Monday, 23 July 2018

Two Custom BMW Motorcycles debut at wheels and waves festival 2018



Two Custom BMW Motorcycles debut at wheels and waves festival 2018




one with a black-bathed over body, the other converted as a scrambler; two custom motercycle, which debuted at the 2018 wheels and waves festival, are completely dissimilar apart from being based on old BMW motorrads. the festival, held in biarritz, france, is a cross-over celebration of both motorbiking and surfing. as these adrenaline junkies unite, exquisite designs are showcased, including the ‘black phantom’ by kingston custom and the ‘coyote’ by fuel motorcycles.





said to be a ‘tough nut for rough terrain‘, the fule motercycle’ ‘coyote’ is a bespoke BMW ‘R nine T urban G/S’ conversion that was inspired by the namesake animal, as well as an ambition to replicate bikes from the 1950s that travelled across the deserts of the american west. as such, it features a raised exhaust, an engine guard and a high seat, which is upholstered in natural and suede leather. significantly, a smaller, lighter tank was needed and so an old one from a suzuki ‘GT 250’ was modified to fit.



following the ‘white phantom’ in 2017, the kingston costam ‘black phantom’ motorcycle is set to make waves on its unveiling at the festival. beneath its black body, it is based on a BMW ‘R75’ added to with original parts from the brand between 1951 to 1979. ‘I wanted to build a bike that showed that no high-end technology is needed to create something special,’ says dirk oehlerking. the truly handmade project did not include any welding, flexing or drilling to its frame.







 BMW motorcycles




So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen. Check it Out.!



Singapore's largest healthcare group, SingHealth, has suffered a massive data breach that allowed hackers to snatch personal information on 1.5 million patients who visited SingHealth clinics between May 2015 and July 2018.

SingHealth is the largest healthcare group in Singapore with 2 tertiary hospitals, 5 national specialty , and eight polyclinics.

According to an advisory released by Singapore's Ministry of Health (MOH), along with the personal data, hackers also managed to stole 'information on the outpatient dispensed medicines' of about 160,000 patients, including Singapore's Prime Minister Lee Hsien Loong, and few ministers.


The Ministry of Health said the hackers "specifically and repeatedly" targeted the PM's "personal particulars and information on his outpatient dispensed medicine."

So far there's no evidence of who was behind the attack, but the MOH stated that the cyber attack was "not the work of casual hackers or criminal gangs." The local media is also speculating that the hack could be a work of state-sponsored hackers.

Investigations by the Cyber Security Agency of Singapore (CSA) and the Integrated Health Information System (IHiS) also confirmed that "this was a deliberate, targeted, and well-planned cyberattack."

PM Comments On SingHealth Healthcare Data Breach


Commenting on the cyber attack through a Facebook post published today, Singapore's Prime Minister said he believes that the attackers are "extremely skilled and determined" and they have "huge resources" to conduct such cyber attacks repeatedly. The Singapore government has assured its citizens that no medical records were tampered, or deleted and that no diagnoses, test results, or doctors' notes were stolen in the attack.


All affected patients will be contacted by the healthcare institution over the next five days.

Since the healthcare sector is part of the critical nation's infrastructure, alongside water, electricity, and transport, it has increasingly become an attractive target for hackers.

In the past few years, we have reported several hacks and data breaches, targeting the healthcare sector. Just last month, it was revealed that DNA registries of more than 92 million MyHeritage customers were stolen in the previous year by some unknown hackers.

Earlier this year, it was reported that more than half of Norway's population exposed its healthcare data in a massive data breach that targeted the country's major healthcare organization.

The foremost thing to protect against any data breach is to stay vigilant, as nobody knows when or where your stolen identities will be used. So, affected consumers will just have to remain mindful

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Sunday, 22 July 2018

Now Microsoft Powershell Core is now available for Linux OS


Microsoft has released its command-line shell and scripting language PowerShell Core for Linux operating system as a Snap package, making it easier for Linux users to install Microsoft PowerShell on their system.

Yes, you heard me right.

Microsoft has made PowerShell Coreavailable to the Ubuntu Snap Store as a Snap application.

PowerShell Core is a cross-platform version of Windows PowerShell that is already available for Windows, macOS, and Linux OS and has been designed for sysadmins who manage assets in hybrid clouds and heterogeneous environments.
Snap is a universal Linux packaging system, built by Canonical for the Ubuntu operating system, which makes an application compatible for all major Linux distributions without requiring any modification.

