What's new

Edward Snowden's revelation; GCHQ monitored Pakistan's communication data

LOL So you think its today countries have been doing this? Its has been going on for as long as one can remember. Do you think this will stop countries from working together? NOPE it won't.:D Things will continue like nothing happened, after a few weeks or months at best everybody would have forgotten about this and we will all move on as always.:enjoy:
Hi,

Agree to every bit. How much callous it may sound. But at the end of the day. When the heat against Western Hypocrisy is generated, then dont expect it something that came out of blue.
 
.
This time all 3G & 4G mobile & devices thefting everyone data and sending automatically USA Big Data Base controlled by Google & NASA. All mobiles softwares,applications and online games under control of Google play is a big fraud by American these softwares, apps,games slowly slowly upload your all data automatically and 6 other big partners also innovolved in it.
No.1 Google Maps, don't use them instead this software giving you route information as well as it is sending your feed back to US Big Data Base about your activities which locations you are traveling with sim information.
No.2 Facebook, its world biggest spy agency this time in which everybody happily providing all of its details like sharing location,posting seelfies, giving phone numbers, making comments about yourself as well as your friends details also automatically going to that database.
No.3 Twitter, is working for authentication and reference to prove you are not a fake person by checking your reference with connected personalities.
No.4 what's app, is fourth biggest fraude its verify people from their voice messages, videos, uploaded and send to friends.
No.5 LinkedIn checks and send your professional details and other important data .
No. 6 is biometric machines those sends your finger tips data not only to your database but also forwàrd it to USA through its networks now new app will come to replace it with the name of finger tips scan password lock to get each user finger prints trials are underway for this app on touch screen mobiles and devices.
These 6 apps theft all of your complete info and make each person spreat file by matching all things like your activities where you travelled by google maps, images from f.book,voice samples from what's app, professional details from LinkedIn, Finger prints from touch screen biometric apps and reference from twittering. After raw file it goes for real evaluation & verification that you are real one or not ? there each personality original details USA already available from all Airports of Europe & America as well from its allied countries as they are using same American technologies and they get your data with your scanned passport, scanned images and it goes first directly to that database to verify you. Google Play Is designing each & every app, software, or game that have their own stealth component in it to theft your info as much possible as it can using internet as their feedback source to upload thefted data.
 
Last edited:
.
a predominant amount of cisco hardware is made abroad, especially China; and about 20% of software is from their India center (this is a few years ago, I'd assume Indian software conttent would have gone up since then(
No doubt you are very advanced in IT but you are unable to create Cisco IOS.
 
. .
No doubt you are very advanced in IT but you are unable to create Cisco IOS.

why would I want to?

if you mean India is not creating 'new' path breaking products, I'd argue that is not necessarily a problem. Consistently inventing new in numbers requires a very high degree of R&D investment that India simply cannot afford. OTOH focusing on improving those ideas that have already passed the first few stages of success but before they become mass markets, is the sweet spot.
 
.
You know very very little about IT ; makes your title look very bad !
Well honestly speakng IT is not my field.but it is not as little as you have assumed.....and care to elaborate which part of my post has offended you so much???

Sir what about Intranet traffic, actually from LAN traffic monitoring they can effectively SPY from builtin Patches of CISCO IOS k9 software.
But wouldn't that require to be connected to an external network? Atleast one unit on the network???? But i can see you have mentioned SPY, which means, an intruder with physical access to the network?
 
.
Well honestly speakng IT is not my field.but it is not as little as you have assumed.....and care to elaborate which part of my post has offended you so much???


But wouldn't that require to be connected to an external network? Atleast one unit on the network???? But i can see you have mentioned SPY, which means, an intruder with physical access to the network?
Brother if you are using router that means you are connected to Internet, any one can access your router through SSH, TElnet emulator and monitor your all activities.
I don't want to share this news but i will hint you, many cisco devices has been replaced by Chinese devices in sophisticated areas like nescom, NDC etc.
 
.
Cisco routers, US vendor on security establishment??? Enough said..
 
.
Brother if you are using router that means you are connected to Internet, any one can access your router through SSH, TElnet emulator and monitor your all activities.
I don't want to share this news but i will hint you, many cisco devices has been replaced by Chinese devices in sophisticated areas like nescom, NDC etc.
Oops!!!my bad confused it with lan switch.....i have a hard time believing that but i will check with someone
 
.
Oops!!!my bad confused it with lan switch.....i have a hard time believing that but i will check with someone
Routers are more intelligent then layer two switch.
But if you are using internet or intranet using switch connected to router then it is very dangerous.
 
.
Well honestly speakng IT is not my field.but it is not as little as you have assumed.....and care to elaborate which part of my post has offended you so much???


But wouldn't that require to be connected to an external network? Atleast one unit on the network???? But i can see you have mentioned SPY, which means, an intruder with physical access to the network?

I don't have a reason to get offended personally;
but since this is my fields since last 15+ years,
the technical wrongs hurt me.

I appreciate your acceptance though.
 
.
I don't have a reason to get offended personally;
but since this is my fields since last 15+ years,
the technical wrongs hurt me.

I appreciate your acceptance though.
Not the answer i was looking for.....which oart of my post you believe is wrong.....
 
.
Sir what about Intranet traffic, actually from LAN traffic monitoring they can effectively SPY from builtin Patches of CISCO IOS k9 software.

Do you know there are deliberate and zero day vulnerabilities inside the Encryption itself ? For Intranet, AES 128 bit or 256 bit is used. Guess what who control these algorithms ? NSA ! they shipped the downgraded versions of these algos.

If you are interested in vulnerabilities itself. Search Heart bleed bug. It affected 70 percent of servers world wide last year in april. There was a zero day vulnerability in SSL encryption which allowed the hacker to break through 1024 or 2048 bit encryption within hours
 
.
Brother if you are using router that means you are connected to Internet, any one can access your router through SSH, TElnet emulator and monitor your all activities.
I don't want to share this news but i will hint you, many cisco devices has been replaced by Chinese devices in sophisticated areas like nescom, NDC etc.

how does that make your situation any better? btw even Chinese military uses cisco
 
.
Do you know there are deliberate and zero day vulnerabilities inside the Encryption itself ? For Intranet, AES 128 bit or 256 bit is used. Guess what who control these algorithms ? NSA ! they shipped the downgraded versions of these algos.

If you are interested in vulnerabilities itself. Search Heart bleed bug. It affected 70 percent of servers world wide last year in april. There was a zero day vulnerability in SSL encryption which allowed the hacker to break through 1024 or 2048 bit encryption within hours
Yes i know about these bugs.
Currently we are managing intranet connection of NLC with most sophisticated and secure infrastructure.No one is allowed to use internet in the premises of camps.

how does that make your situation any better? btw even Chinese military uses cisco
:D Chinese are not fools.
 
.

Latest posts

Pakistan Defence Latest Posts

Back
Top Bottom