Posts

Showing posts from January, 2018

What is SEO ( Search Engine Optimization) ....?

Image
Now a days using the internet is comman now a days. If you want to search for specific location or  thing instead of asking to someone you would prefer to search it on the Internet means on some websites . So what role does SEO i.e  Search Engine Optimization  plays for a websites ...?          So, SEO stands for SEARCH ENGINE OPTIMIZATION . SEO is all about optimizing your website for search engines.SEO is a techniques which makes your websites friendly to a search engines, means if user search something on which your website is related your website should come on top 5-10 results. So before making your website search engine friendly you should know How does a Search engine works..? How Search Engine Works..?  A Search Engine has to perform several types of activities for selecting a write website for his top results :- Crawling :-   Crawling is a process of fetching all the linked webpages to a website. This ...

What is Oauth Authentication. Is it safe..?

Image
Now a days Internet is very comman in our day to day life . We even cannot think our life a second without Internet. Our life is surrounded by many websites and mobile applications . Some time you guys have seen some websites in which you have to login but you don't have account on that particular website so either you have to create that account by clicking Register or Signup button which takes longer process as after clicking you have to enter many details like your Name, Email, Mobile no. etc. and after that sometimes the sites will give you the verification code or link to click on it to verify.              But its a long process you must have also seen an option of Login with Facebook or Google or with you Twitter account this , other way of logging into the websites with actually registering it is know as OAUTH AUTHENTICATION.  Is OAUTH AUTHENTICATION safe..? Now the question arises is it safe to Login with...

What are Trojan Horses. How to take Precautions with it.

Image
Now a days it has become a trend of your mobile phones , computers are getting infected of some viruses, malwares, worms, or Trojan Horses you must have listen about it. Some people think that Trojans, viruses, malwares, worms are all same things. But its wrong then all are different.If you want to know the difference between them then click on the link below. Different types of viruses and malwares. History of Trojan  The term Trojans are taken since the Ancient time as when Geeks were going on War in the Troy City the used to escape the soldiers in the horse and at night when the people or we can say the soldiers of opponent team sleep at night as they think horse as a comman object the gates of the horses are opened and the Geek soldiers start fighting. Similary, some attacks also happening now a days in our mobile phones and computers. What is Trojan Horse.. ? Trojan Horse is a malicious computer program that can infect you computer in several ways :- ...

Everything you must know about JARVIS Operating System

Image
A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them. Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis. With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project. Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions. As for users in the IT Securi...

Qubes OS. A Security Oriented Operating System.

Image
What is Qubes OS ? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it. Why Security of an Operating System is Important.?  Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of mal...

Encrypt Files Using TrueCrypt

Image
Introduction If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that information so that you can access it, and absolutely no one else except those you trust. Therefore, it makes sense to set up a system which protects your information and safeguards it against prying eyes. The best such system for this is called “True Crypt”. “True Crypt” is an encryption software program which allows you to store many files and directories inside of a single file on your harddrive. Further, this file is encrypted and no one can actually see what you have saved there unless they know your password. This sounds extremely high tech, but it is actually very easy to set up. Setting up Truecrypt Quote 1. Go to http://www.truecrypt.org/downloads (or go to www.truecrypt.org, and click on “Downloads”) 2. Under “Latest Stable Version”, under “Windows 7/Vista/XP/2000?, click “Download”...

Proxy Server. How does it works.?

Image
A proxy server is a function that is used to obtain Web pages by other computers. It acts as a go-between from a computer to a target server. There is no communication between the computer and the server. Rather, the computer requests a Web page or a file housed on the target server. This request goes to the proxy server Go, which, in turn, sends the request to the server. The proxy server then obtains the file and sends it to the requesting computer.       An example would be if you use your computer to request a Web page on the internet. The server requests the data and other files for you from the target server. When you type in a Web address, the request is sent to a proxy server. The server then sends the request to the target server that houses that particular website. Then the target server sends the Web page to the proxy server, which in turn, sends it to you. The target server sees the proxy server as the visitor, not you. These servers improve ...

Top 5 Linux WiFi Hacking Tools

Image
In this Top 5 Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking because WiFi signals can be picked up everywhere and by anyone. Also a lot of routers contain vulnerabilities which can be easily exploited with the right equipment and software such as the tools included with Kali Linux. A lot of router manufacturers and ISPs still turn on WPS by default on their routers which makes wireless security and penetration testing even more important. With the following Top 5 Wifi Hacking Tools you are able to test our own wireless networks for potential security issues. For most tools we’ve supplied a link to a tutorial which will help you get started with the tools. Let’s start off the Top 5 Wifi Hacking Tools with the first tool: 1 Aircrack-ng Aircrack is one of the most popular tools...

Setting Up Your Own Virtual Private Network

Image
VPN i.e  Virtual Private Ne twork   is  a network that helps you to creates a virtual tunnel between your computer and a server to exchange data. It is private because it is supposed to require a username and a password to be accessed and it is a network because it links more devices to one or more servers all over different locations. A VPN helps you surf the web anonymously for two reasons: the websites you visit, see the VPN server’s ip, not yours. VPN basically encrypts all the traffic before ISP (internet service provider) can intercept it. There are free versions and paid ones. But still the VPN provider can read your traffic. So you have to trust someone one way or another. What if you could set up your own VPN instead ? It would be totally free and totally (really ?) secure.  There are many ways to setup a private virtual private network . Some softwares are also available that provide you to create your own network some of them are mentione...

How does WannaCry, Petya and Other Ransomware spread so fast.

Image
For thousands of people, the first time they heard of “ransomware” was as they were turned away from hospitals in May 2017. The WannaCry outbreak had shut down computers in more than 80 NHS organisations in England alone, resulting in almost 20,000 cancelled appointments, 600 GP surgeries having to return to pen and paper, and five hospitals simply diverting ambulances, unable to handle any more emergency cases. But the outbreak wasn’t the birth of ransomware, a type of computer crime which sees computers or data hijacked and a fee demanded to give them back to their owners. Some of the earliest ransomware claimed to be a warning from the FBI demanding a “fine”, simply tricking users into paying up, or blackmailing them with accusations of trafficking in child abuse imagery. Their tactics didn’t work for long. Bank transfers were easily tracked, cash payments were difficult to pull off, and if any variant got successful, people would trade tips on how to defeat it rather ...

Top 10 Hottest Artificial Intelligence technologies till yet.

Image
Now in today's fast growing technologies where people want more outcome in less duration of time Artificial Intelligence is playing an important role. Now today I am going to tell you about some high tech advance technologies till yet in Artificial Intelligence. Natural Language Generation : Producing text from computer data. Currently used in customer service, report generation, and summarizing business intelligence insights. Sample vendors: Attivio, Automated Insights, Cambridge Semantics, Digital Reasoning, Lucidworks, Narrative Science, SAS, Yseop. Speech Recognition : Transcribe and transform human speech into format useful for computer applications. Currently used in interactive voice response systems and mobile applications. Sample vendors: NICE, Nuance Communications, OpenText, Verint Systems. Virtual Agents : “The current darling of the media,” says Forrester (I believe they refer to my evolving relationships with Alexa), from simple chatbots to advanced sys...