Why not me - Enrique






Lyrics to Why Not Me :
 
Escaping nights without you
with shadows on the wall
my mind is running wild
trying hard not to fall
you told me that you love me
but say I'm just a friend
my heart is broken up into pieces
cos I know
I'll never free my soul
it's trapped between true love and being alone
when my eyes are closed
the greatest story told
I woke and my dreams are shattered here on the floor

why oh why

tell me why not me
why oh why
we were meant to be
baby i know i could be all you need
why oh why oh why
I wanna love you
if you only knew how much I love you
so why not me

the day after tomorrow

I'll still be around
to catch you when you fall
and never let you down
you say that we're forever
our love will never end
I've tried to come up
but it's drowning me to know
you'll never free my soul
it's trapped in between true love and being alone
when my eyes are closed
the greatest story told
I woke and my dreams are shattered here on the floor

Tell me baby

why oh why
tell me why not me
why oh why
we were meant to be
baby i know I could be all you need
why oh why oh why
I wanna love you
if you only knew how much I love you
so why not me

you won't ever know

how far we can go
you won't ever know
how far we can go (go)

why oh why

tell me why not me
why oh why
we were meant to be
baby I know I could be all you need
why oh why oh why

why oh why

tell me why not me
why oh why
we were meant to be
baby I know i could be all you need
why oh why oh why oh why
I wanna love you
if you only knew how much I love you
so why not me

Session Hijacking,Bypassing Login using Session Stealing`

What is Session Hijacking?

Session Hijacking is Stealing the existing active

Session. The main purpose of Session Hijacking
is to bypass authentication process and gain
unauthorized access to the computer or Website.
In simple words , hackers will login as some other client using their Sessions.

TCP session hijacking is when a hacker takes over a TCP session between two machines. Since
most authentication only occurs at the start of a TCP session, this allows the hacker to gain access
to a machine

Different Session Hijacking methods:
Session stealing is achieved by following methods

1. Session fixation:
In this method, the Hacker sets a user's session id to known victim. For example, Hacker will
send email to known victim with a link that contains a particular session id. If the victim followed that
link, the hacker can use that session and gain access.

2. Session SideJacking(session Sniffing):
In this method, the attacker use packet sniffing to and steal the Session cookie. In order to prevent
this, some websites use SSL(encrypts the session). but do not use encryption for the rest of the site
once authenticated. This allows attackers that can read the network traffic to intercept all the data that
is submitted to the server or web pages viewed by the client.
Unsecured Hotspots are vulnerable to this type of Session Hijacking.

3. Client-side attacks (XSS, Malicious JavaScript Codes, Trojans, etc):
Hacker can steal the Session by running the Malicious Javascript codes in client system.
Usually hackers attack some websites using XSS and insert their own Malicious Javascript codes.
In client point view it is trusted website, he will visit the website. When victim visit the link , Malicious
Javascript will executed. It will steal the Session cookies and other confidential data.

4. Physical access:
If the hacker has physical access, it is easy for him to steal the Session. Usually this will
occur in public cafe. In public cafe , one use login to some websites(facebook, gmail). A hacker
come after victim can steal the session cookies.
Session Hijacking using Firesheep-Mozilla Addon:
Firesheep is Famous Mozilla addon that made Session Hijacking very easy. Using Firesheep , you
can steal the Session of Public WI FI users. Using Firesheep, you can gain access to victim account
of the Facebook, twitter and some other websites.

N9 Countdown Timer Pulled Off Nokia Sweden




The N9 Meego-powered handset is one of the most anticipated handsets from Nokia. This is the last Meego handset that Nokia will deliver, since they are now looking at Windows Mobile to power their smartphones. The expected date for the release of this 3.9-inch handset was supposed to be the 23rd of September, 2011. A countdown clock was put up on Nokia's Swedish website, indicating the same. However, this timer has now been quietly taken down.
Hopefully the N9 will release on time
Hopefully the N9 will release on time


According to a report by GSM Arena, the countdown clock was put up on the website 50 days prior to the launch of the handset. When the timer popped up, there was no major announcement, and its removal was done as quietly. Hopefully, for those looking to get their hands on the N9, the launch of the phone should not get delayed. We certainly are hoping for the launch, as soon as possible.

