Friday 29 June 2018

Xiaomi reveals schedule for MIUI 10 Global Beta ROM Update.


Shortly on the heels of the MIUI 10 China Alpha release for a few devices, Xiaomi has shared its rollout schedule for the upcoming MIUI 10 Global Beta ROM. This is an update to MIUI, and not necessarily to the base Android version (as can be seen with the Xiaomi Redmi Note 5 Pro that was updated to Android 8.0 recently with MIUI 9.5). The rollout schedule is a rough timeline for the devices, and the release dates for the specific device will be adjusted depending on internal testing and feedback, if needed.

Supported Devices

The first batch of devices will receive MIUI 10 Global Public Beta ROM in early July 2018. The following devices are included in this batch:

Xiaomi Mi 6
Xiaomi Mi 5
Xiaomi Mi MIX 2
Xiaomi Mi MIX 2S
Xiaomi Mi MIX
Xiaomi Redmi S2
Xiaomi Redmi Note 5 Pro
Xiaomi Redmi Note 5
Xiaomi Mi Note 2
The following devices are included in the second batch, and will receive the ROM in late July 2018:

Xiaomi Redmi Note 4X, Xiaomi Redmi Note 4 (Qualcomm)
Xiaomi Redmi Note 5A
Xiaomi Redmi Note 5A Prime
Xiaomi Mi 5s
Xiaomi Mi 5s Plus
Xiaomi Mi Max 2
Xiaomi Mi Max
Xiaomi Mi Max Prime
Xiaomi Redmi 5
Xiaomi Redmi 5A
Xiaomi Redmi 5 Plus
Xiaomi Redmi 4A
Xiaomi Redmi 4X

The following devices are included in the third batch, and are expected to receive the Public Beta ROM in early August 2018:

Xiaomi Mi 3/Mi 4
Xiaomi Redmi Note 3 Qualcomm
Xiaomi Redmi 3S/3X

Changelog

The changelog for MIUI 10 Global Beta ROM 8.6.28 has been provided as below:

Fix – Settings keeps stopping (All devices) (06-26)
Fix – Phone enters Recovery mode when charging (All devices) (06-26)
Fix – Cleaner content doesn’t translate to Russian in the file manager (06-26)

Installation

To install the upcoming MIUI 10 Global Public Beta ROM, you would need an unlocked bootloader on your device. If you are using MIUI 9 Global Beta ROM, you can simply go to the “Updater” and check for updates. This is a rather unusual scenario as a lot of the devices mentioned above have stable releases of MIUI 9, so users are less likely to stay on an older Beta release.

If you are using the stable ROM for MIUI 7, MIUI 8 or MIUI 9; you would need to update to MIUI 10 using the fastboot method with Mi Flash. Xiaomi has provided detailed instructions that are generally applicable to all of its devices, though it would be a good to consult both our forums as well as the MIUI forums to check if there any device-specific nuances.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

How to Crack FTP Server using Metasploit.

File Transfer Protocol (FTP) is the commonly used protocol for exchanging files over the Internet. FTP uses the Internet's TCP/IP protocols to enable data transfer. FTP uses a client-server architecture, often secured with SSL/TLS. FTP promotes sharing of files via remote computers with reliable and efficient data transfer.
    The two default ports that are used in FTP are port 20 and port 21.
Now the question arrises, What is Metasploit...
     Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules and also as a penetration testing system.

Now i am going to show you how to crack FTP Server using metasploit framework in my Youtube Channel BREAK THE SECURITY


 So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Tuesday 26 June 2018

Features you must Know about upcoming WiFi security Protocol: WPA3


Now a days internet is used by most of the people, so using internet through WiFi has become common . Now the question matter is it secure using the WiFi connection. People basically use WPA2-PSK and WPA  security protocols. The problem with this type of protocols is that they are more vulnerable to hackers. The data which is transmitted with these type of protocols are not encrypted so not secured.
  Suppose i give you a situation you are using a public WiFi network in a restaurant or a cafe and hundred other people are also using it involving some hackers who have wrong intention of stealing your data so. Imagine you are opening a website suppose facebook.com  and the hackers are in the same WiFi network in which you are using . So they can host a fake webpage of  facebook.com  and as you enter your email-id and password both id and password will be send to the hackers.
     But after coming this WPA3 WiFi security protocol this problem is not arrises as all the data which travel in a WiFi network are remain encrypted.
     And also this WPA3 protocol saves you from brute force / dictionary attacks.  as WPA3 gives a features that when some unkown users entered your password incorrect more than 3 times his device will get blocked.

