Sunday 13 March 2016

Quick and Easy Way to Create a Printable List of Google Contacts


All your contacts in Gmail can be downloaded to your PC to keep them with you offline. However, the downloaded file is in .csv format which is just a big mess. You will need at least an hour to line up all the contacts, and if you are thinking of printing them, you are going to have a difficult time. Thankfully, there is a software available for this that can save you hours of work.
GoogleTel is a tiny freeware software that will automatically arrange your downloaded Google contacts in .html format so you can easily print them. In this post we will show you how to create a printable list of Google contacts using GoogleTel.
Note: GoogleTel will only arrange contacts that have a dedicated number, unlike the .csv file that may even contain names and emails of people who you may have interacted with. GoogleTel is for Windows only.
Before you arrange Google contacts for printing, you need to download them first. To do so, go to Gmail and click on the “Gmail” drop-down menu button above the “Compose” button. From the menu, click on “Contacts,” and all your contacts will be shown.
Printable-Google-Contacts-Gmail-Contacts
Now click on the “More” button, and select “Export” from the menu. A dialog will open where you can select which contacts to download; you can either specify a specific type of contacts – like Friends or Family – or just download all the contacts. When you are done selecting contacts, click on “Export” and the .csv file will be downloaded to your Downloads folder.
Printable-Google-Contacts-Export
Printable-Google-Contacts-Select-Contacts
After downloading GoogleTel you will have to extract it to your desired location as it will be in .zip format. Once extracted, you will see two main files: GoogleTel.css and GoogleTel.exe. GoogleTel.css contains formatting options such as font style, size and margins, etc., but you will have to edit them manually, so be careful. GoogleTel.exe will be used for converting the .csv file.
Printable-Google-Contacts-GoogleTel
To convert, the .csv file must be located inside the GoogleTel folder which you just extracted. Copy the Google contacts .csv file and paste it into the GoogleTel folder just like in the image below.
Printable-Google-Contacts-.csv-file
Once the file is copied, launch the “GoogleTel.exe” file, and an .html file will be immediately created in the same folder.
Printable-Google-Contacts-.html-file
All you need to do is open the new .html file, and your default browser will open all your contacts in a new tab. The contacts will be arranged in numerical order by name, phone number and email address (if available) with a complete white background perfect for printing.
Printable-Google-Contacts-GoogleTel-Contacts
Right-click anywhere in the window and select “Print” from the context menu (or directly press “Ctrl + P”). You will see the options to make your print perfect, such as change layout, paper size, margins and quality, etc. Just click on the “Print” option below when you are done customizing to print the Google contacts.
Printable-Google-Contacts-Print
Printable-Google-Contacts-Print-options
Tip: You cannot edit the .html file when it is opened in the browser. If you need to make any edits before printing, right-click on the .html file and select “Edit” from the context menu. Your contacts will load in your default editor, such asMicrosoft Word.
GoogleTel is a great little application that should come in very handy if you need to manage your Google contacts. The default options work fine, and you should have no problem using the software. You can check out the official GoogleTel website for more details or comment below if you need any clarification.

Saturday 5 March 2016

How to Steal Secret Encryption Keys from Android and iOS SmartPhones


encryption-keys-android
Unlike desktops, your mobile devices carry all sorts of information from your personal emails to your sensitive financial details. And due to this, the hackers have shifted their interest to the mobile platform.

Every week new exploits are discovered for iOS and Android platform, most of the times separately, but the recently discovered exploit targets both Android as well as iOS devices.

A team of security researchers from Tel Aviv University, Technion and The University of Adelaide has devised an attack to steal cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other highly sensitive services from Android and iOS devices.

The team is the same group of researchers who had experimented a number of different hacks to extract data from computers. Last month, the team demonstrated how to steal sensitive data from a target air-gapped computer located in another room.

Past years, the team also demonstrated how to extract secret decryption keys from computers using just a radio receiver and a piece of pita bread, and how to extract the cryptographic key just by solely touching the chassis of the computer.

Side-Channel Attacks


According to the researchers, the recent exploit is a non-invasive Side-Channel Attack: Attack that extracts the secret crypto key from a system by analyzing the pattern of memory utilization or the electromagnetic outputs of the device that are emitted during the decryption process.

The exploit works against the Elliptic Curve Digital Signature Algorithm (ECDSA), a standard digital signature algorithm that is most widely used in many applications like Bitcoin wallets and Apple Pay and is faster than several other cryptosystems.

How to Steal Secret Encryption Keys?

how-to-hack-android-story
During the experimental hack, the researchers placed a $2 magnetic probe near an iPhone 4 when the phone was performing cryptographic operations.

While performing cryptographic operations, the security researchers measured enough electromagnetic emanations and were able to fully extract the secret key used to authenticate the end user's sensitive data and financial transactions.

The same hack can be performed using an improvised USB adapter connected to the phone's USB cable, and a USB sound card to capture the signal.
"Using such measurements, we were able to fully extract secret signing keys from OpenSSL and CoreBitcoin running on iOS devices," the researchers wrote in a blog post published Wednesday. "We also showed partial key leakage from OpenSSL running on Android and from iOS's CommonCrypto."
The researchers also experimented their exploit on a Sony-Ericsson Xperia X10 Phone running Android and said they believe such an attack is feasible.

