Wednesday, 1 August 2018

Check out features of Asus ZenFone Max Pro M1.


Taiwanese smartphone maker ASUS debuted in India in 2014 with its Zenfone 4, Zenfone 5 and Zenfone 6 devices which were essentially low-cost phones that catapulted the otherwise not-so-popular brand to recognition.
According to International Data Corporation (IDC), the Indian smartphone market is poised to grow in double digits in 2018 on the back of the popularity of budget devices and vendors increasing their focus to make phones, as well as high-value components in the country. 
The Taiwan-based handset maker now seems to be following a similar sentiment and has launched ZenFone Max Pro M1 in India at Rs 10,999 for the 3GB RAM+32GB onboard storage variant and Rs 12,999 for the 4GB RAM+64GB internal storage variant to primarily compete with the likes of Xiaomi Redmi Note 5 and Redmi Note 5 Pro.
According to the company, the smartphone has been made specifically for India -- which is a key market for it -- and its launching price and specifications have intrigued us. Let us find out if the smartphone is worth your time and money.
What works?
Unlike most smartphones in the market today, this smartphone is not a typical glass sandwich design. The device was quite pleasant to look at and has an ergonomic rear.
Despite a taller-than-wider frame and an 18:9 aspect ratio screen for immersive viewing and gaming experience, the smartphone was easy to operate with one hand.
A 5.99-inch FHD+ "Full View" display takes up most of the front along with rounded corners and narrow borders on both the sides. 
The power and volume keys sit on the right and are easy to reach.
A fingerprint sensor is placed at the back below which sits the minimalistic ASUS logo. The scanner was quick to unlock the device.
We were impressed to see the almost 6-inch display sans a "notch" which was popularised by Apple iPhone X.
The display is bright with accurate colours under normal daylight conditions with decent sunlight legibility. 
The viewing angles of the device were also good and we particularly liked the inclusion of "night mode" and a manual colour temperature adjustment under "settings".
A Qualcomm Snapdragon 636 chipset, which is essentially designed for premium mid-range devices, powers the smartphone. This is a major high point considering the price of the device.
Notably, Xiaomi's Redmi Note 5 Pro is also fuelled by the same processor.
We were impressed by the company ditching its own ZenUI interface in favour of a near-stock interface which offered smooth experience.
We got close to two days of battery life on a single charge with 4G running on one SIM slot.
The device has 13MP primary sensor and a 5MP secondary sensor that can take decent photos in normal lighting conditions.
The front camera is an 8MP shooter which took some good self-portraits.
What does not work?
Despite accommodating a hefty 5,000mAh battery inside the phone, the company did not include fast-charging technology alongside which can be a bummer.
Charging the battery was painfully slow and it took us more than two hours to completely charge the device.
Conclusion: ASUS ZenFone Max Pro M1 is a capable all-rounder in this price segment. We would recommend the device to those looking for great battery 

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Tuesday, 31 July 2018

How Gift Cards used by Cybercriminals to fetch personal data.


By creating fake websites for free generation of gift cards, many cybercriminals are tricking users into parting with their time and data, for no return, researchers at cybersecurity firm Kaspersky Lab have warned. 

While legitimate apps like Tokenfire and Swagbucks buy card codes from vendors, to then give them to clients as a reward for certain activities, criminals have apparently recognised the popularity of such websites and have decided to deceive users using a simple algorithm.
"The success of these new fraud schemes is based on criminals exploiting the drive of users to get something for free," Lyubov Nikolenko of Kaspersky Lab said in a statement this week. 
"However, at best they will spend hours of personal time doing worthless tasks, and at worst lose money without receiving anything in return. So, if you want to get your hands on a free gift card, try to earn it on legal and trustworthy sites," Nikolenko added.
When on the fake site, the user is asked to select the gift card he/she wants in order to receive the code. 
After that, the fraudulent mechanism is set in motion. To get the generated code, however, the user needs to prove that he/she is not a robot. 
To do this, the user has to follow the suggested link and complete various tasks, the number and type of which are determined by the partner network to which the user is redirected. 
For example, he/she may be asked to fill in a form, leave a phone number or email address, subscribe to a paid SMS message, install adware, and so on. 
The result is predictable - either victims get tired of doing endless tasks, or they finally get the useless code, Kaspersky Lab said. 
The earnings for criminals range from a few cents per every click on a desired link, to several dozen dollars for filling in a form or subscribing to paid services. 
Thus, the criminals make a profit virtually for nothing, getting paid from the user's actions on the websites of third-party partners, who, for their part, also benefit by getting access to personal data which can be used for private purposes. 
To avoid falling for cybercriminals' fraudulent schemes and losing personal data, Kaspersky Lab researchers suggest that users should not spread questionable links among their friends.
Using a reliable security solution with behaviour-based anti-phishing technologies to detect and block spam and phishing attacks is also one of the important preventive measures that users can take, according to the researchers.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

