Posts

Showing posts from 2018

Face Detection V/S Facial Recognition. Check it out !! || techtalksgroup ||

Image
What is Face Detection? The definition of face detection refers to computer technology that is able to identify the presence of people’s faces within digital images. In order to work, face detection applications use machine learning and formulas known as algorithms to detecting human faces within larger images. These larger images might contain numerous objects that aren’t faces such as landscapes, buildings and other parts of humans (e.g. legs, shoulders and arms). Face detection is a broader term than face recognition. Face detection just means that a system is able to identify that there is a human face present in an image or video. Face detection has several applications, only one of which is facial recognition. Face detection can also be used to auto focus cameras. And it can be used to count how many people have entered a particular area. It can even be used for marketing purposes. For example, advertisements can be displayed the moment a face is recognized. Face reco...

What are Chatbots and how does a chatbots work..?? || techtalksgroup ||

Image
A chatbot is an artificial intelligence (AI) software that can simulate a conversation (or a chat) with a user in natural language through messaging applications, websites, mobile apps or through the telephone.  A chatbot is often described as one of the most advanced and promising expressions of interaction between humans and machines. However, from a technological point of view, a chatbot only represents the natural evolution of a Question Answering system leveraging Natural Language Processing (NLP). The ability to identify the user’s intent and extract data and relevant entities contained in the user’s request is the first condition and the most relevant step at the core of a chatbot: If you are not able to correctly understand the user’s request, you won’t be able to provide the correct answer. Returning the response: once the user’s intent has been identified, the chatbot must provide the most appropriate response for the user’s request. The answer may be: ...

Top Programming Languages that can be used for implementing Image Recognition || techtalksgroup ||

Image
Image recognition is one of the features that is deployed in most modern devices and programs. The feature has a wide range of applications, the most common one being in security systems. It enables devices to recognize the identity of a person or object just by its image. Face recognition is a product of image recognition. Best Programming Language For Image Recognition 1. Matlab                                             Matlab is an independent programming language that has its own framework and IDE which come in a more robust workspace. The programming language comes with a broad range of tools that you can use to handle more technical programming tasks with ease. Image recognition and face processing are some of the tasks that can be handled by Matlab. Matlab offers an array of built-in tools for matrix calculation. It is imperative to note that image recogni...

TOR Enabled Sim Card will keep your communication Anonymous

Image
Although technology has overall made life easier, it has made things a lot less private. As a result, you need to be extra careful when you are browsing online, as it very difficult to maintain privacy out there. It is even possible that your ISP or VPN provider is maintaining a log of everything that you do online. So, how do we protect our online privacy? Brass Horns Communications, a UK-based non-profit internet service provider that focuses on privacy and anti-surveillance services, has an answer for this. The company is currently beta-testing a SIM card that will automatically route your data through Tor, thereby securing online privacy and evading surveillance. For those unaware, Tor (originally known as The Onion Router) is a free piece of software for enabling anonymous communication. Tor directs Internet traffic through a free, volunteer-operated network of computers around the world to hide a user’s location and usage from anyone conducting network surveillance or tr...

Had you ever imagined of a Cell-Phone without a Battery. Check it Out..!! || techtalksgroup ||

Image
Some years before the basic requirement of any person is simply Food, Cloths, and Shelter but today one more thing is added to this queue at that is Cell-phones . Cell-Phones had become the basic requirements of today user . No work is remained now a days that cannot be performed using a smartphones. Bu the biggest problem that comes with smartphone user is to charge the phone, but suppose a lifestyle where you have to just use the smartphone without getting worry about its battery. Phone manufacturers are constantly striving to create new products that can run longer on a single battery charge but a team of engineers at the University of Washington (UW) has gone the extra mile: They built a cell phone that doesn't need a battery at all. When radio waves interact with an antenna, the waves induce electricity to flow through the antenna. While radio waves carry energy and we're surrounded by transmitters generating these waves, this doesn't mean you could power yo...

What are Rootkits..?? || techtalksgroup ||

Image
What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. What Can a Rootkit Do? A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infecte...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

Image
GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse settings, show or hide file extensions, change font settings, rename the computer, and a lot more. The way GodMode works is actually very simple: just name an empty folder on your computer as outlined below, and then instantly, the folder will turn into a super-handy place to change all sorts of Windows settings. The steps for turning on God Mode is the exact same for Windows 10, Windows 8, and Windows 7: Make a new folder, anywhere you like. To do this, right-click or tap-and-hold on any empty space in any folder in Windows, and c...