    So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Nokia 7 Plus, Nokia 6.1 and Nokia 8 will get Face Unlock in an Upcoming Update.


While it’s great to see that Nokia has further plans for the already released devices, it does make you wonder in what manner will the functionality be implemented. We could see a modified version of the face unlock feature already found in Smart Unlock, or it could be an entirely in-house developed method by HMD Global themselves. There is no information as to whether we will see other Nokia devices receive face unlocking officially at a later date. Whether face unlocking is secure or not is another debate to be had, but it’s certainly a feature of convenience to many users rather than one used for tight security.

The use of the phrase “in the coming months” means that we could actually see it bundled with Android P as well, as we already know that all of HMD Global and Nokia’s phones will receive the upgrade to Android P. This would then be released alongside a slew of brand new features that comes with the update too, including gestures and a revamped UI. The Nokia 7 Plus has been supported especially well, receiving a beta update to Android P Beta 2, which you can install on your own device if you wish.

While the companies have certainly been shrouded in controversy, one thing is for sure. Their devices have been excellently supported (mostly) and they deserve credit for that. We’ll be watching and waiting to see if the Nokia 7 Plus, Nokia 6.1, and the Nokia 8 get face unlock any time in the near future.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Monday 25 June 2018

Redmi 6 Pro Launched:Price and Specification


Xiaomi Redmi 6 Pro, the successor to the popular Redmi Note 5 Pro, was launched in China late on Sunday evening. Xiaomi is touting the Redmi 6 Pro's 5.84-inch 19:9 display, dual rear cameras, an octa-core Snapdragon 625 SoC, a 4000mAh battery, a dedicated microSD card slot, as well as AI face unlock, beautification, portrait, and voice assistant features. The Redmi 6 Pro also bears a iPhone X-style notch in its display, a first in the Redmi series from the company, but the rest of the styling is similar to the Redmi Note 5 Pro. Alongside its latest budget smartphone, Xiaomi also launched the Mi Pad 4 tablet.

Redmi 6 Pro price, release date

The Xiaomi Redmi 6 Pro price starts at CNY 999 (roughly Rs. 10,400) for the 3GB RAM, 32GB storage variant, CNY 1,199 (roughly Rs. 12,500) for the 4GB RAM, 32GB storage variant, and CNY 1,299 (roughly Rs. 13,600) for the 4GB, 64GB variant. Sales start at 10am CST on Tuesday, June 26, with registration for the first flash sale open now. It will be available in Black, Blue, Gold, Pink, and Red colour variants. There's no word yet on Redmi 6 pro price in India or its release date in the country.

Xiaomi Redmi 6 Pro specifications

The dual-SIM (Nano) Xiaomi Redmi 6 Pro runs on Android-based MIUI 9, and a 5.84-inch full-HD+ (1080x2280 pixels) display with a 84-percent NTSC colour gamut. It is powered by an octa-core Snapdragon 625 SoC clocked up to 2GHz, coupled with the Adreno 506 GPU, and 3GB or 4GB of RAM.

The Redmi 6 Pro sports a dual rear camera setup, with a 12-megapixel primary sensor featuring 1.25-micron pixels, an f/2.2 aperture, PDAF, LED flash, apart from the 5-megapixel secondary sensor. It sports a 5-megapixel front camera, with AI Portrait mode and HDR.

There are 32GB and 64GB inbuilt storage variants of the Redmi 6 Pro, expandable via microSD card (up to 256GB) with a dedicated slot. Connectivity options on the Redmi 6 Pro include 4G VoLTE, Wi-Fi 802.11 a/b/g/n (dual-band 2.4GHz, 5GHz), Bluetooth v4.2, GPS/ A-GPS, Micro-USB, and a 3.5mm headphone jack. It measures 149.33x71.68x8.75mm, and weighs 178 grams. The Redmi 6 Pro sports a 4000mAh battery. Sensors on board include an accelerometer, ambient light sensor, digital compass, gyroscope, infrared, and a proximity sensor.

o thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Xiaomi Mi Pad 4 With 8-Inch Full-HD Display, Snapdragon 660 SoC Launched: Price, Specifications


Xiaomi Mi Pad 4 was launched in China on Sunday evening. The tablet was launched alongside Xiaomi's latest budget smartphone, the Redmi 6 Pro. The Mi Pad 4 has been launched in both Wi-Fi only and Wi-Fi + LTE display variants. It sports an 8-inch 16:10 display with the USP of being able to be used with a single-hand. The company is also touting AI Face Unlock, apart from the Snapdragon 660 SoC onboard being able to power a 'smart game acceleration' feature.