Sunday, 29 July 2018

How to remove shortcut virus from drive.


What is Shortcut Virus?
This is quite a reasonable question regarding the fact if it is the first time that your Windows PC or Laptop has been affected by this shortcut virus. Now if you are one of that new victim of this Shortcut virus then here is what you will need to know about it.
Shortcut Virus is one of the new Malware that turns any files on your Windows including folders and files into a shortcut. While hiding the original files on your Computer which is quite irritating the fact that all your important files on your Windows Computer will be inaccessible.
Now another important piece of information that you should keep in mind is that most of this Shortcut virus on Windows Computer are undetectable by any of the Antivirus that are currently in the market. So the only option is to remove shortcut virus manually or by using a Shortcut Virus remover.
How To Remove Shortcut Virus Permanently in PC/Laptop/Pendrive/Flash Drive:
Here are some of the methods that I used to remove and delete the Shortcut virus permanently from my computer. All the given method are great Shortcut remover and you can use any of the given methods to remove shortcut virus within seconds.
#1 Method: Remove Shortcut Virus Using CMD:
Using CMD Command Prompt is certainly the easiest way to remove shortcut virus from your Computer. And it is certainly the most effective Shortcut Virus remover which can remove shortcut virus within few seconds. Follow the steps given below to remove shortcut virus using CMD.

  • First Open Run by using Win + R Key.
  • Now Type CMD or cmd in the run box and hit Enter.
  • Now you will just need to copy the following Command. And use it on your Command Prompt.
  1. attrib -h -s -r -a /s /d Drive Name:*.*
  2. {Replace the Drive Name with the Drive from which you want to remove the Shortcut virus}

Lastly, you will just need to hit the Enter key and Shortcut Virus will be removed.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Thursday, 26 July 2018

Advanced Wi-Fi Jamming Using MDK3.


You may have heard of a signal jammer before, usually referring to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries, but Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

Traditional signal jamming has been a cat and mouse game of detecting and disabling signals an opponent is using to communicate. Cutting off a target's ability to communicate leaves them isolated and vulnerable, making jamming these signals a top priority in modern day electronic warfare. Countries today have developed capabilities to jam and spoof cell phones, GPS, Wi-Fi, and even satellite links.

Different Types of Jamming
There are two main types of jammers: elementary and advanced. Here, we'll be discussing elementary Wi-Fi jamming, focusing on unencrypted management frames.

Elementary jammers can be broken into two main types: proactive and reactive. The first type, a proactive jammer, is one that continuously functions whether there is traffic on a network or not. We'll be using MDK3 as a deceptive jammer, which injects normal-seeming packets that have a malicious effect on the network.
Jammers used in electronic warfare typically require equipment that overwhelms the signal of the target with radio energy, making it impossible to distinguish between the signal and the noise being introduced to the channel the target is using to communicate. This kind of jamming is popular because it works, but it also requires specialized equipment that is banned or heavily regulated in most countries.

Don't Miss: Build a Software-Based Wi-Fi Jammer with Airgeddon

Deauthentication Packets

The most common way this sort of attack is done is with deauthentication packets. These are a type of "management" frame responsible for disconnecting a device from an access point. Forging these packets is the key to hacking many Wi-Fi networks, as you can forcibly disconnect any client from the network at any time. The ease of which this can be done is somewhat frightening and is often done as part of gathering a WPA handshake for cracking.