The security researchers also cited a recent independent research by a separate team of security researchers that discovered a similar Side-Channel flaw in Android's version of the BouncyCastle crypto library, making the device vulnerable to intrusive electromagnetic key extraction attacks.

Currently, the hack requires an attacker to have physical control of, or, at least, a probe or cable in proximity to, a vulnerable mobile device as long as it performed enough tasks to measure a few thousand of ECDSA signatures.

Affected Devices


Older iOS versions 7.1.2 through 8.3 are vulnerable to the side-channel attack. The current iOS 9.x version includes defenses against side-channel attacks, so are unaffected.

However, nothing can save iPhone and iPad users even running current iOS versions if they are using vulnerable apps. One such vulnerable iOS app is CoreBitcoin that is used to protect Bitcoin wallets on iPhones and iPads.

Developers of CoreBitcoin told the security researchers that they are planning to replace their current crypto library with one that is not susceptible to the key extraction attack. Meanwhile, the recent version of Bitcoin Core is not vulnerable.

Both OpenSSL versions 1.0.x and 1.1.x are vulnerable except when compiled for x86-64 processors with the non-default option enabled or when running a special option available for ARM CPUs.

The team has already reported the vulnerability to the maintainers of OpenSSL, who said that hardware side-channel attacks are not a part of their threat model
- See more at: http://thehackernews.com/2016/03/encryption-keys-android.html?m=1#sthash.MkYd8vvz.dpuf

What Is SSD And How SSDs Work — All You Need To Know About SSDs

Short Bytes: SSD (Solid State Drive) is the new talk of the town and its popularity is escalating every day. It would be interesting to know what is SSD, what is inside these non-mechanical storage devices, how SSDs work, and what’s the difference between SSD and HDD.

Modern-age SSDs are a great option over the traditional rotating hard drives that have been used as the primary means of storage since the last 50-60 years. The magnetic tape based storage option have found themselves short-handed when it comes to matching speed with that of a computer processor, they still lag behind when it comes to offering reduced latency while accessing the data.
On the other hand, SSD (Solid State Drive) has made a considerable attempt to compete with the latency offered by processors, yet they fall behind, but they are an advantage over the circular rotating disks. The conventional HDDs are rotating magnetic disks used to store data like OS files, movies, music, games, etc. They are a cheap option but their biggest disadvantage is that they’re slow.
Talking about their origin, their ancestors have been there since the time when we used to work on vacuum tube-based computers. Charged Capacitor Read-Only Storage (CCROS) and Magnetic Core Memory were two similar technologies in the 1950s.

What is SSD?

An SSD (solid-state drive or solid-state disk) is a nonvolatile storage device that stores persistent data on solid-state flash memory.

What is Inside SSD?

SSD (solid state drives) is an integrated circuit under the hood which is used to store data. Their electronic interface is compatible with the block input/output interface used by HDD. You can just swap your old hard drive with a new SSD in a matter of a few minutes, provided, you are skilled enough to successfully open your computer hardware. And with no moving parts, they are way faster and strong enough to take shocks. They won’t mind even if you are careless enough to drop them from your table.

Memory:

Early versions of SSDs were based on DRAM volatile memory which furnished faster access and low latency but the only problem was that the data couldn’t be retained in the memory in the absence of power supply. It was in 2009 when SSDs based on NAND flash non-volatile memory were introduced which propelled their widespread adoption. Although, they are slower than the ones based on DRAM but they can still outrun conventional HDDs. And the biggest advantage is that the data remains intact even if you cut off the power supply.
NAND memory is made up of floating gate transistor cells which retain their charge states in the absence of power supply. Floating gate contains the electrons and the charged state is represented by binary bit 0 and discharged state by 1. Binary bit 0 represents data is stored in the NAND flash. The cells are arranged in a grid fashion and the grid is known as a block. An individual row in a block is called Page with sizes 2K, 4K, 8K, or 16K. Each block contains 128-256 pages, so the approximate size of the block varies between 256KB to 4MB.
NAND Flash is either Single Level Cell (SLC) which stores only one binary bit in one floating gate transistor and Multi-Level Cell (MLC) which stores two bits. Clearly, the latter one has more storage capacity but it comes at a price, they wear out faster. MLC type NAND flash memories are cheaper than SLC and are used in industry grade solid state drives (after making some modifications) which require more storage capacity but it degrades more quickly.