A brief look at the specifications of the Nokia N9:

  • 3.9-inch AMOLED capacitive touchscreen with a resolution of 480 x 854 pixels

  • 3G, Wi-Fi, GPS with A-GPS support

  • Bluetooth 2.1 with A2DP and EDR, NFC

  • 8 megapixel camera with autofocus and Dual LED Flash

  • 3.5 mm audio jack

  • Dolby Mobile Sound Enhancement with Dolby Headphone Support

  • 1GB RAM

  • 16GB/ 32GB

  • 1 GHz Cortex A8 CPU

Samsung Galaxy R is Official, Coming Soon to India

After a quick name change and some nips and tucks, Samsung has made the Galaxy R official and will start rolling it out, beginning with Sweden, followed by North & Eastern Europe, South East & West Asia, Middle East Asia, and China. The pricing for India is not set since it’s not actually launched here, just announed. My guess would be around 25K, which puts it just below the Galaxy S II and in line with the LG Optimus 2X, which it will undoubtedly destroy. The Galaxy R hasn’t changed much in appearance from the last time we spotted it in a leaked video. Think of it as a scaled down version of the Galaxy S II. Samsung hasn’t completely neutered it though; the only changes include a Tegra 2 CPU and a smaller screen size with a different panel and lower in-built memory and RAM.
Let the games begin!
Let the games begin!


To avoid eating into the sales of the S II, the video recording capabilities are capped at 720p. To bring the price down further, we have to bid adieu to the Super AMOLED Plus screen and make way for SuperClear LCD. The phone will run Android 2.3 Gingerbread along with Samsung’s TouchWiz UI (possibly 4.0). I wouldn’t be surprised if HTC is quietly prepping something to retaliate. It’s a known fact that their flagship phone is anything but ‘Sensational’, so they really need to bring their A Game if they have to stand a chance. Here are some of the highlights for the Samsung Galaxy R once more -
  • 4.19-inch SC-LCD, capacitive touchscreen

  • 3G, EDGE/GPRS, Wi-Fi, Wi-Fi Hotspot, GPS with A-GPS support

  • Bluetooth 3.0 + HS

  • 5 megapixel camera with autofocus and LED flash

  • 720p video recording with Full HD video playback

  • Stereo FM Radio with RDS

  • Secondary front facing camera

  • 8GB Internal storage

  • Memory expandable to 32GB via MicroSD card

  • 3.5 mm audio jack

Update: Axis Bank ATM Hackers Operated from Hyderabad



UPDATE: Even as you're reading this, cops from the Oshiwara police station, located in suburban Mumbai claim to have traced the hackers to Hyderabad. Further reports suggest that not only did the hackers manage their entire hack operation from Hyderabad, but were also Nigerian nationals. Their exact location in Hyderabad hasn't been traced yet. Adding to these details, a report in the Mumbai Mirror also states that the usual modus operandi of such a scam would be either placing accomplices at banks and other call centres, or acquire a duplicate security strip, placed at the back of a debit card to get all personal debit card details.

In what comes as a shocker to several Mumbaikars who quite routinely withdraw cash from the Axis Bank ATMs dotted across the city, it is being learnt that the security of the ATM systems of the bank have been compromised. According to a report in the Mumbai Mirror, the first set of complaints has been coming from Oshiwara, located in suburban Mumbai. The ATM in question located in Oshiwara incidentally happens to be at a stone’s throw distance from the Oshiwara Police Station.
Exercising caution..
Exercising caution..


Over the month, the report stated that several irate customers began filing complaints after they realized that the money withdrawn by them from the ATM and the money, a much larger amount that got actually debited did not match. Apparently, the repeated complaints did not draw much action from the cops, initially but when one of the cops in the station itself (Asst. Inspector, Sanjay More) got duped, the cyber crime cell was called in. 

According to a statement that a spokesperson from the bank provided to Mumbai Mirror, it was revealed that the ATM at Oshiwara wasn’t the lone one affected. Several other Axis Bank ATMs across the city are now being speculated to be among those affected. Although the mode, and any other specific details of the hack haven't come through, what is being spoken about, albeit in hushed tones is the use of an external device that records all details of a customers card on swiping. The bank has, as on August 1, 2011 filed an FIR with the Cyber Crime Cell. 

With statistics being as worrying as the loss of over Rs. 8 lakh in less than a month, this news of the security being compromised has again raised the issue of lack of security present. Have you been affected by the hack? Do let us know in the comments section below. 

Apple Suing Motorola, says XOOM looks just like the iPad


pple's succesfully blocked the Samsung Galaxy Tab in Australia and the European Union, excluding Netherlands and is now setting its sights on the Motorola Xoom, which it says has been copied from the iPad.

Spot the difference?

Being wronged? 



Those following the reports pertaining to Apple and patent lawsuits would know that the iPad manufacturer is planning to drag every major tablet manufacturer in the space to court, suing them for patent infringement. However, the real deal stands at this copy of a 4-page Community Design document, submitted by Apple to acquire a design patent. A look at the images in the link above, and you would know that by their very nature, these images are 'generic'. Simply put, every tablet, possibly made ever will bear at least some resemblance to Apple's iPad, simply because the product category is such. 

Apple has been citing these very reasons for keeping the Galaxy Tab out of popular markets. To know all that has been happening between Apple and the rest of the tablet manufacturers, in terms of patents, click here