Friday, 29 June 2018

Xiaomi reveals schedule for MIUI 10 Global Beta ROM Update.

Shortly on the heels of the MIUI 10 China Alpha release for a few devices, Xiaomi has shared its rollout schedule for the upcoming MIUI 10 Global Beta ROM. This is an update to MIUI, and not necessarily to the base Android version (as can be seen with the Xiaomi Redmi Note 5 Pro that was updated to Android 8.0 recently with MIUI 9.5). The rollout schedule is a rough timeline for the devices, and the release dates for the specific device will...

How to Crack FTP Server using Metasploit.

File Transfer Protocol (FTP) is the commonly used protocol for exchanging files over the Internet. FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP uses a client-server architecture, often secured with SSL/TLS. FTP promotes sharing of files via remote computers with reliable and efficient data transfer.     The two default ports that are used in FTP are port 20 and port 21. Now the question arrises, What is Metasploit...      Metasploit Framework, the Metasploit Project's best-known creation, is a...

Tuesday, 26 June 2018

Features you must Know about upcoming WiFi security Protocol: WPA3

Now a days internet is used by most of the people, so using internet through WiFi has become common . Now the question matter is it secure using the WiFi connection. People basically use WPA2-PSK and WPA  security protocols. The problem with this type of protocols is that they are more vulnerable to hackers. The data which is transmitted with these type of protocols are not encrypted so not secured.   Suppose i give you a situation...

Nokia 7 Plus, Nokia 6.1 and Nokia 8 will get Face Unlock in an Upcoming Update.

While it’s great to see that Nokia has further plans for the already released devices, it does make you wonder in what manner will the functionality be implemented. We could see a modified version of the face unlock feature already found in Smart Unlock, or it could be an entirely in-house developed method by HMD Global themselves. There is no information as to whether we will see other Nokia devices receive face unlocking officially at a later...

Monday, 25 June 2018

Redmi 6 Pro Launched:Price and Specification

Xiaomi Redmi 6 Pro, the successor to the popular Redmi Note 5 Pro, was launched in China late on Sunday evening. Xiaomi is touting the Redmi 6 Pro's 5.84-inch 19:9 display, dual rear cameras, an octa-core Snapdragon 625 SoC, a 4000mAh battery, a dedicated microSD card slot, as well as AI face unlock, beautification, portrait, and voice assistant features. The Redmi 6 Pro also bears a iPhone X-style notch in its display, a first in the Redmi series...

Xiaomi Mi Pad 4 With 8-Inch Full-HD Display, Snapdragon 660 SoC Launched: Price, Specifications

Xiaomi Mi Pad 4 was launched in China on Sunday evening. The tablet was launched alongside Xiaomi's latest budget smartphone, the Redmi 6 Pro. The Mi Pad 4 has been launched in both Wi-Fi only and Wi-Fi + LTE display variants. It sports an 8-inch 16:10 display with the USP of being able to be used with a single-hand. The company is also touting AI Face Unlock, apart from the Snapdragon 660 SoC onboard being able to power a 'smart game acceleration'...

Tuesday, 12 June 2018

Why People are getting scared of using Artificial Intelligence.?

When people see machines that respond like humans, or computers that perform feats of strategy and cognition mimicking human ingenuity, they sometimes joke about a future in which humanity will need to accept robot overlords. But buried in the joke is a seed of unease. Science-fiction writing and popular movies, from "2001: A Space Odyssey" (1968) to "Avengers: Age of Ultron" (2015), have speculated about artificial intelligence (AI) that exceeds...

What is Encryption ?

Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient. Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for...

Wednesday, 6 June 2018

Tips on how can you avoid Phishing Attacks .

On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing. A phishing attack usually comes in the form of a message meant to convince you to:     click on a link;     open a document;    ...

Tuesday, 5 June 2018

How to protect your device from Hackers.

Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself. 1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears...