Thursday, 27 December 2018

Problems that may come while implementing IOT || techtalksgroup ||

In the coming century, the biggest threat to us will not be the wars between the countries or states. The biggest threat or the war that we should be concerned about is the cyber war. It is a direct threat to our privacy, our private conversations, moments, pictures-everything that sums up our life. Technology has always been a double-edged sword. With all the benefits and advantages, follows unknown and unprecedented threats. For us to...

Monday, 10 December 2018

Alibaba's Voice Asistant is smarter than Google's Voice Asistant. Check it out !! || techtalksgroup ||

In May, Google made quite the splash when it unveiled Duplex, its eerily humanlike voice assistant capable of making restaurant reservations and salon appointments. It seemed to mark a new milestone in speech generation and natural-language understanding, and it pulled back the curtain on what the future of human-AI interaction might look like.                 But while Google slowly rolls out the feature...

Face Detection V/S Facial Recognition. Check it out !! || techtalksgroup ||

What is Face Detection? The definition of face detection refers to computer technology that is able to identify the presence of people’s faces within digital images. In order to work, face detection applications use machine learning and formulas known as algorithms to detecting human faces within larger images. These larger images might contain numerous objects that aren’t faces such as landscapes, buildings and other parts of humans (e.g....

Saturday, 24 November 2018

What are Chatbots and how does a chatbots work..?? || techtalksgroup ||

A chatbot is an artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.  A chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question...

Wednesday, 7 November 2018

Top Programming Languages that can be used for implementing Image Recognition || techtalksgroup ||

Image recognition is one of the features that is deployed in most modern devices and programs. The feature has a wide range of applications, the most common one being in security systems. It enables devices to recognize the identity of a person or object just by its image. Face recognition is a product of image recognition. Best Programming Language For Image Recognition 1. Matlab                  ...

Tuesday, 30 October 2018

TOR Enabled Sim Card will keep your communication Anonymous

Although technology has overall made life easier, it has made things a lot less private. As a result, you need to be extra careful when you are browsing online, as it very difficult to maintain privacy out there. It is even possible that your ISP or VPN provider is maintaining a log of everything that you do online. So, how do we protect our online privacy? Brass Horns Communications, a UK-based non-profit internet service provider that focuses...

Thursday, 18 October 2018

Had you ever imagined of a Cell-Phone without a Battery. Check it Out..!! || techtalksgroup ||

Some years before the basic requirement of any person is simply Food, Cloths, and Shelter but today one more thing is added to this queue at that is Cell-phones . Cell-Phones had become the basic requirements of today user . No work is remained now a days that cannot be performed using a smartphones. Bu the biggest problem that comes with smartphone user is to charge the phone, but suppose a lifestyle where you have to just use the smartphone...

Thursday, 27 September 2018

What are Rootkits..?? || techtalksgroup ||

What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse...

Monday, 24 September 2018

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute...

Monday, 17 September 2018

Chrome vs Chromium . || techtalksgroup ||

Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project....

Saturday, 15 September 2018

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter.Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)  Web Application Attack: (NEW) Wordpress  |...

Thursday, 13 September 2018

Top 5 Kali Linux Tools Every Hacker Should Know All About |techtalksgroup|

Top Kali Linux Tools:-Now let’s get started with the list of my favorite tools and a lot of other hackers favorite tools too. 1. Metasploit:- Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in...