Controller:

It’s responsible for how data gets stored in a flash memory. It is designed for various requirements and could be loosely clubbed into two groups, one for low duty-cycle environments like flash drives, SD cards, camera, etc. in which constant read/write operations are not required. The other environment is high duty-cycle which requires constant read/write operations to be performed on the memory, like Solid State Drives.
Flash Controller acts as the middle man between the storage media and the computer. It is an embedded processor that is responsible for the performance of an SSD. Each time a computer wants to access the flash memory to perform a read/write operation, the flash controller comes into action.
The controller also manages the flash memory cells. Efficient handling of the storage cells is must as SSDs support a limited number of read/write cycles, about 10 thousand, and it would be wise enough to deploy something which makes sure that all the cells used equally in order to preserve the lifespan of the flash media, otherwise, some cells will become inoperable and some will be left unused throughout the lifetime of the SSD. Manufacturers use a technique known as wear-leveling to make sure that the degradation of the flash memory happens uniformly over time by programming the controller to utilize all the cells efficiently.
Another task the controller is assigned is known as Garbage Collection. In this process, when the write operation has been performed on every memory block for one time, the controller checks the initial blocks for the pages that will be required by the computer. It then copies those pages to a new block and leaves the existing block (known as a Stale block) to be erased and filled with new data.
The controller manages other important operations like introducing error-correcting code (ECC) which is the bit sequence of data stored and helps in data recovery in case it gets corrupted. Controller also maps bad sectors in the flash memory which are caused due damage occurred to the SSD. These can be logical bad sectors which can be repaired or physical bad sectors which represent permanently damaged parts of the flash memory and cannot be repaired. Controller uses the ECC to perform Memory Scrubbing operation which involves scan and repair of corrupt data in different locations of the memory.

Cache:

A small amount of DRAM volatile memory is used as a cache to store wear leveling data and to maintain a block placement directory. It improves the performance of the SSD but at the same time it increases the power consumption.

How SSDs work?

Image: WikipediaIf we talk at the basic level, inside a solid state drive, transistors are in a sequential fashion. Initially, all the transistors are set to value 1 (not charged). When saving operation begins, the current starts flowing through the chain of transistors and the value for some transistors becomes 0 as data is saved in them. In the grid, each intersection of the rows and columns is called cell which comprises of two transistors, one as the control gate and the other one as floating gate. The current flows into the floating gate and the electrons flow into the control gate. So, a net positive charge is created which interrupts a current flow. Similarly, we can have a unique pattern of 1s and 0s by applying precise voltage values.

Difference between SSD and HDD:

Advantage of SSD over HDD:

Fast Booting Time: Solid State Drives can tap their back over the speediness they offer when there is a need for  lightning fast OS boot-up. A typical consumer-grade SSD can boot your Windows OS in almost half the time it takes for spinning disk.
Quick Read/Write: Around 500 megabytes per second for an average SSD in comparison to 150 megabytes per second by a hard drive. SSDs can be beneficial to you if you’re a graphic designer who uses heavy video editing software or some hard-core gamer on a spy mission.
Low power consumption: These flash storage devices are designed to use less in comparison to their traditional alternatives. So, your laptop’s battery will last longer and you’ll be able to save some cash on your electricity bill.
Reduced noise pollution: Rotating hard drives are known to make sounds which are sometimes annoying when you are in the middle of something that requires a lot of concentration power. SSDs can make a great difference on that note, you won’t even notice these silence loving drives in action.
Shape and Size: Their integrated circuit can be fitted in a compact casing, but they’re designed to fit in the pants of the conventional HDDs. They can be installed right out of the box in the same slot where your old hard drive sits.

Disadvantages of SSD over HDD:

Pocket burning price: Over the years, there has been a drop in the price of SSDs, but still, their magnetic disk grandpas are way cheaper. The most probable reason is that they’re not much popular like the hard drives and the technology needs to become more mature. Maybe in the coming years, we could see NAND flash replaced by some other memory type providing more affordable solid state drives in the market.
Data loss due to power-cut: Although, they’re more reliable than their spinning counterparts. Their sensitive nature is reflected when there is a power cut. Aborted write operations and even complete loss of data may be observed in the case of power interruption.
Limited life span: The biggest disadvantage of having an SSD is that it loses its writing abilities over time. This is because it is not possible to change a single bit value in an SSD. For that purpose, a large block of data needs to be erased and rewritten. When an erase cycle is performed for a cell, some charge is left in it. This charge increases the resistance of the cell and eventually, no current is able to pass through it. Thus, it becomes of no use.
I told you about wear leveling technique which is implemented to address this issue. But that’s not a full-proof solution, it only slows down the degradation process by making the SSD wear out evenly. It involves complex algorithms which are difficult to test exhaustively and may lead to the loss of data caused due to firmware bugs. One important thing to be noted is that this problem doesn’t affect the reading abilities of the SSD as no charge value is altered during a read operation.
One game-changing approach used by the manufacturers is a hybrid drive which is based on a method known as SSD Caching, not to be confused with cache memory inside SSD. In this, frequently used data and applications are copied to the SSD which acts as the cache memory. The HDD acts as the main storage device which keeps all the data. So, we have a lightning fast storage media along with gigs of space to store our music, movies, and games.
These non-mechanical drives may have the advantage of speediness over the spinning hard drives but the old horses are still cheaper these modern sports cars. New technologies like HAMR (Heat Assisted Magnetic Recording) are being developed for hard drives which will help them in retaining their throne in the market. Hard Drives have done a tremendous job in revolutionizing the computing world. With the pace of time and increased demand for high-speed storage media, SSDs pose themselves a potential candidate for the future of storage. Recently, Samsung has launched PM1633a 15TB SSD which could be seen as the initial steps to the bright future of these solid state media.