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

Image
A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute malicious code on any vulnerable Windows computer. The Microsoft JET Database Engine, or simply JET (Joint Engine Technology), is a database engine integrated within several Microsoft products, including Microsoft Access and Visual Basic. According to the an advisory released by Zero Day Initiative (ZDI), the vulnerability is due to a problem with the management of indexes in the Jet database engine that, if exploited successfully, can cause an out-out-bounds memory write, leading to remote code execution. An attacker must convince ...

Chrome vs Chromium . || techtalksgroup ||

Image
Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project. Since it's open source, anyone is free to take and modify the source code as the please. However, only trusted members of the Chromium Project development community can actually contribute their own code. Regular users are able to download a frequently updated version of Chromium, all compiled and ready to use, from download-chromium.appspot.com . What is Chrome? Chrome is a proprietary web browser that is developed, maintained, and released by Google. Since it's proprietary, you are free to download and use it, but you...

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

Image
A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)   Web  Application Attack: (NEW) Wordpress  | WPScan  | WPScan Bruteforce  | Wordpress Plugin Vulnerability Checker  Features: // I will add more soon.  | WordPress Woocommerce - Directory Craversal  | Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting  | WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion  | WordPress Plugin Events Calendar - 'event_id' SQL Injection Auto SQL Injection Features: | Union Based  | (Error Output = False) Detection  | Tested on 100+ We...

Top 5 Kali Linux Tools Every Hacker Should Know All About |techtalksgroup|

Image
Top Kali Linux Tools:- Now let’s get started with the list of my favorite tools and a lot of other hackers favorite tools too. 1. Metasploit:- Metasploit is a framework for developing exploits, shellcodes, fuzzing tool, payloads etc. And it has a very vast collection of exploits and exploitation tools bundled into this single framework. It is available for all major Operating Sytems out there Windows, OS X, and Linux and comes pre-installed in Kali Linux. It is an offensive tool and to attack your own or your company’s infrastructure to check for security loopholes and to fix them before an actual attacker can break in. It can also be used to target web applications, networks, and servers etc. You get both GUI and command line interface. There are to products for Metasploit a Free Community version and a paid Metasploit Pro. 2. Nmap (Network Mapper):- Nmap is used to scan whole networks for open ports and for mapping networks and a lot more things. It is mainly used for sc...

Download The Free Kali Linux Book || tech talks group ||

Image
Whether you are new to infosec, or a seasoned security veteran, the free "Kali Linux Revealed" online course has something to teach you. the saying "You can't build a great building on a weak foundation" rings true in the information security field as well , and if you use (or want to learn to use) kali in a professional way, you should familiarise yourself as best as you can with the internals of the penetration testing distribution - and that's what this training is all about - turning you into a Kali Linux professional user. DOWNLOAD PDF -   https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf Learning how to master a kali gives you the freedom to create kali Linux  recipes like the Kali ISO of Doom, or the kali Evil Ap. you'll be able to build optimize and custom kali kernels, host them on your own repositories and create your own custom Kali Appliances - and there's so much more. After Reading This Book You Wil...

FREE AND UNLIMITED FAST SPEED WITH -VPN HUB |TechTalksGroup|

Image
VPN HUB - Free and unlimited fast speed on your mobile UNBLOCK the Internet and Browse Securely with VPN HUB for Android. Get it Free on the Google Play  Store.                                                    LINK                        https://www.vpnhub.com/ So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.  Facebook Page:-   https://www.facebook.com/theprogrammer.harshit/ Google Plus: -  https://plus.google.com/u/0/communiti…/117296242526461886479 Blog:-   https://www.techtalksgroup.blogspot.com Instagram:-   https://www.instagram.com/theprogrammer.har

Layers of OSI Model Explained .....|| tech talks group ||

Image
The Open Systems Interconnection (OSI) model defines a networking framework to implement protocols in layers, with control passed from one layer to the next. It is primarily used today as a teaching tool. It conceptually divides computer network architecture into 7 layers in a logical progression. The lower layers deal with electrical signals, chunks of binary data, and routing of these data across networks. Higher levels cover network requests and responses, representation of data, and network protocols as seen from a user's point of view. The OSI model was originally conceived as a standard architecture for building network systems and indeed, many popular network technologies today reflect the layered design of OSI. 1. Physical Layer  At Layer 1, the Physical layer of the OSI model is responsible for ultimate transmission of digital data bits from the Physical layer of the sending (source) device over network communications media to the Physical layer of the rece...