Tuesday, 12 June 2018

What is Encryption ?



Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient.

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

Three Concepts to Understand in Encryption 

Private and Public Keys

One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you. A private key also lets you place unforgeable digital signatures on messages you send to other people. A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you. Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.
Security Certificates

Another extremely valuable concept to understand is a security certificate. The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names—(like www.google.com, www.amazon.com, or ssd.eff.org). Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website. It is also common to see an error because of a bureaucratic mistake in the system of certificates. But occasionally, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection.

Unfortunately, it is extremely difficult to tell the difference between these cases. This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

Key Fingerprints

The word "fingerprint" means lots of different things in the field of computer security. One use of the term is a "key fingerprint," a string of characters like "342e 2309 bd20 0912 ff10 6c63 2192 1928" that should allow you to uniquely and securely check that someone on the Internet is using the right private key. If you check that someone's key fingerprint is correct, that gives you a higher degree of certainty that it's really them. But it's not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 6 June 2018

Tips on how can you avoid Phishing Attacks .


On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing.

A phishing attack usually comes in the form of a message meant to convince you to:

    click on a link;
    open a document;
    install software on your device; or
    enter your username and password into a website that’s made to look legitimate.

Phishing attacks can trick you into giving up your passwords or trick you into installing malware on your device. Attackers can use malware to remotely control your device, steal information, or spy on you.

This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them.

Types of Phishing Attacks :-

Phishing for Passwords (aka Credential Harvesting)

Phishers can trick you into giving them your passwords by sending you a deceptive link. Web addresses in a message may appear to have one destination, but lead to another. On your computer, you can usually see the destination URL by hovering over the link. But links can be further disguised with lookalike letters, or by using domain names that are one letter off from legitimate domain names and may direct you to a webpage that appears to go to a service that you use, such as Gmail or Dropbox. These fake replica login screens often look so legitimate that it’s tempting to type your username and password. If you do, you will send your login credentials to the attackers.

So before typing any passwords, look at the address bar of your web browser. It will show the real domain name of the page. If it doesn't match the site you think you’re logging into, don't continue! Remember that seeing a corporate logo on the page doesn't confirm it's real. Anybody can copy a logo or design onto their own page to try and trick you.


Remember, it's easy to forge emails so that they display a false return address. This means that checking the apparent email address of the sender isn't enough to confirm that an email was really sent by the person it appears to be from.

Spearphishing

Most phishing attacks cast a wide net. An attacker might send emails to hundreds or thousands of people claiming to have an exciting video, important document, or billing dispute.

But sometimes phishing attacks are targeted based on something the attacker already knows about an individual. This is called “spearphishing.” Imagine you receive an email from your Uncle Boris that says it contains pictures of his kids. Since Boris actually has kids and it looks like it is from his address, you open it. When you open the email, there is a PDF document attached to it. When you open the PDF, it may even display pictures of Boris’ kids, but it also quietly installs malware on your device that can be used to spy on you. Uncle Boris didn't send that email, but someone who knows you have an Uncle Boris (and that he has children) did. The PDF document that you clicked on started up your PDF reader, but took advantage of a bug in that software to run its own code. In addition to showing you a PDF, it also downloaded malware onto your computer. That malware could retrieve your contacts and record what your device's camera and microphone sees and hears.

The best way to protect yourself from phishing attacks is to never click on any links or open any attachments. But this advice is unrealistic for most people. Below are some practical ways to defend against phishing.

How to Help Defend Against A Phishing Attack 

Keep your software updated

Phishing attacks that use malware often rely on software bugs in order to get the malware onto your machine. Usually once a bug becomes known, a software manufacturer will release an update to fix it. This means that older software has more publicly-known bugs that could be used to help install malware. Keeping your software up to date reduces malware risks.

Use a password manager with auto-fill
Password managers that auto-fill passwords keep track of which sites those passwords belong to. While it’s easy for a human to be tricked by fake login pages, password managers are not tricked in the same way. If you use a password manager (including the built-in password manager in your browser), and it refuses to auto-fill a password, you should hesitate and double check the site you’re on. Better yet, use randomly generated passwords so that you are forced to rely on auto-fill, and less likely to type your password into a fake login page.

Verify Emails with Senders
One way to determine if an email is a phishing attack is to check via a different channel with the person who supposedly sent it. If the email was purportedly sent from your bank, don’t click on links in the email. Instead, call your bank or open your browser and type in the URL of your bank's website. Likewise, if your Uncle Boris sends you an email attachment, call him on the phone and ask if he sent you pictures of his kids before opening it.

