Tuesday, 12 June 2018

Why People are getting scared of using Artificial Intelligence.?


When people see machines that respond like humans, or computers that perform feats of strategy and cognition mimicking human ingenuity, they sometimes joke about a future in which humanity will need to accept robot overlords.

But buried in the joke is a seed of unease. Science-fiction writing and popular movies, from "2001: A Space Odyssey" (1968) to "Avengers: Age of Ultron" (2015), have speculated about artificial intelligence (AI) that exceeds the expectations of its creators and escapes their control, eventually outcompeting and enslaving humans or targeting them for extinction.

Conflict between humans and AI is front and center in AMC's sci-fi series "Humans," which returned for its third season on Tuesday (June 5). In the new episodes, conscious synthetic humans face hostile people who treat them with suspicion, fear and hatred. Violence roils as Synths find themselves fighting for not only basic rights but their very survival, against those who view them as less than human and as a dangerous threat.

Even in the real world, not everyone is ready to welcome AI with open arms. In recent years, as computer scientists have pushed the boundaries of what AI can accomplish, leading figures in technology and science have warned about the looming dangers that artificial intelligence may pose to humanity, even suggesting that AI capabilities could doom the human race.

But why are people so unnerved by the idea of AI?


An "existential threat"

Elon Musk is one of the prominent voices that has raised red flags about AI. In July 2017, Musk told attendees at a meeting of the National Governors Association, "I have exposure to the very cutting-edge AI, and I think people should be really concerned about it."

"I keep sounding the alarm bell," Musk added. "But until people see robots going down the street killing people, they don't know how to react, because it seems so ethereal."

Earlier, in 2014, Musk had labeled AI "our biggest existential threat," and in August 2017, he declared that humanity faced a greater risk from AI than from North Korea.

Physicist Stephen Hawking, who died March 14, also expressed concerns about malevolent AI, telling the BBC in 2014 that "the development of full artificial intelligence could spell the end of the human race."

It's also less than reassuring that some programmers — particularly those with MIT Media Lab in Cambridge, Massachusetts — seem determined to prove that AI can be terrifying.

A neural network called "Nightmare Machine," introduced by MIT computer scientists in 2016, transformed ordinary photos into ghoulish, unsettling hellscapes. An AI that the MIT group dubbed "Shelley" composed scary stories, trained on 140,000 tales of horror that Reddit users posted in the forum r/nosleep.

"We are interested in how AI induces emotions — fear, in this particular case," Manuel Cebrian, a research manager at MIT Media Lab, previously told Live Science in an email about Shelley's scary stories.

Fear and loathing

Negative feelings about AI can generally be divided into two categories: the idea that AI will become conscious and seek to destroy us, and the notion that immoral people will use AI for evil purposes, Kilian Weinberger, an associate professor in the Department of Computer Science at Cornell University, told Live Science. [Artificial Intelligence: Friendly or Frightening?]

"One thing that people are afraid of, is that if super-intelligent AI — more intelligent than us — becomes conscious, it could treat us like lower beings, like we treat monkeys," he said. "That would certainly be undesirable."

However, fears that AI will develop awareness and overthrow humanity are grounded in misconceptions of what AI is, Weinberger noted. AI operates under very specific limitations defined by the algorithms that dictate its behavior. Some types of problems map well to AI's skill sets, making certain tasks relatively easy for AI to complete. "But most things do not map to that, and they're not applicable," he said.

This means that, while AI might be capable of impressive feats within carefully delineated boundaries — playing a master-level chess game or rapidly identifying objects in images, for example — that's where its abilities end.

"AI reaching consciousness — there has been absolutely no progress in research in that area," Weinberger said. "I don't think that's anywhere in our near future."

The other worrisome idea — that an unscrupulous human would harness AI for harmful reasons — is, unfortunately, far more likely, Weinberger added. Pretty much any type of machine or tool can be used for either good or bad purposes, depending on the user's intent, and the prospect of weapons harnessing artificial intelligence is certainly frightening and would benefit from strict government regulation, Weinberger said.

Perhaps, if people could put aside their fears of hostile AI, they would be more open to recognizing its benefits, Weinberger suggested. Enhanced image-recognition algorithms, for example, could help dermatologists identify moles that are potentially cancerous, while self-driving cars could one day reduce the number of deaths from auto accidents, many of which are caused by human error, he told Live Science.

But in the "Humans" world of self-aware Synths, fears of conscious AI spark violent confrontations between Synths and people, and the struggle between humans and AI will likely continue to unspool and escalate — during the current season, at least.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

What is Encryption ?



