Posts

Showing posts from January, 2018

What are the latest emerging technology trends? Are there new ways that help technology interface more sustainably with living systems?

Image
Here goes the list of few emerging technology trends : 1. Internet Of Things and Nano sensors :- Growing technology doesn’t need plummeting gadgets instead requires the higher tech gadgets which can be easily occupied with IOT or some of the nano sensors in gadgets.With the use of IOT around 30 billion of connected devices can be comprised by 2020. So definitely it’s one of the emerging tech in the mere future which gives the vast support in many of the streams. 2 .Grid scale energy storage:-  It includes new battery technologies such as sodium ion and zinc - air which are more efficient and affordable .It will make large scale power storage possible and facilitate the use of renewable energy. (It may makes your smartphone to stand longer too :p) 3.Block Chain :-  I personally feel that this is most secured way to protect all the details of electronic transaction. On a brief version its a large database where E-transactions are securely recorded and verified. It is wide

What is artificial intelligence and why do we need it?

Image
Artificial Intelligence  or  AI   is intelligence displayed by machines that can be incorporated in a physical machine, such as a robot, or in virtual machine, such as a program. Interest in AI boomed in the first decade of the 21st century and is beginning to reshape our world. AI-powered tools now help scale the efforts of sales teams by gathering useful patterns from data, finding successful courses of action, and addressing customer needs.Despite some researchers’ consideration that AI is a threat to humanity, a large number of people believe that AI may positively change the picture of the world and ease our life routine. Turing test   is one of the influential and widely criticized tests that checks a machine’s intelligence. The concept of the test is to ask two participants a series of questions, trying to determine which one is the human and which one is the machine. If, by the end of the test, it’s still unclear who is who, then the computer passed the test and was abl

What exactly is Internet of Things (IoT)?

Image
(IoT) is an ecosystem of connected physical objects that are accessible through the internet. The ‘thing’ in IoT could be a person with a heart monitor or an automobile with built-in-sensors, i.e. objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention. Simply put, this is the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cell phones, coffee makers, washing machines, headphones, lamps,  wearable devices  and almost anything else you can think of.

How do I secure my WiFi?

Image
You want to make sure that firmware is up-to-date. Especially in light of recent exploits, it’s crucial that the software that runs your wireless router or AP is up-to-date. Should you not be able to get up-to-date firmware due to the age of the device, purchase a newer wireless router or AP. You're imited to the use of pre-shared key security in consumer grade wireless. What you can do is make sure that you use a complex passphrase of sufficient length. Utilize WPA2 AES encryption. You can also utilize what is known as MAC address filtering. This ensures that only known devices are allowed onto the network, so that even if an attacker knew your password, the unknown device would not be allowed to connect. Do you want to secure your WiFi connection to a hotspot?  Use a VPN server; especially in a publicly accessible hotspot. Do you want to secure your own hotspot? Change your router’s default login and password immediately. Update your firmware and keep it updated.

Does Tor browser make us truly anonymous?

Image
I have already posted about DEEP WEB.  click here . Now i'm here to give you the detailed information about  TOR BROWSER. Tor  is a network designed to provide anonymity services. The  Tor Browser Bundle  (TBB) is a software bundle that contains a Tor client, a graphical interface, and a web browser that has been configured to use Tor for all traffic. Anonymity  is a "negative property," meaning that it is defined by the absence of some other property. Anonymity is the opposite of  identity . Tor provides network anonymity by hiding certain elements that can identify a user or network node: Network (IP) address TCP/IP stack quirks There are obviously lots of other pieces of information that can identify a person using the Internet. Some of these are hidden by the Tor Browser Bundle: Browser quirks (all TBB requests resemble each other) Web browsing history (revealed by some other browsers) Non-web IP traffic (TBB restricts this as much as possible, and direc

What is the best way to start learning ethical hacking and cyber security from beginning?

Image
The best way to start learning this, is to start right from basics. And for these specific fields, you need to have basics of Networking and related concepts as well as basics of all possible programing languages and technologies. Just, get hands-on first with networking and then you can move on to the next step as it could be like certifications on ethical hacking or security analysis. Penetration testing is also a part of this field as it can be learned after successful completion of ethical hacking, etc. Once you are done with ethical hacking, all you will need to have is to be getting hands-on with day to day technologies and this will enhance more skill and capabilities to your career. As soon as you will pursue certification or course for ethical hacking, you will have basic idea about number of different phases of ethical hacking and then you can move forward with each phase with your comfort. However, it is always better to think twice before joining any course that offers e

What is malware?