Xiaomi Mi Pad 4 price, release date

The Xiaomi Mi Pad 4 price starts at CNY 1,099 (roughly Rs. 11.500) for the 3GB RAM/ 32GB inbuilt storage Wi-Fi version, CNY 1,399 (roughly Rs. 14,600) for the 4GB RAM/ 64GB inbuilt storage Wi-Fi version, and CNY 1,499 (roughly Rs. 15,600) for the 4GB RAM/ 64GB inbuilt storage Wi-Fi + LTE version. It will be available in Black and Gold colour variants. Reservations for the first sale on Friday, June 29 are now open.

Xiaomi Mi Pad 4 specifications

The Xiaomi Mi Pad runs Android-based MIUI 9. It bears an 8-inch full-HD (1920x1200 pixels) display with 16:10 aspect ratio and pixel density of 283ppi. It is powered by an octa-core Qualcomm Snapdragon 660 SoC clocked up to 2.2GHz, coupled with either 3GB or 4GB of RAM.

The tablet has a 13-megapixel rear camera with an f/2.0 aperture and support for HDR. On the front, the tablet has a 5-megapixel camera, also with an f/2.0 aperture. As we mentioned, the company is also touting the AI Face Unlock feature. The Mi Pad 4 features either 32GB or 64GB of inbuilt storage, neither of which is expandable via microSD card.

Connectivity options on the Xiaomi Mi Pad 4 include 4G LTE (single Nano-SIM), Wi-Fi 802.11 a/b/g/n/ac (dual-band, 2.45GHz and 5GHz), Bluetooth v5.0, 3.5mm headphone jack, and USB Type-C. GPS and A-GPS options are only available on the LTE variant. Sensors on the Wi-Fi only model include accelerometer, ambient light sensor, and a gyroscope. The LTE variant has a digital compass in addition. It is powered by a 6000mAh battery, measures 200.2x120.3x7.9mm, and weighs 342.5 grams.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday 12 June 2018

Why People are getting scared of using Artificial Intelligence.?


When people see machines that respond like humans, or computers that perform feats of strategy and cognition mimicking human ingenuity, they sometimes joke about a future in which humanity will need to accept robot overlords.

But buried in the joke is a seed of unease. Science-fiction writing and popular movies, from "2001: A Space Odyssey" (1968) to "Avengers: Age of Ultron" (2015), have speculated about artificial intelligence (AI) that exceeds the expectations of its creators and escapes their control, eventually outcompeting and enslaving humans or targeting them for extinction.

Conflict between humans and AI is front and center in AMC's sci-fi series "Humans," which returned for its third season on Tuesday (June 5). In the new episodes, conscious synthetic humans face hostile people who treat them with suspicion, fear and hatred. Violence roils as Synths find themselves fighting for not only basic rights but their very survival, against those who view them as less than human and as a dangerous threat.

Even in the real world, not everyone is ready to welcome AI with open arms. In recent years, as computer scientists have pushed the boundaries of what AI can accomplish, leading figures in technology and science have warned about the looming dangers that artificial intelligence may pose to humanity, even suggesting that AI capabilities could doom the human race.

But why are people so unnerved by the idea of AI?


An "existential threat"

Elon Musk is one of the prominent voices that has raised red flags about AI. In July 2017, Musk told attendees at a meeting of the National Governors Association, "I have exposure to the very cutting-edge AI, and I think people should be really concerned about it."

"I keep sounding the alarm bell," Musk added. "But until people see robots going down the street killing people, they don't know how to react, because it seems so ethereal."

Earlier, in 2014, Musk had labeled AI "our biggest existential threat," and in August 2017, he declared that humanity faced a greater risk from AI than from North Korea.

Physicist Stephen Hawking, who died March 14, also expressed concerns about malevolent AI, telling the BBC in 2014 that "the development of full artificial intelligence could spell the end of the human race."

It's also less than reassuring that some programmers — particularly those with MIT Media Lab in Cambridge, Massachusetts — seem determined to prove that AI can be terrifying.

A neural network called "Nightmare Machine," introduced by MIT computer scientists in 2016, transformed ordinary photos into ghoulish, unsettling hellscapes. An AI that the MIT group dubbed "Shelley" composed scary stories, trained on 140,000 tales of horror that Reddit users posted in the forum r/nosleep.

