Tuesday 19 November 2019

Most Hackable Neaby Devices and Gadgets. || techtalksgroup ||

Electrical grids, traffic lights, highway signs, air-traffic control, and even hospital networks—they're the large-scale operating systems we rely on to make our lives easier and better. And believe it or not, they're all connected to the Internet.

These web-connected systems are so diverse in what they do, they fall into a very nondescript category called the "Internet of Things" (IoT). You might have heard of IoT. It's the same term thrown around to describe those cool gadgets that help us track our fitness, drive our cars, share our photos, stream our music, and check our email from almost anywhere. Chances are, no matter what you've done today, you've taken advantage of some device or system connected to the worldwide "web" of the Internet of Things.

However, despite IoT's promising future, it has one very serious setback: it's vulnerable to attack. As much as 70 percent of IoT devices contain security flaws, which means that billions of devices—including yours—could get hacked by online criminals. Here are the devices you own that might be at risk for a cyber attack, and how you can secure them.

Your PC
Every time you connect your PC to the Internet, it's a possible target. Click on a suspicious link from an email or social media message, and your computer could be taken over by malicious software. Cyber criminals could use that malware to download your personal files, steal your banking information, or even spy on you.

How To Protect Your PC: Keep your computer and antivirus software up-to-date. Avoid clicking on links sent by spammy email or social media messages, since they might contain malicious software.

Your Mac
If you're a Mac groupie, you might have been convinced by those smooth-talking reps at the Apple store that your Mac is pretty much invincible. Sure, Apple's built in operating system (called OS X) is very secure—possibly more secure than Microsoft's OS. However, Macs aren't 100% resistant to viruses; they just haven't (yet) been hit by large-scale attacks.

Since PCs have been part of the computing ecosystem for much longer than Macs, cyber crooks have had more time and incentive to exploit their enormous consumer base of individuals, big businesses, and government agencies. As Apple's consumer base continues to grow worldwide, don't be surprised if hackers start looking for ways to infiltrate your Mac.

How To Protect Your Mac: When Apple's operating system (OS X) gets a security bug, Apple typically updates it. Make sure you're running the most recent version of Apple's OS X.

Your Android
Google's Android system lets anyone create and upload an app; it's up to the user to decide whether to trust it. To infiltrate your Android device, hackers just have to create malware that seems legit. That's why, after 79% of Flappy Bird's clone apps were found to contain malware, the game was pulled from app stores last year. Flappy Bird's malicious clone apps allowed cyber criminals to remotely hijack users' phones to steal their contact list, track their location, make phone calls, and even record, send, and receive text messages.

How To Protect Your Android: When you download an app, it's up to you to understand what personal information you're letting the app access from your phone. Take a few minutes to read the app's permissions request. You might see some red flags that indicate it's a malicious app created to steal your phone's personal data.

Your iPhone
While Google leaves their apps open to developers, Apple's mobile iOS builds a "closed garden." That means all apps and accessories they offer in their store have to be approved by Apple.

While that definitely adds a safety net for iPhone and iPad users like you, it doesn't mean you're free from cyber threats. Last year, Apple released a software patch to fix security issues in the iOS 7, its most recent operating system at the time. The security lapse allowed would-be hackers to potentially impersonate a trusted website, without the software flagging the connection as insecure.

Another glitch last year allowed would-be hackers to potentially use website pages, emails, and text messages to trick users into downloading fake apps that could steal their personal information. According to a research study last year, Apple products could also be vulnerable to malware when they're connected to a malware-infected Windows device.

How To Protect Your iPhone or iPad: As with the Mac, make sure you're running the most recent version of Apple's mobile operating system (iOS) on your iPhone or iPad. Also, avoid clicking on any suspicious links or sharing sensitive data on a public Wifi network.

Your Cloud Accounts
Think of the "Cloud" as a storage facility in cyber space. So long as you have a Wifi connection and login information, you can access it from anywhere. But beware: the Cloud's convenience factor also makes it very appealing to hackers. If they find out your login credentials, your personal data is up for grabs.

How To Protect Your Cloud Storage Accounts: If you don't really need certain photos or personal files stored online, don't keep them in the Cloud. Store them on a hard drive instead. If you do use cloud-based software, set up a secure, unique password for each account.

Your Car
Almost 100% of new cars on the market have some type of wireless connection. That's great news if you want to use GPS, connect to Bluetooth, or stream movies to keep your kids quiet on road trips. It's terrifying news if you have any concerns over your security.

Most newer cars use computerized parts that run on the same network. If a hacker got remote access to that network, they could potentially take over the car's operating system. That means you could lose all control over your steering, acceleration, and brakes, even while you're still behind the wheel.

Luckily, the hackers who discovered these security flaws weren't criminals; they were actually funded by the Defense Department to expose automakers' dangerous security oversight. Besides, the hack is still pretty difficult for cyber crooks to pull off on a massive scale, since not all cars use the same operating language or run their parts on a single network. However, it's a scary enough scenario that legislators are asking automakers to step up their car security measures.

How To Protect Your Car: There's not much you can do here. If you're curious about your car's security risks, ask your dealer for more information.

