Posts

Showing posts from December, 2016

Learn Programming For Free | Best Learning Resources

Image
Learn Programming For Free | Best Learning Resources Short Bytes:  Many universities have free educational offerings in a variety of disciplines. This can make it exceedingly easy to obtain a slightly more formal education in many fields than simply reading odds and ends online. Here are some universities and their websites where you can take full advantage of their generosity. T here are always some inherent difficulties to studying without the benefit of a mentor or formal teacher. It often boils down to the fact that you don’t know what you don’t know. That is to say, you are unaware of the materials that you should learn in order to progress in your study. Many websites to aim to help with this, but without a curriculum, it can be fairly difficult to make your way from point  A  to point  B , and even with a curriculum to follow, you still might have to hunt down some good examples and tutorials on the different components of that curriculum. Not very many people are aware

How to Keep Your WhatsApp Data Safe With Google Drive and Encryption

Image
How to Keep Your WhatsApp Data Safe With Google Drive and Encryption Short Bytes:  To keep your WhatsApp data safe and encrypted,   WhatsApp has partnered with Google Drive. Take a look to know how to enable this lifesaver feature. L osing all the precious WhatsApp pictures and videos is something that a good friend of mine faced recently. There are some simple ways to  recover data from your external SD-card , but getting the same from your smartphone’s internal memory is a tough job. Now, WhatsApp has brought a lifesaver functionality in its instant messaging app by joining hands with Google to keep your WhatsApp data safe. Now, losing your WhatsApp pictures, chats, videos and videos are a thing of past due to the newly-introduced integration of Google Drive with WhatsApp. On its blog, Google announced a new partnership, that will let you create a private Google Drive backup of your chat history, voice messages, photos, and videos for the Android WhatsApp app. As

How To Use WhatsApp As A Search Engine And Wikipedia By Activating WhatsApp Bot

Image
How To Use WhatsApp As A Search Engine And Wikipedia By Activating WhatsApp Bot Short Bytes:  In this article, I’m going to tell you how to use WhatsApp as a search engine by activating a WhatsApp bot. WhatsApp is one the most popular instant messaging apps and this feature could be used to get important information in the form of Wikipedia excerpts, news, dictionary etc. It should be noted the team that developed this bot is not associated with official WhatsApp in any manner. F acebook-owned WhatsApp instant messaging application is being used by millions of people to stay in touch and use it as multimedia and group messaging platform. Facebook bought this platform and capture a vast userbase that uses WhatsApp daily to communicate with friends and family. From time-to-time, we come across multiple WhatsApp tricks that promise to bring additional functionalities to this popular app. Today, we are going to tell you about a WhatsApp bot created to bring search engine-like

New Bug In Apple iPad Allows Hackers To Bypass the Activation Lock Screen

New Bug In Apple iPad Allows Hackers To Bypass the Activation Lock Screen Security researchers have discovered a flaw in both the  iOS 10.1  and  10.1.1  update for  Apple iPads , which allows hackers to bypass the activation lock screen feature in  iOS . Hemanth Joseph, a security researcher in India who bought an unlocked iPad Air from eBay but found the device locked. He detailed the entire process of how he bypassed the lock feature in his  blog . Apple released the iOS 10.1.1 update that seemed to have remove the flaw Joseph discovered. However, researchers from Vulnerability Lab, tested an iPad following the update and found a buffer overflow exploit along with some iPad-specific bugs can be used to bypass the activation lock in iOS 10.1.1. If exploited by potential hackers, the user’s iCloud drive on the iOS device can be accessed along with personal data, documents, saved passwords and more. The exploit doesn’t works on iPhones running iOS 10.1.1. As of now, Ap

Beware! Your Credit/Debit Card Can Be Hacked In Just 6 Seconds

Image
Beware! Your Credit/Debit Card Can Be Hacked In Just 6 Seconds Card number, expiry date, CVV2, address -- everything is guessable Short Bytes:  A new attack mechanism, called Distributed Guessing Attack, can steal your credit and debit card details in as few as six seconds. This assault exploits two basic security flaws in the online payment systems–unlimited guesses on payment pages and variation in the payment data fields. T oday, different kinds of cards have become the de facto means of online payments. This has also resulted in an increase in the number of online frauds taking place every month. The current situation, automatically, presents before us the question — what security methods are being taken to ensure a safe cashless transaction? The researchers from the University of Newcastle have carried out a research and  published their results  in the IEEE Security & Privacy Journal. The study shows how an attack mechanism, called Distributed Guessing Attack,