"We are interested in how AI induces emotions — fear, in this particular case," Manuel Cebrian, a research manager at MIT Media Lab, previously told Live Science in an email about Shelley's scary stories.

Fear and loathing

Negative feelings about AI can generally be divided into two categories: the idea that AI will become conscious and seek to destroy us, and the notion that immoral people will use AI for evil purposes, Kilian Weinberger, an associate professor in the Department of Computer Science at Cornell University, told Live Science. [Artificial Intelligence: Friendly or Frightening?]

"One thing that people are afraid of, is that if super-intelligent AI — more intelligent than us — becomes conscious, it could treat us like lower beings, like we treat monkeys," he said. "That would certainly be undesirable."

However, fears that AI will develop awareness and overthrow humanity are grounded in misconceptions of what AI is, Weinberger noted. AI operates under very specific limitations defined by the algorithms that dictate its behavior. Some types of problems map well to AI's skill sets, making certain tasks relatively easy for AI to complete. "But most things do not map to that, and they're not applicable," he said.

This means that, while AI might be capable of impressive feats within carefully delineated boundaries — playing a master-level chess game or rapidly identifying objects in images, for example — that's where its abilities end.

"AI reaching consciousness — there has been absolutely no progress in research in that area," Weinberger said. "I don't think that's anywhere in our near future."

The other worrisome idea — that an unscrupulous human would harness AI for harmful reasons — is, unfortunately, far more likely, Weinberger added. Pretty much any type of machine or tool can be used for either good or bad purposes, depending on the user's intent, and the prospect of weapons harnessing artificial intelligence is certainly frightening and would benefit from strict government regulation, Weinberger said.

Perhaps, if people could put aside their fears of hostile AI, they would be more open to recognizing its benefits, Weinberger suggested. Enhanced image-recognition algorithms, for example, could help dermatologists identify moles that are potentially cancerous, while self-driving cars could one day reduce the number of deaths from auto accidents, many of which are caused by human error, he told Live Science.

But in the "Humans" world of self-aware Synths, fears of conscious AI spark violent confrontations between Synths and people, and the struggle between humans and AI will likely continue to unspool and escalate — during the current season, at least.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

What is Encryption ?



Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient.

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

Three Concepts to Understand in Encryption 

Private and Public Keys

One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you. A private key also lets you place unforgeable digital signatures on messages you send to other people. A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you. Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.
Security Certificates

Another extremely valuable concept to understand is a security certificate. The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names—(like www.google.com, www.amazon.com, or ssd.eff.org). Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website. It is also common to see an error because of a bureaucratic mistake in the system of certificates. But occasionally, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection.

Unfortunately, it is extremely difficult to tell the difference between these cases. This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

Key Fingerprints

The word "fingerprint" means lots of different things in the field of computer security. One use of the term is a "key fingerprint," a string of characters like "342e 2309 bd20 0912 ff10 6c63 2192 1928" that should allow you to uniquely and securely check that someone on the Internet is using the right private key. If you check that someone's key fingerprint is correct, that gives you a higher degree of certainty that it's really them. But it's not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday 6 June 2018

Tips on how can you avoid Phishing Attacks .


On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing.

A phishing attack usually comes in the form of a message meant to convince you to:

    click on a link;
    open a document;
    install software on your device; or
    enter your username and password into a website that’s made to look legitimate.

Phishing attacks can trick you into giving up your passwords or trick you into installing malware on your device. Attackers can use malware to remotely control your device, steal information, or spy on you.

This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them.

Types of Phishing Attacks :-

Phishing for Passwords (aka Credential Harvesting)

Phishers can trick you into giving them your passwords by sending you a deceptive link. Web addresses in a message may appear to have one destination, but lead to another. On your computer, you can usually see the destination URL by hovering over the link. But links can be further disguised with lookalike letters, or by using domain names that are one letter off from legitimate domain names and may direct you to a webpage that appears to go to a service that you use, such as Gmail or Dropbox. These fake replica login screens often look so legitimate that it’s tempting to type your username and password. If you do, you will send your login credentials to the attackers.

So before typing any passwords, look at the address bar of your web browser. It will show the real domain name of the page. If it doesn't match the site you think you’re logging into, don't continue! Remember that seeing a corporate logo on the page doesn't confirm it's real. Anybody can copy a logo or design onto their own page to try and trick you.


Remember, it's easy to forge emails so that they display a false return address. This means that checking the apparent email address of the sender isn't enough to confirm that an email was really sent by the person it appears to be from.