Open Suspicious Documents in Google Drive
Some people expect to receive attachments from unknown persons. For example, journalists commonly receive documents from sources. But it can be difficult to verify that a Word document, Excel spreadsheet, or PDF file isn't malicious.

In these cases, don't double-click the downloaded file. Instead, upload it to Google Drive or another online document reader. This will turn the document into an image or HTML, which almost certainly will prevent it from installing malware on your device. If you're comfortable with learning new software and willing to spend time setting up a new environment for reading mail or foreign documents, there are dedicated operating systems designed to limit the effect of malware. TAILS is a Linux-based operating system that deletes itself after you use it. Qubes is another Linux-based system that carefully separates applications so that they cannot interfere with each other, limiting the effect of any malware. Both are designed to work on laptop or desktop computers.

You can also submit untrusted links and files to VirusTotal, an online service that checks files and links against several different antivirus engines and reports the results. This isn't foolproof—antivirus often fails to detect new malware or targeted attacks—but it is better than nothing.

Be Careful of Emailed Instructions
Some phishing emails claim to be from a computer support department or technology company and ask you to reply with your passwords, or to allow a “computer repair person” remote access to your computer, or to disable some security feature on your device. The email might give a purported explanation of why this is necessary, by claiming, for example, that your email box is full or that your computer has been hacked. Unfortunately, obeying these fraudulent instructions can be bad for your security. Be especially careful before giving anyone technical data or following technical instructions unless you can be absolutely certain that the request's source is genuine.
If you are at all suspicious of an email or link someone has sent you, don’t open or click on it until you’ve mitigated the situation with the above tips and can be confident it’s not malicious.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 5 June 2018

How to protect your device from Hackers.


Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure.

2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompts you to install software, don’t agree. And if your web browser or a search engine warns you a site may be malicious, hit the back button.

3. USB or Thunderbolt connector: Attackers can copy over a malicious program or otherwise take over your machine by plugging in a USB or Thunderbolt connector. The same goes for CDs and DVDs. Sometimes they will contain a program (autorun.exe) that runs automatically so your computer will be infected immediately if you insert the disc. So be careful what you put in or attach to your computer, and if you want it to stay secure, don't give strangers access to your device.

Remember, modern computers are designed to fend off these malware attacks. As long as we keep building them as such, you’ll have a chance to fight back against being 0wned. Find tips for detecting attacks on your computer in our guide on malware.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 23 May 2018

An Overview about End-to-End Encryption


In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.      So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends.Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.    The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated. The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it.
Getting little bit confused ...!!
Lets take an example to clarify...
Suppose there is a messaging app in your mobile phones that uses End-to-End Encryption for protecting your privacy. Now while opening the acoount or Signing Up that app generated two key, first Public Key that will move to the server of that messaging app and the second key that  will remain in that mobile phone only.        So now when someone sends you a message that message will get encrypted by the Public key in that way that only Private key of that account can decrypt it. Now the encrypted file that contains the message is sent through the server to the mobile phone where the private key is already remaining there for decrypting it. So thats it for my self...

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 22 May 2018

An Overview About Google Duplex



Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take.

What is Google Duplex ?

It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. There are huge banks of data and the computers to process it involved that aren't nearly as cool as the final result. But they are essential because making a computer talk and think, in real time, like a person is hard.

How does Google Duplex Work ?

From the user end, it's as simple as telling Assistant to do something. For now, as mentioned, that something is limited to making appointments so we would say, "Hey Google make me an appointment for an oil change at Joe's Garage for Tuesday morning," and (after it reminded us to say please) it would call up Joe's Garage and set things up, then add it to your calendar.
                     Duplex is using what's called a recurrent neural network. It's built using Google's Tensor-flow Extended technology. Google trained the network on all those anonymized voicemails and Google Voice conversations you agreed to let it listen to if you opted in with a mix of speech recognition software and the ability to consider the history of the conversation and details like the time of day and location of both parties.

Essentially, an entire network of high-powered computers is crunching data in the cloud and talking through Assistant on your phone or other product that has Assistant on board.

Where can I learn more?

Google is surprisingly open about the tech it is using to create Duplex. You'll find relevant information at the following websites:
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 19 May 2018

Had you ever thinked, How does an IP Address is assigned to a device..?


Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet.

Who created Internet Protocol (IP) addresses?

Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA).
Code.org and Mr. Cerf explain the creation of IP address.

There are a few organizations involved in IP addresses.

ICAAN - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it.
From there it flows down to IANA - Internet Assigned Numbers Authority. IANA is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS.
Next step is region specific organizations that hold onto the IP addresses that provide registration and management of them, North America for example is ARIN.
Once at ARIN, ISPs (Internet Service Providers) or organizations can contact them to register an IP address or a block of IP addresses which is where you come in.
How IP Addresses are assigned
You then purchase a connection from an ISP or head to your local Starbucks and connect to the internet - voila!
IPv4 addresses were distributed from ICANN through IANA and then through to your regional internet registry where your ISP or company can coordinate from there and you connect to it!