Aside from momentarily using this disconnection to harvest a handshake to crack, you can also just let those deauths keep coming, which has the effect of peppering the client with deauth packets seemingly from the network they are connected to. Because these frames aren't encrypted, many programs take advantage of management frames by forging them and sending them to either one or all devices on a network.

  • Don't Miss: Disable Security Cams on Any Wireless Network with Aireplay-ng
Programs like Aireplay-ng rely on deauthentication packets to execute denial of service attacks, and this kind of tactic is often a part of the first WPA brute-forcing a hacker will learn. Spamming a target with deauth packets is simple but effective, often producing near-immediate action on the mark. But many who use Aireplay-ng may not know that there is another kind of management frame that can be abused to take out clients on a WPA network.

MDK3 vs. Aireplay-ng

To understand Aireplay-ng vs MDK3 as jamming tools, we should take a look at the help file for each tool. For Aireplay-ng, we see the following relevant information.
Aireplay-ng 1.2 rc4 - (C) 2006-2015 Thomas d'Otreppe
  http://www.aircrack-ng.org

  usage: aireplay-ng <options> <replay interface>

  Filter options:

      -b bssid  : MAC address, Access Point
      -d dmac   : MAC address, Destination
      -s smac   : MAC address, Source
      -m len    : minimum packet length
      -n len    : maximum packet length
      -u type   : frame control, type    field
      -v subt   : frame control, subtype field
      -t tods   : frame control, To      DS bit
      -f fromds : frame control, From    DS bit
      -w iswep  : frame control, WEP     bit
      -D        : disable AP detection

  Attack modes (numbers can still be used):

      --deauth      count : deauthenticate 1 or all stations (-0)
      --fakeauth    delay : fake authentication with AP (-1)
      --interactive       : interactive frame selection (-2)
      --arpreplay         : standard ARP-request replay (-3)
      --chopchop          : decrypt/chopchop WEP packet (-4)
      --fragment          : generates valid keystream   (-5)
      --caffe-latte       : query a client for new IVs  (-6)
      --cfrag             : fragments against a client  (-7)
      --migmode           : attacks WPA migration mode  (-8)
      --test              : tests injection and quality (-9)

      --help              : Displays this usage screen
While the tools included are interesting, only --deauth is helpful in jamming a Wi-Fi connection. Based on these filter settings, we can use Aireplay-ng to attack specific nodes on specific APs. We can do so with a command like below.
aireplay-ng -0 0 -a f2:9f:c2:34:55:69 -c a4:14:37:44:1f:ac wlan0mon
This command uses the wlan0 interface in monitor mode to send an unlimited stream of deauths to the client at MAC address a4:14:37:44:1f:ac which is connected to the access point with a MAC address of f2:9f:c2:34:55:69. This attack is surgical and usually starts working immediately, but can fail or not be very effective on some networks.

MDK3, by comparison, has less surgical filters listen in its help file.
MDK 3.0 v6 - "Yeah, well, whatever"

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses.

MDK USAGE:
mdk3 <interface> <test_mode> [test_options]

TEST MODES:
b   - Beacon Flood Mode
      Sends beacon frames to show fake APs at clients.
      This can sometimes crash network scanners and even drivers!
a   - Authentication DoS mode
      Sends authentication frames to all APs found in range.
      Too many clients freeze or reset some APs.
p   - Basic probing and ESSID Bruteforce mode
      Probes AP and check for an answer, useful for checking if SSID has
      been correctly decloaked or if AP is in your adaptors sending range
      SSID Bruteforcing is also possible with this test mode.
d   - Deauthentication / Disassociation Amok Mode
      Kicks everybody found from AP
m   - Michael shutdown exploitation (TKIP)
      Cancels all traffic continuously
x   - 802.1X tests
w   - WIDS/WIPS Confusion
      Confuse/Abuse Intrusion Detection and Prevention Systems
f   - MAC filter bruteforce mode
      This test uses a list of known client MAC Adresses and tries to
      authenticate them to the given AP while dynamically changing
      its response timeout for best performance. It currently works only
      on APs who deny an open authentication request properly
g   - WPA Downgrade test
      deauthenticates Stations and APs sending WPA encrypted packets.
      With this test you can check if the sysadmin will try setting his
      network to WEP or disable encryption.
With MDK3, we see a few attractive options. Option g will attempt to force a network administrator to disable or downgrade encryption by targeting any connection sending WPA encrypted packets with deauthentication attacks.

