Posts

Showing posts from February, 2018

'Flick' New Unit Of time invented by Facebook

Image
We don't have the time to dig into all the different ways someone could measure time. Generally, we structure our lives around years, months, days, hours ... you know, the big ones. The easy ones. But time measurements can get as nitty gritty as you need them to. In Facebook's case, the company needed a unit of time that just wasn't there. So they invented an entirely new one.           Allow us to introduce you to the "flick," the new unit of time developed by a Facebook engineer. Chances are, you won't be measuring how long you've been on the treadmill or how long to cook your turkey in flicks. But for a select group, the new unit could become quite helpful. Initially created by Christopher Horvath in late 2016 and launched by Facebook Open Source in January 2018 , the flick is equal to precisely one 705,600,000th of a second. It's just a tad longer than a nanosecond, but still shorter than a microsecond. Finally , right? Like we said, u...

One Character message can even Crash an iPhone. Must Read.!

Image
Only a single character can crash your iPhone and block access to the Messaging app in iOS as well as popular apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. First  spotted.  by Italian Blog Mobile World, a potentially new severe bug affects not only iPhones but also a wide range of Apple devices, including iPads, Macs and even Watch OS devices running the latest versions of their operating software. Like previous 'text bomb' bug, the new flaw can easily be exploited by anyone, requiring users to send only a single character from Telugu—a native Indian language spoken by about 70 million people in the country. Once the recipient receives a simple message containing the symbol or typed that symbol into the text editor, the character immediately instigates crashes on iPhones, iPads, Macs, Apple Watches and Apple TVs running Apple's iOS Springboard. Apps that receive the text bomb tries to load the character, but fails and refuses to function pro...

Zero Day Vulnerability in Telegram

Image
A zero-day vulnerability has been discovered in the desktop version for end-to-end encrypted Telegram messaging app that was being exploited in the wild in order to spread malware that mines cryptocurrencies such as Monero and ZCash. The Telegram vulnerability was uncovered by security researcher Alexey Firsh from Kaspersky Lab last October and affects only the Windows client of Telegram messaging software. The flaw has actively been exploited in the wild since at least March 2017 by attackers who tricked victims into downloading malicious software onto their PCs that used their CPU power to mine cryptocurrencies or serve as a backdoor for attackers to remotely control the affected machine, according to a blogpost on Securelist. Here's How Telegram Vulnerability Works The vulnerability resides in the way Telegram Windows client handles the RLO (right-to-left override) Unicode character (U+202E), which is used for coding languages that are written from right...

What are Proxy Servers and Types of Proxy Servers..?

Image
Proxy servers are servers that takes the request from normal machines and IP's and forward there request of the page that are requested by normal machine to the Internet and when the internet sends gives response the page that is requested by the proxy server that response is send back to the normal machines and IP's . there are varieties and types of Proxy Servers some of them are as follows:-      Transparent Proxy – This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This ...

How Google Search Works..?

Image
Now a days Internet has become a comman term among people and in it Google is one of the most widely used searched engine. So now some people What really a Search Engine is..?  So Search Engine is basically a program or tools by which we are able to search anything on the Internet. There are many types of search engines available like... Google search, Yahoo Search, Bing, Duck Duck Go etc.. in them the Google is mostly used.            So now the question arises How Does a Google Search  Works..? When you search anything on Google let us suppose you typed ' techtalksgroup '.        Basically it works in many stages, the first stage includes of    Crawling . Crawling is a method of fetching a web page that contains the keyword that you types to search. For example i told you that if i search techtalksgroup on google it will find everywhere on the web where the word techtalksgroup ...

Do you really rid of your 'Activities' while just clearing your Internet history and Cookies.?

Image
Now a days most of the people use Internet and perform some critical activities thinking of that after deleting their history or clearing their Browsing  data they will not get caught.              But that's not True. Some people use to say that After i am dead please delete my Browsers history. Sounds funny .. But yes it is funny . Most of the people are unaware that after deleting their browsers history and cookies their data is still traveling on the Internet . But how..?       Let me give you an example . Suppose you create your Profile on Facebook or search something on Google after creating profile you delete you account and after searching something on Google just delete your Internet history and cache and cookies but the data is only deleted from your side ..!!           Yes that's true .. the data you deleted is just deleted from your side and your data which is kept safely o...