Your At-Home Gadgets (And Home Router)
Think about how often you connect to the web, even when you're unwinding at home. You check email, upload photos, play video games, stream music, and watch movies from your SmartTV. You might even use a home automation system to control your thermostat, alarm system, security cameras, and front or garage doors. When you connect all your gadgets to your home Wifi, do you know how secure they are.

Most likely, they're not nearly as protected as you think. Many of the "smart" devices you use to protect your home have little to no built-in security. Plus, many home networks use passwords that are easily hacked into. Allow cyber crooks to access your home Wifi network, and you might as well hand over the keys to your home. These hackers can now potentially manipulate any devices connected to your home Wifi network.

How To Protect Your Home Gadgets: Secure your router. If you have a default password for your home Wifi network, change your network name and password. Only use apps and features on your smartphone that require a passcode to access them.

Shield Your Devices From Cyber Hackers
As cool as it sounds to have the latest wireless technology in your car, home, and at your fingertips, technology that falls under the umbrella of the "Internet of Things" is just too new and expansive to keep it 100% safeguarded from attack. These ground-breaking devices are developed to stay ahead of the curve, so they're put on the market before cyber security experts can even assess the extent of their security flaws.

In other words, IoT devices are the "gateway gadgets" for hackers to make their move. If you take the right preventive measures, you have a fighting chance to protect your most valuable (and hackable) devices from getting attacked.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.


Wednesday 2 October 2019

What are Red Rooms.? Do they really Exist in the Dark/Deep Web. ?


Red Rooms are basically one of the darkest places on the deep web. It basically charge money in bitcoins for viewing unimaginable videos like murders, rapes etc...

‘Red Room’ sites, the story goes, are darkweb sites where users pay thousands – or tens of thousands – to watch rapes and murders live. Urban legends about the existence of ‘Red Rooms’ have circulated for years – but as yet, there’s no evidence that they exist. If ‘Pay per View’ torture sites do exist, it’s almost certain that they don’t work via Tor (the software used to access dark web sites) – which is too slow to stream video live. The term ‘Red Room’ has been around on the internet for more than  decade – thought to originate either from ‘red rum’/’murder’, or from the 1983 horror film Videodrome, where torture is shown live on satellite TV in a red-painted room.

The video Daisy’s Destruction – widely discussed on forums and on Reddit – is not actually a snuff film, but features horrifying abuse and sexual assault of a young child. It was streamed on so-called ‘Hurtcore’ paedophile sites – where paedophiles watch torture and abuse of children and babies. Its creator, Peter Scully, is in jail in the Philippines. The video called ‘Daisy’s Destruction’ showed the baby girl being tied upside down by her feet, sexually assaulted and beaten by Scully and a masked woman.

In the series of videos, she is whipped and assaulted with sex toys by Peter Scully’s girlfriend – who he met when she herself was a child prostitute. According to the Sydney Morning Herald, the footage was so horrific police called it ‘the worst we have encountered in our years campaigning against child pornography.’ Reports that the video feature ‘Daisy’ being killed are inaccurate – while human remains were discovered at one of Peter Scully’s homes, the girl from the film was rescued alive. The videos were streamed via a paedophile website which hosted torture videos, called Hurt 2 The Core – which boasted 15,000 videos downloads daily. The worst paedophiles – those who uploaded their own material – gained access to a Producer’s Lounge, with the most offensive material.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Friday 20 September 2019

What is Cookie Stuffing and Ad Fraud Scheme ? || techtalksgroup ||



Cookie Stuffing, also known as Cookie Dropping, is one of the most popular types of fraud schemes in which a website or a browser extension drops handfuls affiliate cookies into users' web browser without their permission or knowledge.


This type of SIVT involves inserting, deleting, or misattributing cookies to manipulate or falsify the prior activity of users. Also known as ‘cookie dropping,’ it pertains to the fraudulent manipulation of visitor cookies to disguise or conceal legitimate user cookies.

Often considered a black hat online marketing technique, cookie stuffing can potentially generate fraudulent affiliate income for the cookie stuffer by overwriting legitimate affiliate cookies. A website visitor may unknowingly receive a third-party cookie from a website unrelated to the one actually visited. Later on, if the visitor goes to a targeted website and completes a qualifying transaction or makes a purchase, the cookie stuffer illegally earns a commission from the targeted site and deprives the legitimate affiliate of its referral commission.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Acer Nitro 5, A budget gaming latop yet realased. || techtalksgroup ||


Enjoy premium looks without the premium price with the Acer NITRO Gaming notebook (model AN515-52), which features a beautiful exterior. It features a 15.6-inch high-def. display giving you ample space for opening multiple windows and digital entertainment. It's powered by Intel i5 8300H Enjoy smooth multitasking and excellent performance with 8GB installed RAM and 1TB HDD + 256GB SSD with NVIDIA GTX 1050 (4 GB Dedicated GDDR5).