Option b attempts a beacon flood attack, randomly creating fake APs in the area, and option a attempts to jam a network by sending too many authentication frames. Neither of these attacks works for jamming the network, so instead, the most useful attack is option d.

The Deauthentication / Disassociation Amok Mode attack by default kicks everyone off of any nearby network, but with some filters, we can get it to behave more surgically.

To update your copy of Kali Linux, connect to the internet, open a terminal window, and run the commands below.
apt update
apt upgrade

Step 1> Install MDK3

apt install mdk3
Once this is installed, you can type mdk3 --help to see the main options.

Step 2> Jam an Area

Taking a look at the filter options for MDK3, we can type mdk3 --help d to get the help information for the deauthentication module specifically. Here we can see that it is different from the options for Aireplay-ng. Instead, we have the following options to craft our attack.

-w flag for MAC addresses to ignore, or whitelist.
-b flag for MAC addresses to attack, or blacklist.
-s flag for the speed (packets per second) of the attack.
-c flag for the channel to run the attack on.

Based on these options, we'll need to, at the very minimum, have one piece of information to start jamming anything. First, we'll need to put our network adapter into monitor mode and supply the name of the adapter in monitor mode to the program so it can execute.

To find this, we can type either ifconfig or the newer ip a in a terminal window to find the name of the network adapter. It should be something like "wlan0" or "wlan1."

When you have the name of the device, you can put it into monitor mode with the following airmon-ng command, where wlan0 is the name of your network card.
sudo airmon-ng start wlan0
Once you've done so, type ifconfig or ip a again to get the new name of the device. You can expect it to be something like "wlan0mon."
When you have this information, you can run the script to deauthenticate everything nearby. This is noisy, not as effective as target jamming, and may require one card to work persistently. In my tests, one network card attacking everything nearby caused few noticeable disruptions, whereas three network cards attacking everything nearby caused noticeably annoying disconnections from the network.

To execute the attack, type the following in a terminal window, with wlan0mon as the name of your adapter in monitor mode.
mdk3 wlan0mon d
Because this attack has to hop channels, it is likely to miss some APs and it may not be very fast. It's also very disruptive, as it can disconnect anything in range regardless of whether you have permission or if it's relevant to what you're doing.

Step 3> Jam a Channel

A better option for jamming an area is to jam a channel. To know what channel to jam, we can use another tool called Airodump-ng to discover what channel our target is on. With our card in monitor mode as wlan0mon, we can type the following command to see information about all nearby wireless networks.
airodump-ng wlan0mon
This will display all nearby access points, along with information about them. Here we can see which channel the access point we are targeting is on, which will limit our effect to a single channel rather than marauding around attacking anything that moves.
Once we know the channel the AP is on, we can press Ctrl-C to cancel the scan, and type the following into a terminal window, with the channel we're attacking being channel 6.
mdk3 wlan0mon -c 6
Jamming a channel is very effective, but affects all APs and all devices operating on that channel. This can still be too noisy, so we'll need to refine this further to match the same targeting capabilities as Aireplay-ng.

Step 4> Whitelist & Blacklist Devices

Once we have a specific channel to attack, we can be more precise by adding a blacklist or a whitelist.

To do this, we'll re-run our Airmon-ng scan, and this time, we'll copy the MAC address of the device we wish to attack. I have tested doing this for both the address of the AP and the device you want to attack. Using the MAC address of the AP will attack everything on it, whereas adding the MAC address of the device will only attack it and nothing else on the network.

To get this information, we can type the following to find the APs on the channel we were targeting before, in this case, channel 6.
airodump-ng wlan0mon -c 6
By specifying the channel we found before, we should be able to cut down on the number of devices we see. To find devices connected to our target network, we can look at the bottom of the output and find devices which are listed as being associated with the MAC address matching our target network.