Encryption is the mathematical science of codes, ciphers, and secret messages. Throughout history, people have used encryption to send messages to each other that (hopefully) couldn't be read by anyone besides the intended recipient.

Today, we have computers that are capable of performing encryption for us. Digital encryption technology has expanded beyond simple secret messages; today, encryption can be used for more elaborate purposes, for example to verify the author of messages or to browse the Web anonymously with Tor.

Under some circumstances, encryption can be fairly automatic and simple. But there are ways encryption can go wrong, and the more you understand it, the safer you will be against such situations.

Three Concepts to Understand in Encryption 

Private and Public Keys

One of the most important concepts to understand in encryption is a key. Common types of encryption include a private key, which is kept secret on your computer and lets you read messages that are intended only for you. A private key also lets you place unforgeable digital signatures on messages you send to other people. A public key is a file that you can give to others or publish that allows people to communicate with you in secret, and check signatures from you. Private and public keys come in matched pairs, like the halves of a rock that has been split into two perfectly matching pieces, but they are not the same.
Security Certificates

Another extremely valuable concept to understand is a security certificate. The Web browser on your computer can make encrypted connections to sites using HTTPS. When they do that, they examine certificates to check the public keys of domain names—(like www.google.com, www.amazon.com, or ssd.eff.org). Certificates are one way of trying to determine if you know the right public key for a person or website, so that you can communicate securely with them.

From time to time, you will see certificate-related error messages on the Web. Most commonly, this is because a hotel or cafe network is trying to break your secret communications with the website. It is also common to see an error because of a bureaucratic mistake in the system of certificates. But occasionally, it is because a hacker, thief, police agency, or spy agency is breaking the encrypted connection.

Unfortunately, it is extremely difficult to tell the difference between these cases. This means you should never click past a certificate warning if it relates to a site where you have an account, or are reading any sensitive information.

Key Fingerprints

The word "fingerprint" means lots of different things in the field of computer security. One use of the term is a "key fingerprint," a string of characters like "342e 2309 bd20 0912 ff10 6c63 2192 1928" that should allow you to uniquely and securely check that someone on the Internet is using the right private key. If you check that someone's key fingerprint is correct, that gives you a higher degree of certainty that it's really them. But it's not perfect, because if the keys are copied or stolen someone else would be able to use the same fingerprint.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 6 June 2018

Tips on how can you avoid Phishing Attacks .


On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries, or attackers. When an attacker sends an email or link that looks innocent, but is actually malicious it’s called phishing.

A phishing attack usually comes in the form of a message meant to convince you to:

    click on a link;
    open a document;
    install software on your device; or
    enter your username and password into a website that’s made to look legitimate.

Phishing attacks can trick you into giving up your passwords or trick you into installing malware on your device. Attackers can use malware to remotely control your device, steal information, or spy on you.

This guide will help you to identify phishing attacks when you see them and outline some practical ways to help defend against them.

Types of Phishing Attacks :-

Phishing for Passwords (aka Credential Harvesting)

Phishers can trick you into giving them your passwords by sending you a deceptive link. Web addresses in a message may appear to have one destination, but lead to another. On your computer, you can usually see the destination URL by hovering over the link. But links can be further disguised with lookalike letters, or by using domain names that are one letter off from legitimate domain names and may direct you to a webpage that appears to go to a service that you use, such as Gmail or Dropbox. These fake replica login screens often look so legitimate that it’s tempting to type your username and password. If you do, you will send your login credentials to the attackers.

So before typing any passwords, look at the address bar of your web browser. It will show the real domain name of the page. If it doesn't match the site you think you’re logging into, don't continue! Remember that seeing a corporate logo on the page doesn't confirm it's real. Anybody can copy a logo or design onto their own page to try and trick you.


Remember, it's easy to forge emails so that they display a false return address. This means that checking the apparent email address of the sender isn't enough to confirm that an email was really sent by the person it appears to be from.

Spearphishing

Most phishing attacks cast a wide net. An attacker might send emails to hundreds or thousands of people claiming to have an exciting video, important document, or billing dispute.