lets take a review of the specifications in detail:-

Technical Details

  • Brand                                         Acer
  • Series                                       Nitro 5
  • Colour                                     Shale Black
  • Item Height                           26 Millimeters
  • Item Width                           39 Centimeters
  • Screen Size                             15.6 Inches
  • Maximum Display Resolution  1920 x 1080 (Full HD)
  • Item Weight                                2.5 Kg
  • Product Dimensions           26.6 x 39 x 2.6 cm
  • Batteries: 1 Lithium ion batteries required. (included)
  • Item model number            AN515-52
  • Processor Brand                          Intel
  • Processor Type                   Core i5 8300H
  • RAM Size                                    8 GB
  • Memory Technology                    DDR4
  • Maximum Memory Supported   32 GB
  • Hard Drive Size                             1 TB
  • Hard Disk Technology                   Mechanical Hard Drive
  • Speaker Description                Optimized Dolby Audio Premium
  • Graphics Coprocessor                    NVIDIA GeForce GTX 1050
  • Graphics Card Ram Size                      4 GB
  • Connectivity Type                        Wi-Fi, Bluetooth-V4, Infrared
  • Wireless Type                                      802.11a/b/g/n/ac
  • Number of USB 2.0 Ports                          2
  • Number of USB 3.0 Ports                          1
  • Number of HDMI Ports                                  1
  • Number of Audio-out Ports                          1
  • Number of Ethernet Ports                          1
  • Voltage                                                         220
  • Card Reader                                           Secure Digital Card
  • Operating System                              Windows 10 Home 64-bit
  • Supported Software                                AcerTrueHarmony
  • Average Battery Life (in hours)                7 Hours
  • Lithium Battery Energy Content             48 Watt Hours
  • Number of Lithium Ion Cells                          4
  • Included Components             Laptop, Battery, AC Adapter, User Guide, Manuals


So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Friday 6 September 2019

Repeater Vs Hub Vs Bridge Vs Routers Vs Gateway Vs Brouters ... || tech talks group ||

1. Repeater – 

A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port device.

2. Hub – 

 A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices.  In other words, collision domain of all hosts connected through Hub remains one.  Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and wastage.

Types of Hub

Active Hub :- 

These are the hubs which have their own power supply and can clean , boost and relay the signal along the network. It serves both as a repeater as well as wiring center. These are used to extend maximum distance between nodes.

Passive Hub :- 

These are the hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend distance between nodes.

3. Bridge –

 A bridge operates at data link layer. A bridge is a repeater, with add on functionality of filtering content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port device.

Types of Bridges

Transparent Bridges :- 

These are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network , reconfiguration of
the stations is unnecessary. These bridges makes use of two processes i.e. bridge forwarding and bridge learning.

Source Routing Bridges :- 

In these bridges, routing operation is performed by source station and the frame specifies which route to follow. The hot can discover frame by sending a specical frame called discovery frame, which spreads through the entire network using all possible paths to destination.

4. Switch –

 A switch is a multi port bridge with a buffer and a design that can boost its efficiency(large number of  ports imply less traffic) and performance. Switch is data link layer device. Switch can perform error checking before forwarding data, that makes it very efficient as it does not forward packets that have errors and  forward good packets selectively to correct port only.  In other words, switch divides collision domain of hosts, but broadcast domain remains same.

5. Routers –

 A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.

6. Gateway – 

A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking models. They basically works as the messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are generally more complex than switch or router.

7. Brouter –

 It is also known as bridging router is a device which combines features of both bridge and router. It can work either at data link layer or at network layer. Working as router, it is capable of routing packets across networks and working as bridge, it is capable of filtering local area network traffic.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Sunday 1 September 2019

Top 10 Countries with highest number of Jobs.


One of the most important decision a person has to take is finding a good job and professional environment. Long time ago people used to work for one employer their entire life and usually it used to be where they were born. Nowadays technology and modern way of life gives the opportunity to have much more options to choose from. More liberal Legislations and democracy gives a lot to people who want to have the career and professional development they want in the country they want to live and have happy life. Boundaries are not obstacles any more Visa and work permits are not obstacles as well/check visafirst.com/

There are a number of countries which economies are growing and they need professionals to help fill their needs of good work force. In this research the top 2 positions are occupied by Asian countries.


  • Singapore
  • Hong Kong
  • United Arab Emirates
  • Australia
  • USA
  • France
  • China
  • Netherlands
  • UK
  • Mexico


The leader in this research Singapore has huge needs in telecommunications and IT sector. The stable economy and good business relations of the country on global level creates a lot of opportunities for qualified people.

The runner up Hong Kong is famous for its global trading and business environment as well as great tourist destination which provides a lot of opportunities for young and ambitious people who want to explore new culture and have some Asian experience with global business environment.

3rd place is for United Arab Emirates. This country has a lot of resources mainly thanks to its oil. There are a lot of huge projects financed by the government and a lot of opportunities in the oil and engineering sectors as well as construction building. The huge demands of those industries and endless resources leads to good salaries for people that are not afraid of the hot climate.

Number 4 is for Australia a vast country with endless needs for people in any sector of business and skill sets.

The surprising country here is Mexico. Famous for its culture, good climate and famous tourist destination. The country has 14th largest economy and is in top 10 for production of electronics and computers globally. The oil industry is very well developed taking 6th place in the world. This makes this economy appealing for qualified workers.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Saturday 24 August 2019

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||


If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives.

What Is eMMC Storage and How Does It Work?

eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also requires little to no power from the device to hold onto data.