Once we find a MAC address that is associated, we can target it easily. Copy the MAC address, and then open a new terminal window. Type nano black.txt and press Enter to open a text editor window. Now, paste the MAC address of the device you wish to jam, and press Ctrl-X to close the text editor.

Now, we can run MDK3 against the target network by running the command below, with black.txt as the text file we just created containing the MAC addresses we wish to jam.
mdk3 wlan0mon d -c 6 -b ~/black.txt
Running this should very rapidly and persistently jam the device you indicated. In reverse, you can specify networks you want to leave alone the same way, and then run the command with the -w flag instead to attack everything else on the channel instead.

Protected Management Frames & WPA3

While these attacks can be scary depending on what is being targeted like a home security camera, these risks can be mitigated by using Ethernet wherever possible and upgrading the WPA3 when devices supporting it becomes available. One of the core differences between WPA2 and WPA3 is that WPA3 doesn't allow these kinds of attacks by preventing the authentication or disassociation packets from being forged in the first place.

Until then, you can use devices which support protected management frames, or if you suspect that you're being targeted with an attack like this, you can detect it using an intrusion detection system (IDS). Kismet can be used as an IDS to detect this sort of attack, as it will give you a warning on detecting dissasociation or deauthentication frames being sprayed across a network.

I hope you enjoyed this guide to understanding advanced Wi-Fi jamming with MDK3 and Aireplay-ng! If you have any questions about this tutorial or Wi-Fi jamming, feel free to leave a comment And don't forget to like, share and follow to our social meadia platforms. 

THANK YOU.

INSTAGRAM> https://www.instagram.com/cybersecuritytrend/
GOOGLE+> https://plus.google.com/108787701517183226945
FACEBOOK>https://www.facebook.com/Cyber-Security-Trend-994219794073420/?ref=br_rs
Facebook Page:- https://www.facebook.com/theprogrammer.harshit/
Google Plus:- https://plus.google.com/u/0/communiti…/117296242526461886479

Monday, 23 July 2018

Privacy VS Anonymity VS Security . Whats the difference between them. Check it Out.!


Privacy, Security and Anonymity are common terms used in day to day life by normal people. People use these terms but sometimes get confused between these terms.

Privacy: The terms privacy means when the client and the server both knows about each the but the people in the middle doesn't know what they are sending. " Suppose you want to send the letter  from A to C but the B does not know about the content in the letter is that much secured that it is not read by the mediator.


Security:  The terms Security in normal means keeping your system secure with outer surrounding like web attacks, wireless attacks etc.. from hackers and crackers.


Anonymity:  The terms anonymity means when the client access the services given by the server by keeping his identity anonymous that means the server does not knows about the client. For example the people use TOR browser for keeping their identity anonymous from the internet.


So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 

BMW & MIT self-assembly lab envision car interiors with 3D-printed inflatables

BMW & MIT self-assembly lab envision car interiors with 3D-printed inflatables


In 2016, the BMW VISION NEXT 100 CAR Concept  not only amazed motorheads from around the world but also the technology visionaries at MIT’s self-assembly lab, who are renowned for inventing forward-thinking, experimental materials. with the automobile enhancing the almost definite yet still unpredictable autonomous drive abilities, the interior as well as exterior explored a possible future also. both utilized 4D structures that adapted according to function, performance and aesthetics. fast forward two years and, finally, a material has been created that reflects this vision of morphing surfaces, the first 3D-printer inflatable material, thanks to a collaboration between BMW and the self-assembly lab.

named ‘liquid printed pneumatics’, the object which uses rapid liquid printing  technology   is on display at the V&A museum in london, as part of ‘the future starts here’ exhibition. designboom met with martina starke, head of BMW brand vision and BMW brand design, and skylar tibbits, founder of the self-assembly lab, to discuss this project in depth


truly pushing material boundaries, the inflatable silicone material can self-transform, adapt and morph into any size or shape. every man-made thing is very static but this material shows how MIT self Assembly lab is trying to change that preconception. it enhances technologies from soft robotics, where pneumatic controls allow its structure, which consists of seven independent chambers, to vary in not only form but also function and stiffness. this is depending on the amount of air pressure in the system, expanding from complete flatness to bulky sizes.