Image
The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of doing harm to data, devices or to people. If you are concerned about malware on a website you can use the free  Google malware checker tool  online. When you hear talk of viruses, Trojans, spyware and the like, what you're really hearing is talk of different kinds of malware. We all know the popular image of the rebel hacker, testing his skills and wits against whatever system he's decided to make his challenge. But today, "black hat” software developers often sell their skills to the highest bidder. These can be criminal organizations looking for tools to operate in the digital world, or government intelligence agencies looking to access the data locked away in the computers, networks and mobile devices of their targets. Programs supplied officially by companies can be considered malware if they secretly act again

How can you protect your smartphone from being hacked?

Image
According to my experience with individuals, the following measures can reduce the attack surfaces on mobile devices dramatically. All Mobile Devices: Ensure you’re using the latest mobile operating system version to avoid exposure to known operating system vulnerabilities that were already patched. Enable automatic updates to your apps to avoid exposure to known app security vulnerabilities that were already patched. Use pin-code or app-lock service for restricting unauthorized access to your device and sensitive apps. Avoid connecting to unknown WiFi networks. If you do connect, make sure you’re using a VPN app which encrypts your traffic. This will enable you to avoid Man-in-the-Middle (MitM) Attacks which can compromise your authentication tokens, such as access to gmail account and can also lead to malicious code execution. Turn off low power connectivity communication interfaces when you’re not using them – Bluetooth, NFC, etc. In a similar manner t

Which programming languages are best for cyber security?

Image
Obviously knowledge of programming languages is an added advantage in cyber security domain. As it helps you understand the application's working in a better way and eventually in hacking/cracking the application. If we talk about which programming languages are best for cyber security, I would suggest you to learn  JavaScript  and  Python . JavaScript  will help you in understanding: DOM based XSS(Cross site scripting) Finding and Modifying Elements Stealing cookies Manipulating Event handlers to perform malicious actions Form manipulation You can learn  JavaScript  at the following portal:  Javascript for Pentesters Python  on the other hand, will help you in writing scripts to automate tasks and tools to enhance your arsenal. You can learn Python at the following portal:  Python for Pentesters For a computer science engineering student, the starting point can be: - Knowledge of web applications, front-end languages, frameworks such as HTML/CSS, Php will co

What is the deep web?

Image
I see a lot of people tossing these terms around lately: dark web, deep web, shadow web, etc. To clarify, the "deep web" refers to sites that aren't indexed by major search engines (particularly Google).  Nevertheless, they aren't necessarily illegal. The "dark web," by comparison, generally refers to purposely hidden sites built on top of darknets (computer networks with restricted access that require special software or configurations). Likely, the most popular example of a darknet would be the Tor (" T he  O nion  R outer") network, which directs internet traffic through a worldwide system of volunteers.  Sites hosted on Tor have a .onion URL, and can  generally  only be accessed with the Tor browser bundle.  Some of them also have clearnet (a.k.a. surface web) addresses, so a site could technically be on both the dark web and clearnet at the same time. The above is one example of what's referred to as a "darknet market,

What is Bitcoin and how does it work? Is it legal? Who's behind it?

Image
What is Bitcoin? Bitcoin is the first global, decentralized currency that allows you to send money from one person to another without involving a third party broker, such as a bank. You only need your computer to make transactions because Bitcoin is fundamentally software. As a decentralized currency, Bitcoin isn’t controlled by anyone. It’s open so that anyone can benefit from it. You might think that the lack of control could mean chaos, but that’s not true at all. That’s because Blockchain, the technology behind Bitcoin is one of the most accurate and secure systems ever created. How Does Bitcoin Work? A blockchain is a ledger that keeps records of digital transactions. Instead of having a central administrator, like a bank or the government, blockchain organizes data in batches ( What is a blockchain, and why is it growing in popularity? ) called blocks. These data batches use cryptographic validation to link themselves together. In other words, each block

15 Facts you (probably) didn't know about the birth of the internet

Image
The Internet has greatly become an axiom in our daily lives, but that wasn’t the case some 25 years ago when we lived without the Internet. It would be interesting to glimpse a quick look at the birth of the whole-nine-yards of World Wide Web, which all invented by a British Knight! 1.Sir Tim Berners-Lee (AKA TimBL) made the first successful client/server communication using HTTP around mid-November 1989 while working on a proposal for an information management system. 2.The Hypertext Transfer Protocol, best known as HTTP, was initiated by Tim Berners-Lee at CERN in 1989. 3.Tim Berners-Lee wrote the first ever website (still available here:  http://bit.ly/ the1stpage ). 4.The first web browser and editor (named WorldWideWeb, and later Nexus), was invented by Tim Berners-Lee in during the second half of 1990 and was used to view the first website. 5.info.cern.ch was the address of the world’s first-ever website and web server, running on a NeXT computer at CERN. 6.The