Posts

World's First Fully Automated Tooth-Brush .

Image
Say hello to Amabrush, the world’s first automatic toothbrush, and goodbye to brushing your teeth for minutes at a time twice a day. Amabrush resembles a mouthguard with soft silicone bristles in it, and it is magnetically attached to a round handle. Put the mouthpiece in, and don’t worry about the toothpaste, it’ll do that for you. It will then go to work, brushing your teeth in the way that your dentist tells you to, in every location in your mouth, all at the same time. Using this device, brushing all of your teeth to perfection only takes about 10 seconds from start to finish, so it’s no surprise that the Amabrush is doing really well on Kickstarter. As this article is being written, they have 25 days to go and have already raised $935,891, surpassing their $56,972 goal.  The Amabrush is just one more example of automation doing what it does best: taking over mind-numbingly dull daily tasks, freeing up humans to think about and do more compelling th...

Difference between Viruses and Malware

Image
Difference Between Viruses and Malware These days many of us talk about like malware and spyware a lot more than the virus. Have you ever wondered what exactly are all these? Beginning with to understand what a virus is we will start with the original biological meaning of the word. Biological viruses like the ones that can make you sick are parasitic. They inject their code in this case either DNA or RNA into a host cell as a means of replication this code causes the cell to make a ton of copies of the virus and ultimately burst to send new viruses everywhere.  Computer Viruses operate via a similar principle unlike some forms of malware which are fully executable programs. Viruses tend to be smaller pieces of code that confused with other programs or files and only replicate when conditions are right. So they can be triggered by a particular date and time opening a certain program or even hitting a certain amount of disk usage. After a virus is triggered, it will try...

CISA CISM CISSP Cyber Security Certification Details

Image
 Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves. That's why jobs in the cyber security field have gone up 80% over the past three years than any other IT-related job. So, this is the right time for you to consider a new career as a cyber security professional. Cyber security experts with industry-standard certification are coming from a wide range of backgrounds, who prepare themselves to protect computer systems and networks from viruses and hackers. But before getting started your career as a cyber security expert, it's important to understand basics of networks and how data moves from place to place, and for this, you are highly advised to gain some valuable cyber security certifications. Cyber security certificatio...

Know the Password of Connected wifi netwoks using CMD

Image
How To Find Passwords of All Connected Wi-Fi Networks using CMD Windows command prompt is a great tool for the people who love command interface rather than Graphical UI. There are a lot of features which are still not implemented in Graphical User Interface can be accessed via CMD. In my previous articles, I’ve talked about a lot of CMD commands. In this article, I am going to share how to find out the password of all connected devices using CMD along with suitable screenshots for clear understanding. Before going further, you should know one thing that whenever you connect to a Wi-Fi network and enter the password,  Windows creates a WLAN profile of that Wi-Fi network. These WLAN profiles are stored in the computer alongside other required details of the Wi-Fi profile. We can uncover these WLAN profiles later by simply using Windows CMD. You can find out all the connected networks and their passwords by using simple commands. These commands can also uncove...

Top 10 Methods Hackers Used To Hack Facebook.

Image
Facebook has become an essential part of our daily life. We share our life moments, photos, videos and text msgs on Facebook. But, when it comes to your privacy and security, you can never be sure on the internet. Facebook and similar websites try their best to ensure the user’s privacy and security but there are still many issues that can cause the hacking of Facebook accounts. So let’s not ignore this and try to understand how a hacker can hack the Facebook accounts and let’s understand how to safeguard Facebook accounts against hackers.   Top 10 Methods used By Hackers For Hacking Facebook Accounts   1. KeyLogging Keylogging is one of the easiest ways to hack a Facebook account. A keylogger is a program that records and monitors the user’s input and keeps a log of all keys that are entered. The keylogger can actively send your inputs to hackers via the Internet. You have to be very careful while dealing with keyloggers because even the computer exp...

What is 5G Network? 5G Explained, Release Date.

Image
No matter what kind of mobile technology that you have in your pocket it quickly becomes yesterday’s news and that may never be more evident than right now as telecommunications providers worldwide are working on 5G. The industry is hoping that 5G will be good enough and will be a game changer in the  telecommunication industry. What is 5G? 5G is a network system which has much higher speed and capacity, and much lower latency. 5G is centered around the idea that the Internet of Things that is connected devices that enable self-driving cars automated homes and more. It will become crucial shortly, and that mobile data networks will be very robust to handle it all with wearables appliances vehicles mobile AR and VR devices and so on. 5G, however, is not only aiming to reduce latency to as low as one millisecond to allow real-time operation of important devices. It also boasts a maximum speed of 20 gigabits per second way faster than the quickest LTE networ...

Top 10 Most Popular WiFi Hacking Tools.

Image
Download Wi-fi Hacking tools: 1. AirCrack AirCrack is available For Linux 2.  AirSnort AirShort is available For Linux and Windows 3.  Cain & Able Cain and Able available For Windows 4. Kismet Kismet is available for Linux, OSX, Windows and BSD platforms 5. NetStumbler NetStumbler is available for Windows 32 bit 6. inSSIDer   inSSIDer is available for Windows and OS X 7.  WireShark Wireshark is available for Windows, Linux, OS X, Solaries, FreeBSD 8.  CowPatty CowPAtty is available for Linux OS 9.  AirJack AirJack is available for Linux 10.  Web Attack Web attack is available for Linux.