the material development started as a cross-disciplinary study in 2016, following advancements made with the self-assembly lab’s Project with Steelcase where they invented a method of rapidly and freely printing objects whilst suspended in gel and therefore being unaffected by gravity. going a step further, the lab – together with BMW – achieved a breakthrough when they managed to liquid print air and water-tight inflatable geometries. these can include complex channels and pockets that self-transform, while being only limited in size by the volume of tank. this is in complete contrast to the traditional manufacturing methods of inflatables, which typically includes expensive moulds and limited material properties.


during a factory visit to BMW’s plant in germany, skylar was fascinated by the uniqueness of each step in the process of making a car seat. he thought: ‘can we create an element that can be multiple things but made as one object?’. the result is the printed inflatable material, which, according to both BMW and the self-assembly lab, hints at a concept where car interiors will be able to interact and adapt in the future. they imagine the material to become a solution in seats, where it can provide adaptive support, comfort and massages, as well as being used for impact performance such as airbags. although still very much experimental, the collaborators see this as a step into the future, one that moves away from the typical understandings of automotive design.



Envision car interiors with 3D-printed inflatables



So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Google Plus:- https://plus.google.com/u/0/communiti…/117296242526461886479






Electromagnetic Luggage case defines BMW Motorrad concept 9cento

Electromagnetic Luggage case defines BMW Motorrad Concept 9cento





tting in both style and performance from the streets of munich to the shores of lake como, as well as the mountainous paths in between, the BMW  motorrad ‘concept 9cento’ represents two motercycling worlds on two-wheels. with its world debut at the concorso deligent  2018, where designboom was exclusively present, the design challenges conventions, even to the point where its innovative luggage system takes center stage.




by being able to remove the luggage system on and off, it not only changes the practicality of the motorbike but also the look and feel. it represents two worlds in one concept,’ explains andreas martin, designer of the BMW motorrad ‘concept 9cento’. the design showcases how a focus on functionality does not need to compromise on coolness. the super lightweight case, which features two side compartments, clips on via a hook above the rear carrier and a powerful electromagnet below. furthermore, when attached, it extends the seating area for a second passenger




the innovative storage space highlights the bike’s balancing act to become a dream touring concept. ‘when the rider arrives at the hotel after a day of touring, the case can simply be detached and becomes a cool luggage bag – it is very fashionable,’ states edgar heinrich, head of design at BMW motorrad. the piece, when attached, only further extends the design’s sporty configuration with a short, high rear that contrasts with the compact front. at the same time, its striking style reflects the same definitively sculpted body of the frame, fairing and fuel tank.




the floating panels create a controlled air stream through its gap. this enabled a smaller windscreen to be used, which, overall, helped keep the design small and nimble,’ adds heinrich. the design details, whether in assistance to aerodynamics or just for pure emotion, ensures the motorcycle is defined by an adventurous, agile and fun spirit at first glance. striking additions of bright orange branding and even an electric blue spring adds to this appearance. at the same time, these contrast with the matte seat, reflective chrome body and the intricately milled aluminum central tank cover, rear carrier and footrest holders, which groove in direction towards the front.




although as a bike that dismisses the typical standards of concepts, the ‘concept 9cento’ is clearly BMW. ‘it has these very iconic headlights, on the front and the rear. these are very progressive, very out there, but the features unify our designs,’ continues heinrich. however, ‘the concept has taken the best elements from different segments, such as adventure and touring, and combined them,’ concludes martin. the balanced bike envisions a new middle class that, no matter the location or function, fits perfectly. by including an existing chassis and engine, a variant of the ‘concept 9cento’ or even its luggage system might reach BMW motorrad’s touring segment production very soon.

BMW Motorrad Concept 9cento



So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms. 


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/ 

Google Plus:- https://plus.google.com/u/0/communiti…/117296242526461886479