Unsurprisingly, the fact eMMC chips are able to perform with little to no power drawn from their devices goes hand-in-hand with the fact that eMMC chips are generally found in PCs and mobile devices that have limited power, performance, and speed; especially when compared with more expensive, fully-featured laptops. In fact, you'll normally find eMMC chips in compact/budget laptops, Chromebooks, tablet PCs, 2-in-1s, and even smartphones and tablets.

WHEN SHOULD YOU BUY EMMC STORAGE?

If you're looking for something portable with a lower price point, a PC with eMMC storage may be worth considering. And, as Windows Central points out, PCs with eMMC storage may also be best for those who already own an external hard drive, have a cloud storage subscription, or can at least afford a cloud storage subscription. This is because PCs with eMMC storage tend to have smaller storage capacities available. So, if you need to store a lot of files and other data, you'll need to have an external storage option if you still plan to use an eMMC PC.


Another thing to consider is how you plan to use your laptop. Laptops featuring eMMC storage are generally best for those who plan to use them for web browsing and streaming media and not much else. They're not really built for labor-intensive tasks.

What Is SSD Storage and How Does It Work?

SSD (solid-state drive) storage is a type of internal storage that consists of a number of flash memory chips, a circuit board, and usually either a SATA or PCIe interface that moves data and provides an SSD with power.

Unlike more traditional hard drives, SSDs don't require moving parts like drive motors to read data. The lack of moving parts in SSDs means they don't need as much power to read data and can do so much faster than hard drives. And, like eMMC storage, SSDs use NAND flash memory, which enables SSDs to use less power when storing data.


SSDs are usually found in bigger, more fully-featured laptops or desktop computers. These computers also tend to be more expensive and have larger storage capacities than eMMC computers and mobile devices. The larger storage capacities are due to the fact that SSDs have larger sizes available.

WHEN SHOULD YOU BUY SSD STORAGE?

Customers who need a fully-featured laptop that can handle a wide variety of computing tasks (web browsing, watching movies, gaming, and productivity tasks) would probably be best served by a laptop that has SSD storage.

Due to the fact the SSDs often offer large storage capacities, SSDs are best for those who plan on storing large files (or just more data in general) on their PCs.

Also, price is an important factor when considering SSDs. While they're often worth the money (SSDs tend to be faster, perform better, and can store more than eMMC devices), they also tend to be more expensive. They're generally not considered "budget laptops," but if your budget can support the cost of an SSD laptop, it may be worth the purchase.

How They Compare: eMMC flash vs. SSD

When comparing eMMCs to SSDs, there are three primary things to look at.

PERFORMANCE (SPEED/DATA TRANSFER SPEED)

eMMC devices and PCs aren't super slow, but they're generally considered to be much slower than PCs outfitted with SSD storage.

Currently, eMMC storage can reach up to a transfer speed of 400 MB/s, whereas the best SSDs (including high-performance PCIe SSDs), which vary widely in their read/write speeds, can have read speeds ranging from about 500 MB/s to over 3,000 MB/s. The best SSDs can also have write speeds that vary from about 300 MB/s to over 3,000 MB/s.

CAPACITY (STORAGE)

eMMCs also lose to SSDs in the battle for storage capacity. eMMCs have a much more limited storage capacity, but it kind of makes sense considering what they're used for. eMMCs are generally intended for lightweight, mobile devices and ultra-portable PCs.

eMMC devices mostly offer the following storage sizes: 32GB, 64GB, 128GB, and 256GB. SSDs, since they're intended to be used with full-featured laptops and desktop computers, can offer up to 1TB of storage or more.

PRICE

eMMCs finally score a victory against SSDs when it comes to price. While eMMCs have their limitations, they're also cheaper. There are many eMMC budget laptops that are less than $500, and a good number of those are even less than $300.

You can get new SSD laptops from online retailers (with a minimum of 512GB in SSD storage) starting at around $500 - $600. There are certainly SSD laptops that cost much more than that, even reaching into the thousands, but the pricing often depends on the type of SSD involved, storage size, and other computing features included in the laptop.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Any Idea About When Will The Life of Windows 10 Will Get End .?



Microsoft will not be implementing the same end of life process for Windows 10 that it has for previous versions of Windows. There is no forthcoming Windows version to install. Instead, Windows 10 users will need to continue allowing Windows 10 to update itself indefinitely. Older versions of Windows 10 will reach end of service, but this will be largely irrelevant for users who keep Windows 10 updated.

What Does End of Life Mean?

Previous versions of Windows were subject to Microsoft’s software lifecycle. Microsoft states, “Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade or make other changes to your software.”

Why Is Windows 10 Different?

Windows 10 was developed to be an as-a-service application, meaning the user doesn’t have to worry about installing new versions or updates. The process is similar to, say, the browser that you use, which gets updated periodically without any effort on your part. These updates include regular improvements meant to make Windows easier to use.

How Can I Make Sure I Have the Latest Update?