But sometimes phishing attacks are targeted based on something the attacker already knows about an individual. This is called “spearphishing.” Imagine you receive an email from your Uncle Boris that says it contains pictures of his kids. Since Boris actually has kids and it looks like it is from his address, you open it. When you open the email, there is a PDF document attached to it. When you open the PDF, it may even display pictures of Boris’ kids, but it also quietly installs malware on your device that can be used to spy on you. Uncle Boris didn't send that email, but someone who knows you have an Uncle Boris (and that he has children) did. The PDF document that you clicked on started up your PDF reader, but took advantage of a bug in that software to run its own code. In addition to showing you a PDF, it also downloaded malware onto your computer. That malware could retrieve your contacts and record what your device's camera and microphone sees and hears.

The best way to protect yourself from phishing attacks is to never click on any links or open any attachments. But this advice is unrealistic for most people. Below are some practical ways to defend against phishing.

How to Help Defend Against A Phishing Attack 

Keep your software updated

Phishing attacks that use malware often rely on software bugs in order to get the malware onto your machine. Usually once a bug becomes known, a software manufacturer will release an update to fix it. This means that older software has more publicly-known bugs that could be used to help install malware. Keeping your software up to date reduces malware risks.

Use a password manager with auto-fill
Password managers that auto-fill passwords keep track of which sites those passwords belong to. While it’s easy for a human to be tricked by fake login pages, password managers are not tricked in the same way. If you use a password manager (including the built-in password manager in your browser), and it refuses to auto-fill a password, you should hesitate and double check the site you’re on. Better yet, use randomly generated passwords so that you are forced to rely on auto-fill, and less likely to type your password into a fake login page.

Verify Emails with Senders
One way to determine if an email is a phishing attack is to check via a different channel with the person who supposedly sent it. If the email was purportedly sent from your bank, don’t click on links in the email. Instead, call your bank or open your browser and type in the URL of your bank's website. Likewise, if your Uncle Boris sends you an email attachment, call him on the phone and ask if he sent you pictures of his kids before opening it.

Open Suspicious Documents in Google Drive
Some people expect to receive attachments from unknown persons. For example, journalists commonly receive documents from sources. But it can be difficult to verify that a Word document, Excel spreadsheet, or PDF file isn't malicious.

In these cases, don't double-click the downloaded file. Instead, upload it to Google Drive or another online document reader. This will turn the document into an image or HTML, which almost certainly will prevent it from installing malware on your device. If you're comfortable with learning new software and willing to spend time setting up a new environment for reading mail or foreign documents, there are dedicated operating systems designed to limit the effect of malware. TAILS is a Linux-based operating system that deletes itself after you use it. Qubes is another Linux-based system that carefully separates applications so that they cannot interfere with each other, limiting the effect of any malware. Both are designed to work on laptop or desktop computers.

You can also submit untrusted links and files to VirusTotal, an online service that checks files and links against several different antivirus engines and reports the results. This isn't foolproof—antivirus often fails to detect new malware or targeted attacks—but it is better than nothing.

Be Careful of Emailed Instructions
Some phishing emails claim to be from a computer support department or technology company and ask you to reply with your passwords, or to allow a “computer repair person” remote access to your computer, or to disable some security feature on your device. The email might give a purported explanation of why this is necessary, by claiming, for example, that your email box is full or that your computer has been hacked. Unfortunately, obeying these fraudulent instructions can be bad for your security. Be especially careful before giving anyone technical data or following technical instructions unless you can be absolutely certain that the request's source is genuine.
If you are at all suspicious of an email or link someone has sent you, don’t open or click on it until you’ve mitigated the situation with the above tips and can be confident it’s not malicious.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 5 June 2018

How to protect your device from Hackers.


Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.

1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure.

2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompts you to install software, don’t agree. And if your web browser or a search engine warns you a site may be malicious, hit the back button.

3. USB or Thunderbolt connector: Attackers can copy over a malicious program or otherwise take over your machine by plugging in a USB or Thunderbolt connector. The same goes for CDs and DVDs. Sometimes they will contain a program (autorun.exe) that runs automatically so your computer will be infected immediately if you insert the disc. So be careful what you put in or attach to your computer, and if you want it to stay secure, don't give strangers access to your device.