A Snap package is basically an application compressed together with its dependencies and also includes instructions on how to run and interact with other software on various Linux systems.


How to Install PowerShell Core on Linux


To install Microsoft PowerShell Core as a snap package on a Linux-based OS, you first need to install snapd and then run the following command.
snap install powershell --classic
Once installed, open a terminal and run the command pwsh.

Alternatively, you can directly head on to this web page, and install PowerShell Core snap app on your system.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Friday, 13 July 2018

SADD.IO .. A better alternative for VPN. Check it !!



From an anonymity and privacy standpoint, how could an outside entity such as the government identify a specific VPN user? If the government sent out a subpoena to the VPN providers to obtain the crypto-keys to decrypt internet traffic or request logs to view user activity, would the VPN providers dispense that information? Does the VPN store personally identifying information (PII) of its users?

From a security standpoint, will the VPN help prevent malicious actors from infecting user machines? These are some important questions that users should ask before determining that a VPN would keep them “safe” on the Internet.

So is there a better solution than a VPN lying around somewhere?

Yes, the new Internet Anonymity and Privacy startup SADD.IO gets the job done.

What is SADD.IO?

SADD: Scalable Anonymous Disposable Desktops or simply put SADD.IO, is a free web-based product that allows users to anonymously control self-disposing, Tor routed desktops through their web browser.

Users do not have to enter any personal information about themselves to use this service. Nor do users have to download any external programs. SADD.IO is accessible from your phone, laptop, iPad, you name it.

How does it work?


When a user navigates to the SADD.IO website and clicks the “Try for Free” or “Use Premium” button, a Virtual Machine (VM) or desktop is generated and routed through Tor. The user is then able to control this desktop as if it were their own computer. At the end of the user session the Virtual Machine is forensically destroyed.

How does this help with Anonymity, Privacy, and Security?

Anonymity-

SADD.IO keeps users anonymous by utilizing the Tor network. There is no way for an outside entity to use IP addresses to identify the user. The outside entity would have to break Tor in order to obtain the IP address of the SADD.IO server, VERY difficult to do.

Privacy-

All generated desktops have a time-limit. When the time-limit expires, the generated desktop is destroyed byte-by-byte. Not to mention that there are safety triggers in place that cause the SADD.IO servers to destroy all generated desktops. So if the servers are ever raided, users do not have to worry about an entity observing what was done on the desktops.

Security-

This is simple, as the generated desktops are basically computers away from the users’ host machine. If the generated desktops are ever infected or corrupted, users can easily generate another desktop to start on a clean slate.

Vulnerabilities on Tor browser while using the generated desktops will not return the User’s IP address. Instead a Tor IP address will be returned as the entire desktop is routed through Tor.
There are no DNS leaks.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Sunday, 8 July 2018

Now Facebook Founder and CEO Mark Zukerberg has become the world 3rd Richest Person.



Facebook co-founder Mark Zuckerberg has overtaken Warren Buffett as the world's third-richest person, further solidifying technology as the most robust creator of wealth.

Zuckerberg, who trails only Amazon.com founder Jeff Bezos and Microsoft co-founder Bill Gates, eclipsed Buffett Friday as Facebook shares climbed 2.4 percent, according to the Bloomberg Billionaires Index.

It's the first time that the three wealthiest people on the ranking made their fortunes from technology. Zuckerberg, 34, is now worth $81.6 billion (approximately Rs. 5.61 lakh crores), about $373 million (roughly Rs. 2,565 crores) more than Buffett, 87, chairman and chief executive officer of Berkshire Hathaway Inc.

Zuckerberg's ascent has been driven by investors' continued embrace of Facebook, the social-network giant that shook off the fallout from a data-privacy crisis that hammered its shares, sending them to an eight-month low of $152.22 (about Rs. 10,467.41) on March 27. The stock closed Friday at a record $203.23 (roughly Rs. 13,975.11).


Technology fortunes make up about a fifth of the more than $5 trillion (about Rs. 344 lakh crores) in wealth tracked by the Bloomberg index, more than any other sector. The ranking, which tracks the world's 500 richest people, is updated after the close of each trading day in New York.