Spearphishing

Most phishing attacks cast a wide net. An attacker might send emails to hundreds or thousands of people claiming to have an exciting video, important document, or billing dispute.

But sometimes phishing attacks are targeted based on something the attacker already knows about an individual. This is called “spearphishing.” Imagine you receive an email from your Uncle Boris that says it contains pictures of his kids. Since Boris actually has kids and it looks like it is from his address, you open it. When you open the email, there is a PDF document attached to it. When you open the PDF, it may even display pictures of Boris’ kids, but it also quietly installs malware on your device that can be used to spy on you. Uncle Boris didn't send that email, but someone who knows you have an Uncle Boris (and that he has children) did. The PDF document that you clicked on started up your PDF reader, but took advantage of a bug in that software to run its own code. In addition to showing you a PDF, it also downloaded malware onto your computer. That malware could retrieve your contacts and record what your device's camera and microphone sees and hears.

The best way to protect yourself from phishing attacks is to never click on any links or open any attachments. But this advice is unrealistic for most people. Below are some practical ways to defend against phishing.

How to Help Defend Against A Phishing Attack 

Keep your software updated

Phishing attacks that use malware often rely on software bugs in order to get the malware onto your machine. Usually once a bug becomes known, a software manufacturer will release an update to fix it. This means that older software has more publicly-known bugs that could be used to help install malware. Keeping your software up to date reduces malware risks.

Use a password manager with auto-fill
Password managers that auto-fill passwords keep track of which sites those passwords belong to. While it’s easy for a human to be tricked by fake login pages, password managers are not tricked in the same way. If you use a password manager (including the built-in password manager in your browser), and it refuses to auto-fill a password, you should hesitate and double check the site you’re on. Better yet, use randomly generated passwords so that you are forced to rely on auto-fill, and less likely to type your password into a fake login page.

Verify Emails with Senders
One way to determine if an email is a phishing attack is to check via a different channel with the person who supposedly sent it. If the email was purportedly sent from your bank, don’t click on links in the email. Instead, call your bank or open your browser and type in the URL of your bank's website. Likewise, if your Uncle Boris sends you an email attachment, call him on the phone and ask if he sent you pictures of his kids before opening it.

Open Suspicious Documents in Google Drive
Some people expect to receive attachments from unknown persons. For example, journalists commonly receive documents from sources. But it can be difficult to verify that a Word document, Excel spreadsheet, or PDF file isn't malicious.

In these cases, don't double-click the downloaded file. Instead, upload it to Google Drive or another online document reader. This will turn the document into an image or HTML, which almost certainly will prevent it from installing malware on your device. If you're comfortable with learning new software and willing to spend time setting up a new environment for reading mail or foreign documents, there are dedicated operating systems designed to limit the effect of malware. TAILS is a Linux-based operating system that deletes itself after you use it. Qubes is another Linux-based system that carefully separates applications so that they cannot interfere with each other, limiting the effect of any malware. Both are designed to work on laptop or desktop computers.

You can also submit untrusted links and files to VirusTotal, an online service that checks files and links against several different antivirus engines and reports the results. This isn't foolproof—antivirus often fails to detect new malware or targeted attacks—but it is better than nothing.

Be Careful of Emailed Instructions
Some phishing emails claim to be from a computer support department or technology company and ask you to reply with your passwords, or to allow a “computer repair person” remote access to your computer, or to disable some security feature on your device. The email might give a purported explanation of why this is necessary, by claiming, for example, that your email box is full or that your computer has been hacked. Unfortunately, obeying these fraudulent instructions can be bad for your security. Be especially careful before giving anyone technical data or following technical instructions unless you can be absolutely certain that the request's source is genuine.
If you are at all suspicious of an email or link someone has sent you, don’t open or click on it until you’ve mitigated the situation with the above tips and can be confident it’s not malicious.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday 5 June 2018

How to protect your device from Hackers.


Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure.

2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompts you to install software, don’t agree. And if your web browser or a search engine warns you a site may be malicious, hit the back button.

3. USB or Thunderbolt connector: Attackers can copy over a malicious program or otherwise take over your machine by plugging in a USB or Thunderbolt connector. The same goes for CDs and DVDs. Sometimes they will contain a program (autorun.exe) that runs automatically so your computer will be infected immediately if you insert the disc. So be careful what you put in or attach to your computer, and if you want it to stay secure, don't give strangers access to your device.

Remember, modern computers are designed to fend off these malware attacks. As long as we keep building them as such, you’ll have a chance to fight back against being 0wned. Find tips for detecting attacks on your computer in our guide on malware.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/