Sunday 26 February 2017

ARDUINO



Arduino
Arduino is a computer hardware and software company, project, and user community that designs and manufactures micro-controller kits for building digital devices and interactive objects that can sense and control objects in the physical world.
Arduino board designs use a variety of microprocessors and controllers. The boards are equipped with sets of digital and analog input/output (I/O) pins that may be interfaced to various expansion boards (shields) and other circuits. The boards feature serial communications interfaces, including Universal Serial Bus (USB) on some models, which are also used for loading programs from personal computers. The microcontrollers are typically programmed using a dialect of features from the programming languages C and C++. In addition to using traditional compiler toolchains, the Arduino project provides an integrated development environment (IDE) based on the Processing language project.

Hardware

Arduino is open-source hardware. This means that anyone is allowed to make Arduino-compatible boardc.
An Arduino board consists of an Atmel 8-, 16- or 32-bit AVR micro-controller (ATmega8, ATmega168, ATmega328, ATmega1280, ATmega2560). The boards use single-row pins or female headers that facilitate connections for programming and incorporation into other circuits. These may connect with add-on modules termed shields. Multiple, and possibly stacked shields may be individually addressable via an I²C serial bus. Most boards include a 5 V linear regulator and a 16 MHz crystal oscillator or ceramic resonator. Some designs, such as the LilyPad, run at 8 MHz and dispense with the onboard voltage regulator due to specific form-factor restrictions.
Arduino micro-controllers are pre -programmed with a boot loader that simplifies uploading of programs to the on-chip flash memory. The default bootloader of the Aduino UNO is the optiboot bootloader.[12] Boards are loaded with program code via a serial connection to another computer. Some serial Arduino boards contain a level shifter circuit to convert between RS-232 logic levels and transistor–transistor logic (TTL) level signals. Current Arduino boards are programmed via Universal Serial Bus (USB), implemented using USB-to-serial adapter chips such as the FTDI FT232. Some boards, such as later-model Uno boards, substitute the FTDI chip with a separate AVR chip containing USB-to-serial firmware, which is reprogrammable via its own ICSP header. Other variants, such as the Arduino Mini and the unofficial Boarduino, use a detachable USB-to-serial adapter board or cable, Bluetooth or other methods, when used with traditional microcontroller tools instead of the Arduino IDE, standard AVR in-system programming (ISP) programming is used.
Shields
Arduino and Arduino-compatible boards use printed circuit expansion boards called shields, which plug into the normally supplied Arduino pin headers. Shields can provide motor controls for 3D printing and other applications, Global Positioning System (GPS), Ethernet, liquid crystal display (LCD), or breadboarding (prototyping).
Basically three shields are used –
·       USB Master Shield allows us to connect to Android devices over USB.
·       Motor Shield helps in driving the wheels of the robot.
·       Ethernet Shield allows us to turn our Arduino into a tiny web server.

Official boards of Arduino

  • Arduino RS232
    (thru-hole parts)
  • Arduino Diecimila
  • Arduino Duemilanove
    (rev 2009b)
  • Arduino Uno R2
  • Arduino Uno SMD R3
  • Arduino Leonardo
  • Arduino Pro
    (No USB)
  • Arduino Mega
  • Arduino Nano
    (DIP-30 footprint)
  • Arduino LilyPad 00
    (rev 2007) (No USB)
  • Arduino Robot
  • Arduino Esplora
  • Arduino Ethernet
    (AVR + W5100)
  • Arduino Yun
    (AVR + AR9331)
  • Arduino Due
    (ARM Cortex-M3 core)

Cyber Crime: Introduction to Darknet, Bitcoin and Stuxnet Virus



CYBER CRIME

Introduction to Darknet, Bitcoin & Stuxnet Virus



The data packets in the Internet are wild, run down horses with in-numerous paths & choices to travel from one router to another hop by hop. Every system/device on the Internet is interconnected with each other via routers & switches, which make up the entangled World Wide Web. The deep web/invisible web/hidden web is a part of the World Wide Web whose contents are not indexed by standard search engines for security concerns. Google, Yahoo, Bing, etc. are incredibly powerful search engines, but they cannot index the vast amount of data that is not hyperlinked in public DNS services. 

Dark Web sites are not as simple as the everyday normal web sites are, they contain websites hidden and encrypted through numerous network tunnels. The little programs called the ‘crawlers’ behind the search pages are not able to hyperlink the deep web pages. Also since Dark Net, the deeper part of the Deep Web is famous for notorious activities, it is better for a common man to stay away from it. To access the Dark Net pages, there lies a need for end-to-end encrypted routing protocols enabled software package called the “Tor”.

In the Dark Net, users intentionally bury data. Often, these parts of the Web are accessible only through the use of a special browsing software that helps to peel away the onion-like layers of the Dark Web. In simple terms, it is a term given to collectively describe sites which are not directly accessible through the public network, but only through an intermediary or a proxy.
Precautions to be followed (while accessing the Dark Net):
1.    If one intends to visit an illegal website, the security should be set to max.
2.    Tor should be installed on the RAM and not on the hard drive.
3.    One should learn to control their curiosity.
4.    Some Red Room, CP, Torture, Hitman, etc. sites are real. Those sites must be stayed away from.
5.    No transactions should be performed through any of those websites.
6.    Nothing is secure. So the camera and microphone should always be covered.