If you’ve been using Windows 10 for some time, it’s likely you’ve noticed major or minor updates every few weeks. But if you’re still not sure, you can force Windows 10 to update by using the following procedure:
  • Go to Windows Settings.
  • Click Update & Security. 
  • You will be taken to a Windows Update screen.
  • At the top of the screen, check your update status. If you’re up-to-date, you don’t need to do anything else.
  • If you’re not completely updated, click Check for updates and follow the instructions from there.
  • Once you’re all updated you can modify other update settings from the Windows Update screen. Just click the links under Update settings and make adjustments according to your preferences.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Wednesday 21 August 2019

Security Bugs and Vulnerability - The Vulnerability Landscape


Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become.
Complexity is the enemy of security. In fact, complexity is a nemesis of security,
which is one of the main reasons why we’re losing this arms race.
I’m going to get you up to speed on security bugs and vulnerabilities and how they
affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an
error. It’s an error written into software that creates a potential for a threat agent,
such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something called Open
SSL which enables the decryption of internet traffic sent to vulnerable sites. So for example, maybe you have a online bank. If it was susceptible to the Heartbleed bug, and when you were sending your username and password, somebody may, if the bug was in that bank, able to decrypt and get access to your username and password. Security bugs will always exist as long as humans write software. That might not be forever, but humans are fallible, so as long as humans write software, there’s going to
be security bugs. And it’s no surprise really if you consider something like the Windows operating
system. It’s made up of millions and millions of lines of code. Humans are fallable, we
will make mistakes, there will be security bugs. On the left here, you can see a diagram that represents your computer, and on the right, we have a diagram that represents the internet. On each side we have things that you care about.  Security bugs can exist in your operating system, firmware, applications, things like Outlook, your media player, Adobe Acrobat. In a particular risk, they can exist in your browser and the extensions and add-ons within the browser.  So for example, there can be a security bug in your Internet Explorer. You visit a website which has special code on it. You won’t see that this code is one there, and this will install malware on your machine and take it over through that vulnerability.
And maybe the consequences are that they choose to encrypt all your files and hold them to ransom until you pay the money to decrypt it, and that’s known as Ransomware. Because you have things you care about online, we have to consider the security bugs that exist on internet sites and on the internet infrastructure. So maybe you use Dropbox and there is a bug that is discovered by Dr. Evil on Dropbox, which gives him access to your files. And because Dropbox stores encryption keys, so encryption isn’t going to save you, he will then have access to your files. There are two main types of bugs. Really, it’s best to draw a distinction between, and those are the Known and Unknown bugs. So if we start with the Known bugs, known bugs of vulnerabilities have patches, and if you patch your system, you are safe against that bug. And we’ll cover the best and easiest way to do patching of all the things that need patching as we go through. And then you have the Unknown bug, also can be referred to as zero-days. These are much harder to protect against as there is no patch. So we’ll cover later techniques to protect against these, and these are referred to in the security industry
as a compensating control. I’m going to bring up a spreadsheet to give you a little bit more of an insight intothe world of the cyber criminal. Your budding, entrepreneur hacker doesn’t even need to be particularly skilled these days. He can go purchase an already made exploit kit. If you look at this spreadsheet, here along the top, these are the various popular exploit kits that are available at the moment and to purchase. And down here are the
various vulnerabilities, what they affect down here. And, as a budding, hacking entrepreneur, we can look through here and see which particular vulnerability we might want to use. Okay, we might want to exploit Internet Explorer, so there you go, we can use this one. And here we can see that this one allows the remote attacker to execute arbitrary code by a crafted website that triggers access to a detailed object. That really means that if you click on a link or go anywhere with an Internet Explorer browser, is susceptible to this vulnerability, they can take over your machine. And if we’re not feeling like potentially buying an exploit kit, you can look online for the exploit. And we can see here this is the code to run the exploit. So I hope that gives you a better idea about what security bugs are and vulnerabilities. And later on, we’re going to be going through the ways to mitigate against the Known vulnerabilities and the Unknown vulnerabilities.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Tuesday 20 August 2019

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||


Spyware have its main purpose is to gather information and send it back to the attacker, well, to
spy. The attackers don’t generally want to cause damage directly, but want to
compromise your privacy and anonymity based on some agenda they’ve got. Spyware
is intelligence gathering malware.

For example, a rootkit can also be a Trojan horse, someone could call spyware a
virus. The point is just to understand the variants that exist and the possible purpose
of the malware.

 Adware, which some people consider it to be a form of spyware. Is
undesirable software that forces advertisement on you. There are millions of different
variants of this. One of the most annoying and destructive form of adware is called
Cool Web Search. You may even have encountered it yourself, but there’s nothing
cool about it at all.

Know Your Enemy - The Current Threat and Vulnerability Landscape
It hijacks your default search engine, it displays ads in the browser, when you click
on links, it sometimes takes you to places that it wants you to go to instead of where
you want to actually go to, and it actively defends itself from being removed and
getting rid of it. So it’s particularly hard to shift. And there are many, many variants
of it that have affected millions of people.

When an adware or malware takes over your browser in this way, it’s known as
Browser Hijacking, and you might hear that term more throughout the course.
You should always pay particular attention when installing software because often,
a software install includes optional installs such as this browser hijacker that we’ve
just mentioned. So you can see here optional installs. And what you’ve got here is
installs that are going to be potential adware. So be very careful what you agree to
install.
Always opt for the custom installation and deselect anything that is not familiar,
especially optional software that you never wanted to download and install in the first
place. It goes without saying that you should not install software that you don’t trust.
Sometimes your device might come with adware preinstalled if you're particularly
unlucky. One of the worst cases was Lenovo preinstalling Superfish adware that not
only served you adverts based on what it knew about you from spying on you, it also
included a self-signed certificate allowing your browser TLS and SSL encryption to be
bypassed. So not very good of Lenovo there. In fact, I will never buy a Lenovo laptop
again because of that and all the rest of the things that Lenovo had done.

