleven million people, including nearly six million Jews.

In the final days of the war, during the Battle of Berlin in 1945, Hitler married his long-time mistress, Eva Braun. On 30 April 1945—less than two days later—the two committed suicide to avoid capture by the Red Army, and their corpses were burned.

Why that hate for 'Jews'

Hitler had never given up his dream of being an artist and after leaving school he left for Vienna to pursue his dream. However, his life was shattered when, aged 18, his mother died of cancer. Witnesses say that he spent hours just staring at her dead body and drawing sketches of it as she lay on her death bed.

In Vienna, the Vienna Academy of Art, rejected his application as "he had no School Leaving Certificate". His drawings which he presented as evidence of his ability, were rejected as they had too few people in them. The examining board did not just want a landscape artist.


Without work and without any means to support himself, Hitler, short of money lived in a doss house with tramps. He spent his time painting post cards which he hoped to sell and clearing pathways of snow. It was at this stage in his life - about 1908 - that he developed a hatred of the Jews.

He was convinced that it was a Jewish professor that had rejected his art work; he became convinced that a Jewish doctor had been responsible for his mother’s death; he cleared the snow-bound paths of beautiful town houses in Vienna where rich people lived and he became convinced that only Jews lived in these homes. By 1910, his mind had become warped and his hatred of the Jews - known as anti-Semitism - had become set.

Nazism

Nazism, the common short form name of National Socialism was the ideology and practice of the Nazi Party and of Nazi Germany. It is a unique variety of fascism that incorporates biological racism and antisemitism.[5] Nazism was founded out of elements of the far-right racist völkisch German nationalist movement and the violent anti-communist Freikorps paramilitary culture that fought against the uprisings of communist revolutionaries in post-World War I Germany. The ideology was developed first by Anton Drexler and then Adolf Hitler as a means to draw workers away from communism and into völkisch nationalism. Initially Nazi political strategy focused on anti-big business, anti-bourgeois, and anti-capitalist rhetoric, though such aspects were later downplayed in the 1930s to gain the support from industrial owners for the Nazis; focus was shifted to anti-Semitic and anti-Marxist themes. Nazism promoted political violence, militarism, and war, it conceived of politics as being a "battle", and the Nazis utilized their paramilitary organization, the Sturmabteilung (SA) for violent attacks upon those they opposed, particularly communists, Jews, and social democrats. Hitler and the Nazis openly promoted German territorial expansionism into Eastern Europe to be Lebensraum ("living space") for German settlers and assimilation of Germanic peoples into Germans that would result in the creation of a "Greater Germanic Realm of the German Nation".


Nazism advocated the supremacy of the claimed Aryan master race over all other races. Nazis viewed the progress of humanity as depending on the Aryans and believed that it could maintain its dominance only if it retained its purity and instinct for self-preservation. They claimed that Jews were the greatest threat to the Aryan race. They considered Jews a parasitic race that attached itself to various ideologies and movements to secure its self-preservation, such as capitalism, the Enlightenment, industrialisation, liberalism, Marxism, democracy, and trade unionism. To maintain the purity and strength of the Aryan race, the Nazis sought to exterminate Jews, Romani, and the physically and mentally disabled. Other groups deemed "degenerate" and "asocial" who were not targeted for extermination, but received exclusionary treatment by the Nazi state, included: homosexuals, blacks, Jehovah's Witnesses and political opponents.

Nazism promoted an economic system that supported a stratified economy with classes based on merit and talent while rejecting universal egalitarianism, retaining private property, freedom of contract, and promoted the creation of national solidarity that would transcend class distinction. Hitler claimed that unconditional equality of opportunity for all able racially-sound Aryan German males in Germany was the essence of the socialism of German National Socialism. This was known as völkisch equality that officially ascribed collective racial equality of opportunity, equality before the law, and full legal rights to able people of Aryan blood but deliberately excluded people outside of this definition who were regarded as inferior and rejected the conception of universal human equality. The Nazis criminalized strikes by employees and lockouts by employers for being contrary to national unity and the state took over the approval process of setting wage and salary levels.

The Nazis were presented by Hitler and other proponents and viewed by some scholars as being neither left-wing nor right-wing but politically syncretic. However major elements of Nazism have been deemed as clearly far-right, such as its goals of the right of claimed superior people to dominate while purging society of claimed inferior elements.

NEO-NAZISM, a general term for the related fascist, nationalist, white supremacist, antisemitic beliefs and political tendencies of the numerous groups that emerged after World War II seeking to restore the Nazi order or to establish a new order based on doctrines similar to those underlying Nazi Germany. Some of these groups closely adhered to the ideas propounded in Hitler's Mein Kampf; others espoused related beliefs deriving from older Catholic, nationalist, or other local traditions. Some openly embraced the structure and aspirations of the Third Reich by displaying swastika flags and glorifying Nazi achievements, while others sought to mask their ideology and agenda. Neo-Nazi activity has surged and declined in unpredictable waves in Germany, France, England, Russia, the Scandinavian countries, the United States, Canada, South Africa, and elsewhere. In April 1993, after a series of incidents, the Italian government passed an emergency measure aimed at punishing racial, ethnic, and religious discrimination. The Mancino Law (Law No. 205) permits prosecution of individuals who incite violence using a broad range of methods, including displaying symbols of hate, such as swastikas. Hundreds of youths have since been convicted under the law. In February 2005, European Union ministers agreed to continue a long-term debate over the regulation of racism and xenophobia. Among the proposals under consideration is making it punishable by law to deny the Holocaust or other crimes against humanity.


Source - Google, Wikipedia and a little bit of my own knowledge. I know this article has a lot of copied info, so kindly forgive me for that. I just don't want to add anything in such things that is not true so I preferred to copy rather thatn write myself. I hope you guys understand what I mean.

Thanks for reading, Good day! :)