 

Horrifying Sites from Deep Web


Bizarre and Taboo customs which are not known to many, crawling in the dark world of the Deep Web are brought to light in this part.
The reader may not feel comfortable while going through these affairs, but it is hard to believe that these sort of things are prevailing throughout the cyberspace.
Few of the notorious activities from deep web are:-

1. The Human Experiment

This happens to be one of the genuine sites on the deep web with an immensely inhumane motive. Those who run this site believe that not all humans are equal and to prove their point they find homeless people and perform dark and possibly painful experiments on them. Experiments range from starvation and water/fluid restriction to exposing infants to harmful radiation.

2.  Human Leather

        Products made of human leather are sold here.

 

3. Joy of Satan

An eerie website possibly intended to satisfy the curiosity of those new to or fans of the horror genre.



 

4. The Cannibal Cafe Forum                                                  

Now banned by the German government, this cannibalistic forum about eating and being eaten by people was actively participated in. Some members even chat and arrange meetups via the forum like, “I need someone to eat my fresh meat. I am juicy and tender.” 

 


 5.  Aeroplane Crashes
This disturbing website records the last communication of aeroplanes right before they crashed. Here exists all the recordings of the black boxes of the crashed aeroplanes.


6. Macabre Games

In this new take on gaming, the creators explore the boundaries of horrifying to deliver a series of blood-curdling experiences. This interactive game takes the participant on a journey through a mental asylum.



Bitcoin

To operate and creep into the Deep Web like a ghost, untraced and undetected by law enforces, there was an urgent need to anonymize the transfer of money in the deep web. Thus, Bitcoin had a very great impact and proved to be very imperative for cyber warriors in cyber space.
Bitcoin is a consensus network that enables a new payment system and completely digital money. It is the first decentralized peer-to-peer payment network that is powered by its users with no central authority or middlemen.

Characteristic Features of Bitcoins

 

It's anonymous

Users can hold multiple bitcoin addresses, and they are not linked to names, addresses, or other personally identifiable information.

It's decentralized

The bitcoin network isn’t controlled by one central authority. Every machine that mines bitcoin and processes transactions makes up a part of the network, and these machines work together. It means that, in theory, one central authority can’t tinker with monetary policy and cause a meltdown – or simply decide to take people’s bitcoins away from them.

 

It's completely transparent

Bitcoins store details of every single transaction that ever happened in the network in a huge version of a general ledger, called the blockchain. The blockchain tells all. If one has a publicly used bitcoin address, anyone can tell how many bitcoins are stored at that address. The only information they do not have is to who it belongs.
So in terms of Darknet, bitcoin is a heavenly form of money. Darknet users make use bitcoins to perform all kinds of activities, right from buying drugs to hiring contract killers.
Now, after going through the wild affairs of the darknet and the added advantage of bitcoin, there comes a very interesting story about how a malicious code called the “StuXnet” almost took over the whole world.


Stuxnet Virus
In January 2010, inspectors with the International Atomic Energy Agency visiting the Natanz uranium enrichment plant in Iran noticed that centrifuges used to enrich uranium gas were failing at an unexpected rate. The cause was a complete mystery — apparently as much to the Iranian technicians replacing the centrifuges as to the inspectors observing them. Five months later a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot a series of computers in Iran that were crashing and rebooting repeatedly. Again, the cause of the problem was a mystery. That is, until the researchers found a handful of malicious files in one of the systems and discovered the world’s first digital weapon.
Stuxnet, as it came to be known, is unlike any other virus or worm that came before. Not only can it hijack targeted computers or steal information from them, but can even escape the digital realm to wreak physical destruction on equipment the computers controlled.
Stuxnet is a malicious computer worm believed to be a jointly builtAmerican-Israeli cyber weapon. Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, and then seeking out Siemens Step7 software.


               
 Hitman Net: A darker part of the Darknet

The Deep Web shows the prevalence of another type of clandestine service: contract killers.

These sites, with URLs consisting of random sequences of alphanumeric characters, can't be viewed with traditional Web browsers. A Tor browser, which routes users' information through a system of nodes around the world rendering people using the service effectively anonymous, is required to obtain access. However, from there, finding someone with a certain moral flexibility is as easy as searching "assassin" or "hitman" on one of the many Deep Web forums or search engines.
A few of such websites are as follows:

1. Unfriendlysolution

"Doing this over the TOR network is probably the safest way to do it at all," writes the operator of Unfriendlysolution on his or her site.
"I do not know anything about you; you do not know anything about me. The desired victim will pass away. No one will ever know why or who did this. On top of that I always give my best to make it look like an accident or suicide."
"I have gained endless experience(s) in this [sic] 7 years. It has changed me a lot. I don't have any empathy for humans anymore," Unfriendly Solution boasts. "This makes me the perfect professional for taking care of your problems and makes me better than other hitman. If you pay enough I'll do ANYTHING to the desired victim. If I say anything I mean anything."
Unfriendly Solution only accepts payment in Bitcoin, the standard currency for Deep Web transactions. Bitcoins can be transferred electronically between computers or smartphones without an intermediary institution—making it a safe unit of exchange for people who don't want their financial activities monitored. 


2. C’thulhu Resume

"It is of mutual interest to make everything anonymous," explains a post on the site of C'thulhu Resume, another murder-for-hire group. "It means we don't know you and you don't know us. We can't send you to prison, and you can't send us to prison."
C'thulhu Resume advertises itself with the mock cheery slogan: "The best place to put your problems is in a grave!"

3. Hitman Network
Hitman Network, which claims to be a trio of contract killers working in the United States, Canada, and the European Union, offers people a commission for referring their friends. "Tell others about this shop, and earn 1% from every purchase they will make," reads a message on the site.
Unlike some of the other services, which hold up their lack of ethical considerations as a selling point, Hitman Network does draw a line between what it will and will not do: "no children under 16 and no top 10 politicians."