Scareware is a type of social engineering attack to trick a person into
believing in a threat that isn’t really real. So a common example is fake security
software claiming that you have malware infections or something like that. Often they
want you to pay something in order to fix the fake problem. These scams have been
extremely successful.
You can see here Personal Antivirus Software. It’s identifying all of these fake
vulnerabilities. And then it’s going to keep popping up, it’s going to keep causing
problems on your machine, and then people are fooled into paying for something to
remove the fake viruses.
And finally we have this catch all term. If it’s something that you might not have
wanted, these are called Potentially Unwanted Programs, or PUPs.
They’re called potentially unwanted because the antivirus companies and people
that attempt to remove these things aren’t quite sure whether you want them or not.
Most often, you don’t want them.
They’re annoying; the things that are bundled in with software. So again, they are
often bundled in with the software when you install, so you must make sure when
you install software, you go through the custom install and make sure you remove
any of these PUPs.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Saturday 15 June 2019

Microsoft's New AI Lab provide training to India Students. || techtalksgroup ||


Microsoft will soon launch its new AI labs through which the tech giant aims to train as many as 1.5 lakh students across higher educational institutes in the country, the company said announcing its decision on Thursday.

As part of the programme, the tech giant will closely work with 10 educational institutes and will provide the needed infrastructure and guidance to the selected students.

BITS Pilani, BML Munjal University, ISB, Kalpataru Institute of Technology, KL University, Periyar University, Karunya University, SRM Institute of Science and Technology, SVKM (NMIMS) and Trident Academy of Technology are among the list of chosen 10 institutes across the country.


Maintaining that AI is crucial for reskilling the workforce of tomorrow,  Microsoft India President Anant Maheshwari said, “As AI becomes mainstream, organisations will require talent with skill sets that are very different from what exists now. Educators and institutions are integral to the skilling revolution taking root in the country.”

Apart from designing the curriculum and giving students access to its cloud and AI services, Microsoft will also train the faculties through workshops emerging technologies and provide assistance in strategising content and curricula for project-based and experiential learning.

Booming AI and Data Science market


The move comes in the wake of growing significance of artificial intelligence (AI) and machine learning (ML) related skills in the current job market.

As per a study by Analytical India Magazine which studied the analytical and data science jobs in India, In early 2019 alone, the total number of analytics and data science job positions available are 97,000, thus marking a 45% jump in the open job requirements, when compared to 2018.

The AI lab is one among the number of initiatives undertaken by Microsoft to promote AI in the country. In 2018, the PC-maker joined hands with NITI Aayog to lay the foundation for the country’s AI architecture. As per the agreement, Microsoft India will support Niti Aayog by combining the cloud, AI, research across several core areas including agriculture and healthcare and the environment.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Some Details which had been know so far for HongMeng "Ark" OS Huawei || techtalksgroup ||


The drama surrounding Huawei’s ban from importing and buying US products continues to unfold and the latest episode revolves around what is believed to be its answer to Android. Internally called “HongMeng”, the Android replacement is reportedly ready for deployment. Not next month, as an earlier report indicated but sometime starting later this year. What HongMeng really is continues to be a mystery but here are the breadcrumbs we’ve gathered about it from different corner of sources.

TechRadar earlier received word that Huawei’s homegrown OS is ready to launch commercially in June. The Chinese OEM corrected the misconception but also added a few interesting tidbits.

Foreseeing this exact situation, Huawei says it has been ready since January 2018 but held off releasing the OS to maintain its relationships with Google and other US-based partners. Now that those have cut their ties, it will be moving forward with a launch in China in late 2019 and a global release sometime in 2020.

It might be called Ark OS

“HongMeng” is just the operating system’s codename and Huawei knows it won’t do for a marketing name. It has apparently been filing trademarks across the world for an “Ark OS” name. While there’s no certainty that Ark OS is HongMeng’s commercial name, given the timing of the filings, it’s almost a sure thing.

It will run Android apps but may not be Android-based

WinFuture obtained some alleged screenshots of this Ark OS and it’s pretty clear it can run Android apps, complete with standard Android permissions. That’s pretty much a no brainer because, as the likes of Samsung’s Tizen OS and Jolla’s Sailfish OS or even Microsoft’s Windows Phone proved, HongMeng wouldn’t survive without a massive number of apps. Especially the most popular ones.

What’s still not certain, however, is whether HongMeng/Ark OS itself is based on Android or if it simply has a compatibility layer for Android apps. The latter, while possible, is extremely tricky and our bet is on a modification of the Android Open Source Project or AOSP.

It is compatible with the “Android Green Alliance”

The Android Green Alliance was formed in 2016 by Huawei, Tencent, Baidu, Alibaba, and NetEase in an effort to improve the quality of Android experience on Chinese phones. This does seem to confirm that Ark OS is indeed based on Android. Whether or not the other members of the alliance stand behind Huawei on this front is, of course, a different question altogether.