OSS-Fuzz An Open Source Fuzzing Service By Google

Image
OSS-Fuzz An Open Source Fuzzing Service By Google It’s just been a couple of months since Microsoft announced its Project Springfield code fuzzing service and now Google has launched the beta version of its own OSS-Fuzz. The purpose of both of these is to help developers to locate the bugs in their code which might eventually lead to breaches. Even though the purpose of both of these organisations works for the same cause, one is a paid service while the other is free; one is proprietary while the other is open source. Google has described the OSS-Fuzz as ‘continuous fuzzing for open source software’. According to the development team in Google’s Testing  Blog , “OSS-Fuzz’s goal, is to make common software infrastructure more secure and stable by combining modern fuzzing techniques with scalable distributed execution. OSS-Fuzz combines various fuzzing engines (initially, libFuzzer) with Sanitizers (initially,  AddressSanitizer ) and provides a massively distributed execution

Here is How Hackers Perform a SQL Injection Attack

Here is How Hackers Perform a SQL Injection Attack A “SQL injection” (SQLI) attack is an exploit that takes advantage of poor web development techniques and, typically combined with, faulty database security. The result of a successful attack can range from impersonating a user account to a complete compromise of the respective database or server. Unlike a DDoS attack, an SQLI attack is completely and easily preventable if a web application is appropriately programmed. Executing the attack Whenever you login to a web site and enter your user name and password, in order to test your credentials the web application may run a query like the following: SELECT UserID FROM Users WHERE UserName='myuser' AND Password='mypass'; Note: string values in a SQL query must be enclosed in single quotes which is why they appear around the user entered values. So the combination of the entered user name (myuser) and password (mypass) must match an entry in the User

Social Engineering Attacks: This Hacker Shows How To Destroy Someone’s Online Life In Minutes

Image
Social Engineering Attacks: This Hacker Shows How To Destroy Someone’s Online Life In Minutes S ocial engineering – Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer. Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software.  For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak). Here we are going to show some steps and video, how hackers are performi

10 Most Dangerous Linux Commands – You Should Never Run On Linux Os

Image
10 Most Dangerous Linux Commands – You Should Never Run On Linux Os Linux terminal is one of the most powerful tools in the Linux OS world. You can do anything with Linux terminal, whatever you want. Linux command lines are more interesting, useful and productive features. But it may be very dangerous, especially when you don’t know what you are doing. Even a small mistake can lead to lose your data and operating system too. A new Linux user should be very careful while executing the commands. We just want to make you aware of some of the commands which you should think before execute them. Here are the 10 most Deadly Linux command which you should know before execute them. 1. rm –rf The rm –rf command is one of the fastest way to erase your entire files and even entire content. This command leads to a lot of loss. rm: rm commands in Linux are used to erase/delete files. rm –r: this command used to delete the folder recursively and empty the folder. rm –f: this comma

How To Download YouTube Videos Without Any External Tools?

Image
How To Download YouTube Videos Without Any External Tools? YouTube is the one of the most popular video platform in the world. According to Wikipedia, YouTube has monthly 800 million visitors. More than 4 billion videos are viewed each day. Downloading the YouTube videos are very common in these days. But YouTube doesn’t provide any default option to download YouTube videos directly. There are many sites, extensions, Software and tricks for downloading the YouTube Videos. How To Download YouTube Videos Without Any External Tools? Method 1: Step 1:  Open the Developers tools in the browser and go to “Network.” If you are using Mozilla Firefox then use combine with “Ctrl+Shift+Q.” Step 2:  Now, click on “Media” in the “Network tool,” here you will see the HTTP requests made to media files, like audio and video files. Step 3:  Open any YouTube Video in browser, which you want to download. You will see the requests made by the YouTube Page to be audio &video files