Remember, modern computers are designed to fend off these malware attacks. As long as we keep building them as such, you’ll have a chance to fight back against being 0wned. Find tips for detecting attacks on your computer in our guide on malware.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Wednesday, 23 May 2018

An Overview about End-to-End Encryption


In todays fast growing world, security of his/her datat is the first priority of every user. So today we are going to give a brief introduction on End-to-End Encryption. End-to-End Encryption is a way of encrypting and decrypting data using the concept of cryptography.      So as the name says End-to-End Encryption refers to encrypting and decrypting of data on both the ends.Suppose a data is going to travel on the internet from a mobile phone, so first it will gen:erate two key , first is Pubic key and second is Private key.    The private key always remains in the phone, but the public key remains at the server.When a data is requested from the server the public key gets activated for that particular mobile phone from which it is generated. The Public key encrypts the data that come from the server in that way that only private key of that particular phone can only decrypts it.
Getting little bit confused ...!!
Lets take an example to clarify...
Suppose there is a messaging app in your mobile phones that uses End-to-End Encryption for protecting your privacy. Now while opening the acoount or Signing Up that app generated two key, first Public Key that will move to the server of that messaging app and the second key that  will remain in that mobile phone only.        So now when someone sends you a message that message will get encrypted by the Public key in that way that only Private key of that account can decrypt it. Now the encrypted file that contains the message is sent through the server to the mobile phone where the private key is already remaining there for decrypting it. So thats it for my self...

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Tuesday, 22 May 2018

An Overview About Google Duplex



Some days before at Google I/O 2018 we have seen a new way of assisting life, which is going to book an appointment instead of you yourself do it, Yes that's True, Google is developing an efficient Artificial Intelligence for communicating with the shop owner or any other person who is going to take an appointment in a way normal person use to take.

What is Google Duplex ?

It's a new tool from Google that aims to use Artificial intelligence (AI) to "accomplish real-world tasks over the phone" according to Google's AI researchers and developers. For now, that means very specific tasks like making appointments, but the tech is being developed with an eye on expansion into other areas. Spending billions to create a cool way to make dinner reservations sounds like something Google would do but isn't a great use of time or money.Duplex is also more than we saw in a demo and if it ever leaves the lab will be a lot more than we see or hear on our end. There are huge banks of data and the computers to process it involved that aren't nearly as cool as the final result. But they are essential because making a computer talk and think, in real time, like a person is hard.

How does Google Duplex Work ?

From the user end, it's as simple as telling Assistant to do something. For now, as mentioned, that something is limited to making appointments so we would say, "Hey Google make me an appointment for an oil change at Joe's Garage for Tuesday morning," and (after it reminded us to say please) it would call up Joe's Garage and set things up, then add it to your calendar.
                     Duplex is using what's called a recurrent neural network. It's built using Google's Tensor-flow Extended technology. Google trained the network on all those anonymized voicemails and Google Voice conversations you agreed to let it listen to if you opted in with a mix of speech recognition software and the ability to consider the history of the conversation and details like the time of day and location of both parties.

Essentially, an entire network of high-powered computers is crunching data in the cloud and talking through Assistant on your phone or other product that has Assistant on board.

Where can I learn more?

Google is surprisingly open about the tech it is using to create Duplex. You'll find relevant information at the following websites:
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Saturday, 19 May 2018

Had you ever thinked, How does an IP Address is assigned to a device..?


Every device connected to the internet is assigned an IP address when you connect. When you connect with your phone or computer or chosen device, your ISP assigns you an IP Address so you can browse, shop, and navigate the internet.

Who created Internet Protocol (IP) addresses?

Vint Cerf the “father of the internet” was one of the creators of IP addresses. He created it while working for the US Department of Defense's Advanced Research Projects Agency (DARPA).
Code.org and Mr. Cerf explain the creation of IP address.

There are a few organizations involved in IP addresses.

ICAAN - The Internet Corporation for Names & Numbers - They’re the top level and they govern over IP - the internet protocol, and run the policies behind it.
From there it flows down to IANA - Internet Assigned Numbers Authority. IANA is a department of ICAAN that co-ordinates and maintains the number systems that keep the internet running like IP addresses & DNS.
Next step is region specific organizations that hold onto the IP addresses that provide registration and management of them, North America for example is ARIN.
Once at ARIN, ISPs (Internet Service Providers) or organizations can contact them to register an IP address or a block of IP addresses which is where you come in.
How IP Addresses are assigned
You then purchase a connection from an ISP or head to your local Starbucks and connect to the internet - voila!
IPv4 addresses were distributed from ICANN through IANA and then through to your regional internet registry where your ISP or company can coordinate from there and you connect to it!

Some organizations govern their own block of IP addresses

Based on that the internet was originally used by the US Military it makes sense on these and with IPv6 there are whole blocks that are taken up by Google, Facebook and the like as the original IP spec and those IPv4 blocks were handed out in the 90s.
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Facebook Page:- https://www.facebook.com/theprogrammer.harshit/