Huawei boasts it can make it on its own

Huawei, however, is almost boastful that it has all that it needs to keep its business running, except for Intel chips for PCs and servers. It is using its own Kirin chipset for its phones, of course, but also claims to have ARM-based processors and database software to replace Intel and Oracle. How that stands in light of ARM’s withdrawal from Huawei remains to be seen.

The company also says outright that Wi-Fi, Bluetooth, and SD card alliances actually stand to lose in keeping out a big contributor such as itself. As international standards, however, Huawei suggests it can use such technologies even without being part of that alliance.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Saturday 1 June 2019

Top 10 Worst IT Jobs. || techtalksgroup ||

                The 10 Worst Jobs in IT
Source: The Best Computer Science Schools


Not every job in technology involves sitting in a comfy chair, analyzing data. Best Computer Science Schools has taken a look at some of the worst jobs in information technology and what makes them so dangerous, dirty or just plain disturbing.

Electronics assembly

With devices like cell phones and tablets becoming increasingly central to everyday life, those who assemble such devices are under growing strain to meet deadlines and deliver high-quality products. The stress recently led several employees of an Apple assembly factory in China to commit suicide. In addition, accusations have been leveled against other companies like Dell, HP and Samsung, claiming sweatshop conditions and exposure to radiation.

Undersea Internet cable repair

Think you are able to connect to another continent thanks to satellites? Think again. Massive undersea cables provide about 99 percent of the world's Internet connectivity. Workers have to lay those cables and then return to repair them in the event of a line break, which can be caused by everything from a ship's anchor to an undersea earthquake. Robots controlled by humans physically lay and bury the cables, but humans must haul in, fix and drop the tables. And since they're in the middle of the ocean, nature could intervene at any time.

Climbing towers

Cell phone-tower climbing has been called the most dangerous work in the country. These towers can reach heights of 2,000 feet, exposing workers to the very real risk of a deadly fall. And with the increasing reliance on cellular networks, more and more towers go up every year, with more workers exposed to those dangers all the time.


Network engineer

Engineers who troubleshoot networks often have to crawl through basements and attics, pulling equipment and repairing it. That's already a pretty gross job. Imagine doing all that in a war zone. Military network engineers are tasked with doing that very unglamorous job in dangerous areas, including in active conflict zones.

Recycling e-waste

Spent electronics aren't simply tossed into landfills and left to nature. Used hardware from the U.S. often travels halfway around the world to developing nations for workers there to smash so they can strip the valuable metals (gold, copper and silver included) from circuit boards. In addition to flying shards of glass, they often come into contact with dangerous minerals and chemicals, such as lead, mercury and brominated flame retardants, as well as acid to help reveal the valuable metals.

Sanitation

Like the developing world workers who reclaim precious metals from discarded computers, asset disposition firms analyze old computers from major companies, clean them up and decide if they must be trashed or if they can be refurbished. Many of the computers have been unused for years, so inside workers can encounter spiders, insects, dust, even animal carcasses.

Mining for "blood phones"

Conflict mining doesn't just apply to diamonds. Key ingredients for making electronics, such as tantalum, tin, tungsten and gold, are found in abundance in the eastern Congo. Hundreds of Congolese men, women and children dig through mountains and river streams for even small bits of these substances, while facing threat of armed groups, who make millions off these materials. While no companies have been able to completely certify their products are 100 percent conflict-free, many are moving in that direction.

Content reviewer

You know the bad stuff on the Internet? No, the really bad stuff - images of hate crimes, child abuse, torture, executions? Internet content reviewers get paid to filter out such material from social networks and photo-sharing sites. Some companies that employ content moderators also pay for free counseling for their employees.

System administration

While system administrators often work from behind a desk or in an office, they're also very frequently tasked with jobs far outside the scope of office work. System administrators often receive panicked phone calls or emails late at night (or very early in the morning), and they often deal with users who complicate their jobs by not being entirely truthful about their activities. And especially at smaller companies, system administrators are the ones who clean and maintain equipment and must MacGyver problems by engineering solutions on the fly.

Building infrastructure

Those who build communications infrastructure are at risk of falls and injuries. Those who work in war zones like Iraq and Afghanistan? Add the very real risk of being shot or caught up in a bomb blast. At least five telecommunications contractors have been killed in Iraq and Afghanistan, though numbers are unclear, since most work for private contractors.

SOURCES

PC World
How Stuff Works
Yahoo!

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit

Thursday 16 May 2019

AWS vs Azure vs Google. Which is best for Cloud Computing.? || techtalksgroup ||


Having taken over our daily communications almost entirely, the web is constantly evolving and expanding. With this continuous expansion, it provides you with more and more data which you consume daily. However, all the information that appears on the web, every like, subscription, tweet, downloaded video or uploaded vlog, making all of this possible requires a highly sophisticated computational process working behind it, constantly.

The smooth functioning of the web has more to it than just the computational procedure. Current web services operate through a solid and intricate network of RAM, containers, database engines as well as machine learning skills.