Some organizations govern their own block of IP addresses

Based on that the internet was originally used by the US Military it makes sense on these and with IPv6 there are whole blocks that are taken up by Google, Facebook and the like as the original IP spec and those IPv4 blocks were handed out in the 90s.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 12 May 2018

How does a WiFi Work..?


Do you ever have that moment where you step back and think about how something you use every day actually works? More specifically have you ever wondered how the heck computers actually communicate wirelessly?
Well, that's exactly the question we're going to be tackling in today's podcast. >

What Is WiFi?

First, let's cover some of the basics. WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for "Wireless Local Area Network."
WiFi works off of the same principal as other wireless devices - it uses radio frequencies to send signals between devices. The radio frequencies are completely different say from walky talkies, car radios, cell phones, and weather radios. For example your car stereo receives frequencies in Kilohertz and Megahertz range (AM and FM stations), and WiFi transmits and receives data in the Gigahertz range.
To break it down even further, Hertz (Hz) is simply a unit of frequency. Let's say you're standing on a pier watching waves come in. As you look down at the waves you can see the crest of each wave roll on by. If you counted how many seconds between each wave crest this would be the frequency of the waves. So if the time between each crest was 1 second that would meant the wave frequency was 1 hertz or one cycle per second.
Comparing sea waves to Mhz and Ghz, these waves are moving at 1 million and 1 billion cycles per second in the air! And to receive the information found in these waves, your radio receiver needs to be set to receive waves of a certain frequency.
For WiFi this frequency happens to be 2.4Ghz and 5Ghz. These waves are very similar to the frequency found in your microwave! Your microwave uses 2.450Ghz to heat up food and your router uses 2.412 GHz to 2.472 GHz to transmit your data over WiFi. This is why some people with old or faulty microwaves experience a problem with their WiFi signal when they try to make popcorn.
Just to clear up a popular misconception: These microwaves are non-ionizing radiation. That means that they do not cause cancer. That’s right kids, microwaves will not make you radioactive and glow in the dark!

How Does WiFi Work?

I mentioned before that WiFi uses both 2.4Ghz and 5Ghz frequencies. Generally older devices only have 2.4Ghz because that was the standard before 5Ghz came out.  
But whether you are in the 2.4Ghz range or the 5Ghz range, there will be a set of channels your router will communicate on. These channels are a slightly different frequency from one another and they allow multiple routers to communicate in the same area without causing a lot of traffic. Just picture yourself driving on the freeway - if there was only one lane, it would cause a traffic jam; but with multiple lanes traffic flows smoothly.
You've probably noticed that you don’t have to worry about setting channels or anything when connecting to WiFi. That's because this is usually set up automatically when you connect your router. Your computer and router will work out the details between them.
Just for your reference, 2.4Ghz has around 12 channels and 5Ghz has around 30 channels. I say around because the number of channels is dictated by the country you are in.
So now we know that radio waves can fly through the air and pass through a lot of things on their way to your router and wireless device. These waves are also high in frequency, which allows them to carry a lot more data than most other radio frequencies. This high speed and high capacity is what allows you to watch Netflix on your smartphone and laptop while being several rooms away from your router.
But the real magic of WiFi has to do with the processing that happens on the end of your WiFi chip. Each device's WiFi chip converts 0’s and 1’s into radio waves to be sent out unto their destination, while at the same time converting a steady stream of 0’s and 1’s into data that your device can interpret as email, web pages, or anything else that you do on the web.
Let’s take a look at a standard wireless router that has a transfer speed of 54mbps (that’s megabits per second). As I’ve mentioned before, a bit consists of a 1 or a 0. At any given point while you’re using a wireless device, your wireless chip is transferring and receiving 54 million 1’s or 0’s in a single second. That would be about 13,000 pieces of paper, if printed out.
Needless to say it’s pretty impressive.
These 1’s and 0’s are the same signals that your wireless device would send if it were directly connected to your network with a wire. At this point your router considers your device to be exactly like any other device on the network. All of the communication is the same, your router just has to decide whether or not to send the signal over a wire or wirelessly using its radio.
So to sum it all up, when you use your laptop, all of your internet traffic is converted into 1’s and 0’s which is then sent to your device’s wireless chip. From there your wireless chip converts the 1’s and 0’s to into a radio frequency. Your router receives the signal and converts it back to 1’s and 0’s and then into the traffic from your device.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/