Buffett, once the world's wealthiest person, is sliding in the ranking thanks to his charitable giving, which he kicked off in earnest in 2006. He's donated about 290 million Berkshire Hathaway Class B shares to charities, most of it to Gates's foundation. Those shares are now worth more than $50 billion (about Rs. 3.44 lakh crores), according to data compiled by Bloomberg. Zuckerberg has pledged to give away 99 percent of his Facebook stock in his lifetime.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Saturday, 7 July 2018

First Smartphone with 8GB RAM unveiled by Huawei. Check it Out..!


Huawei just unveiled the Honor 10 GT, which will be its first smartphone with 8GB of RAM. Its predecessor, the Honor 10, which launched in April for China and in May internationally, only had options for 4GB or 6GB of RAM.

Besides the extra RAM, the new smartphone will have the same specs and appearance as the regular Honor 10. The Honor 10 GT has a 5.8-inch, 2280 x 1080 LCD display with a fingerprint sensor on the home button. It has a notch where the front-facing 24-megapixel selfie sensor is and an otherwise nearly edge-to-edge display.

It’s powered by a Kirin 970 processor and a 3,400 mAh battery. On the back, it has dual rear cameras that are 16-megapixel and 24-megapixel. As for ports, it’s got a 3.5mm headphone jack and USB Type-C ports.

The phone is set to be released later this month in China on July 24th. While the official price hasn’t
been announced yet, given its similar specs and appearance to the Honor 10, the Honor 10 GT could potentially cost a little more than 2,599 yuan ($391.42). We’ve reached out to Huawei to see if the phone may become available elsewhere.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Wednesday, 4 July 2018

MAC Address..!


MAC (Media Access Control) addresses are permanent by design, several mechanisms allow modification, or “spoofing”, of the MAC address that is reported by the operating system. This can be useful for privacy reasons, for instance when connecting to a Wi-Fi hotspot, or to ensure interoperability. Some internet service providers bind their service to a specific MAC address; if the user then changes their network card or intends to install a router, the service won’t work anymore. Changing the MAC address of the new interface will solve the problem. Similarly, some software licenses are bound to a specific MAC address. Changing the MAC address in this way is not permanent: after a reboot, it will revert to the MAC address physically stored in the card. A MAC address is 48 bits in length.
A MAC address is a physical hardware address assigned to each device that has the capability of connecting to a network. The internet is nothing more than a large network. The MAC address is something that is assigned in the chip on the device and is not something the user can change.
As a MAC address can be changed, it can be unwise to rely on this as a single method of authentication. IEEE 802.1x is an emerging standard better suited to authenticating devices at a low level.

Types of MAC address:

Unicast address : An address for a specific computer.
Multicast address : An address for a specific group of computers in network.
Broadcast address : An address for all computers in network.

How Can U Change MAC Address:

Windows

Under Windows XP, the MAC address can be changed in the Ethernet adapter’s Properties menu, in the Advanced tab, as “MAC Address”, “Locally Administered Address”, “Ethernet Address” or “Network Address”. The exact name depends on the Ethernet driver used; not all drivers support changing the MAC address in this way.
However, a better solution – requiring Administrative User Rights – is to pass over the System Registry Keys under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}. Here settings for each network interface can be found. The contents of the string value called ‘NetworkAddress’ will be used to set the MAC address of the adapter when next it is enabled. Resetting the adapter can be accomplished in script with the freely available command line utility devcon from Microsoft, or from the adapters context menu in the Network Connections control panel applet.
There is a nice tool to change the MAC address for all cards (even those that can’t be changed through the adapter’s Properties menu): SMAC MAC Address Changer.
Note: to check your MAC address easily on a Windows XP box, go to Run, type CMD, then type “ipconfig /all” without quotation in the command prompt. The number under physical address is the MAC address. If multiple IP are displayed, you should look under the label “Ethernet adapter x”, where x is the name of your connection (which is Local Area Connection by default).

Router

The method to change the MAC address of a router varies with the router. Not all routers have the ability to change their MAC address. The feature is often referred to as “clone MAC address”. This take the MAC address of one of the machine on your network and replaces the router’s existing MAC address with it. Some support the option to manually enter the MAC address.

How to change a MAC address in Linux

To change your MAC address in Linux (and most *nix system) is easy. All it takes is two easy to script commands:
ifconfig eth0 down hw ether 00:00:00:00:00:01
ifconfig eth0 up
These two little commands would set your eth0 interface to use the MAC 00:00:00:00:00:01. Just plug in the NIC you want to set and the MAC address you want to use into the commands above and your done. Changing your MAC address is one of those things that is much easier to do in Linux then under Windows.