Importance Of Cloud Technology

Due to continuous technological growth and advancements, the demand for cloud computing services is increasing, too. It has become essential for individuals and businesses to have a better storage space with increased security and faster service. There is no doubt about the fact that Google has been ruling the internet with its search engine services. However, when it comes to cloud technology, Amazon and Microsoft are giving Google tough competition. Amazon offers the most-up-to-date mobile and web apps in the market, gaining a strong anchorage for itself in the market.

With these constant high-tech developments and changes, migrating to a cloud platform is not an expensive and time-consuming process for an organization anymore. With so many cloud providers in the market, business corporations are finding it extremely beneficial as they can have more options and services to choose from that are cost-effective as well.

Which Is The Most Cost Effective Platform?

Google stepped into the cloud market when Amazon Web Services was already an established cloud platform in the IT industry. AWS was relaunched in 2006 and has been offering advanced cloud services and products since then.

Just like Amazon Web Services and Google, Microsoft introduced Azure to establish itself in the cloud market. Presently, Microsoft Azure enjoys a bigger market share than the GCP and has been continuously working on developing and upgrading its level of services to the consumer.

Current Market Scenario

According to the latest study, Amazon rules the share market with a hold of a massive 34%. Amazon is followed by Microsoft Azure, which owns around 14% of the market share. Last but certainly not the least, we have tech giant Google Cloud holding a minimal percentage of the market share.

The apparent supremacy of Amazon in the market has, in turn, resulted in greater demand for certified professionals to manage cloud computing for organizations. As a result, AWS certification training is highly sought after by individuals as it globally verifies their cloud computing skills and increases their chances of landing up an ideal job.

Why Opt For Amazon Web Services (AWS)?

Amazon Web Services (AWS) is one of the leading cloud platforms in the IT industry. Amazon Web Services offers a wide variety of services including mobile apps, management, and other web developing tools. AWS offers products and services to perform storage operations and manage containers that assists an AWS certified developer to perform cloud operations more effectively and efficiently.

Amazon’s cloud platform is based on IaaS and consists of the following parts:


  • Database management
  • Networking and storage
  • Computation Power

EC2 and S3 are the most prominent features of AWS and serves as a base for more advanced level services and products offered byAmazon Web Services.

Since Amazon offers the largest number of services, it is possible that you may find those services that aptly suit your organization’s storage needs and requirements. These applications help developers to design and manage advanced-level and highly scalable applications.

Ever since it was relaunched in 2006, AWS has been continuously working on making its cloud services more affordable than its competitor cloud platforms, Microsoft and Google. For those potential customers who are skeptical about migrating to AWS platform, Amazon has a free trial offer for such users.

As AWS is constantly modifying its services to meet the needs of organizations, it is becoming immensely popular and being adopted by many enterprises. These enterprises are currently in search of trained staff who can effortlessly handle their cloud operations.AWS offers various training programs for professionals to equip them to meaningfully contribute to their organization. Therefore, it is highly recommended to enroll in the right IT training program and earn an AWS certification if you seek career advancements.

Why Opt For Google Cloud Platform (GCP)?

Many experts opt for Google as it offers a wide range of products and services for cloud specialists. The most popular among these is the Google App Engine. With the help of Google App Engine, you can design various applications without working on multiple servers.

This app by Google takes care of building mobile applications as well as web applications efficiently. One factor that makes Google Cloud the first choice of many experts is that you can execute all computing operations by using the very hardware utilized by Google for its countless web services such as Gmail, Google Search etc. Moreover, services by Google Cloud also include supplying databases, networking as well as storage solutions.

Hence, you can find an all-inclusive solution for your IT operations and produce varied web services and apps. Despite the fact that Google provides fewer facilities and options comparatively, it still boasts a large clientele due to its comprehensive approach.

Google Cloud Platform lags behind AWS and Microsoft Azure in terms of the number of services and features provided. However, it offers the most cost-effective package for small businesses and start-ups. This package helps Google in winning the confidence of new users and clients and find a firm footing in the cloud market.

Why Opt For Microsoft Azure?

Microsoft Azure provides a platform to help professionals work on VMs. Similar to Amazon Web Services and GCP, you can adjust your computation power according to your system’s requirements here as well. If you need computing in parallel batch for your web services, Microsoft Azure takes care of it, as does Amazon AWS. Azure and Amazon AWS have to their credit the exceptional trait of providing the option of large scale parallel computing.

Since Azure does not offer a free trial package for new users, it is better that users first determine their cloud needs and choose only those services and products that would be beneficial for their cloud system. You might have to pay for additional services separately.

Conclusion

It is evident that Amazon, Microsoft and Google have their own strengths and weaknesses. While Amazon concentrates on the number of services and offers the largest number of cloud services, GCP on is known for offering services at a lower price Microsoft Azure tries to maintain a balance between its services, costing and features.

Before selecting a cloud platform for your organization, you have to first figure out your budget and your organization’s storage needs. It is better to first understand different applications and features these platforms have to offer. Then it will be easier for you to decide on the features and services which are really beneficial for your organization.

So that's it. Hope you guys like it. If yes then please .. comment down below and do not forget to like follow and share our social media platforms.

 Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Website:- https://www.techtalksgroup.com

Instagram:- https://www.instagram.com/theprogrammer.harshit