Posts

TOR Enabled Sim Card will keep your communication Anonymous

Image
Although technology has overall made life easier, it has made things a lot less private. As a result, you need to be extra careful when you are browsing online, as it very difficult to maintain privacy out there. It is even possible that your ISP or VPN provider is maintaining a log of everything that you do online. So, how do we protect our online privacy? Brass Horns Communications, a UK-based non-profit internet service provider that focuses on privacy and anti-surveillance services, has an answer for this. The company is currently beta-testing a SIM card that will automatically route your data through Tor, thereby securing online privacy and evading surveillance. For those unaware, Tor (originally known as The Onion Router) is a free piece of software for enabling anonymous communication. Tor directs Internet traffic through a free, volunteer-operated network of computers around the world to hide a user’s location and usage from anyone conducting network surveillance or tr...

Had you ever imagined of a Cell-Phone without a Battery. Check it Out..!! || techtalksgroup ||

Image
Some years before the basic requirement of any person is simply Food, Cloths, and Shelter but today one more thing is added to this queue at that is Cell-phones . Cell-Phones had become the basic requirements of today user . No work is remained now a days that cannot be performed using a smartphones. Bu the biggest problem that comes with smartphone user is to charge the phone, but suppose a lifestyle where you have to just use the smartphone without getting worry about its battery. Phone manufacturers are constantly striving to create new products that can run longer on a single battery charge but a team of engineers at the University of Washington (UW) has gone the extra mile: They built a cell phone that doesn't need a battery at all. When radio waves interact with an antenna, the waves induce electricity to flow through the antenna. While radio waves carry energy and we're surrounded by transmitters generating these waves, this doesn't mean you could power yo...

What are Rootkits..?? || techtalksgroup ||

Image
What Is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. What Can a Rootkit Do? A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infecte...

What is GodMode in Windows.? And how to activate it.. || techtalksgroup ||

Image
GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. Once enabled, God Mode lets you do all sorts of things, like quickly open the built-in disk defragmenter, view event logs, access Device Manager, add Bluetooth devices, format disk partitions, update drivers, open Task Manager, change display settings, adjust your mouse settings, show or hide file extensions, change font settings, rename the computer, and a lot more. The way GodMode works is actually very simple: just name an empty folder on your computer as outlined below, and then instantly, the folder will turn into a super-handy place to change all sorts of Windows settings. The steps for turning on God Mode is the exact same for Windows 10, Windows 8, and Windows 7: Make a new folder, anywhere you like. To do this, right-click or tap-and-hold on any empty space in any folder in Windows, and c...

New Zero-Day Vulnerability Found Effecting All Versions of Windows || techtalksgroup ||

Image
A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline. Discovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database Engine that could allow an attacker to remotely execute malicious code on any vulnerable Windows computer. The Microsoft JET Database Engine, or simply JET (Joint Engine Technology), is a database engine integrated within several Microsoft products, including Microsoft Access and Visual Basic. According to the an advisory released by Zero Day Initiative (ZDI), the vulnerability is due to a problem with the management of indexes in the Jet database engine that, if exploited successfully, can cause an out-out-bounds memory write, leading to remote code execution. An attacker must convince ...

Chrome vs Chromium . || techtalksgroup ||

Image
Chrome is a massively popular web browser that is developed and released by Google, and Chromium is a niche open-source browser that has far fewer users. However, Chrome and Chromium have a lot more similarities than differences. In fact, Chrome uses the same source code as Chromium, just with extra features that Google adds on top. What is Chromium? Chromium is an open-source web browser that's developed and maintained by the Chromium Project. Since it's open source, anyone is free to take and modify the source code as the please. However, only trusted members of the Chromium Project development community can actually contribute their own code. Regular users are able to download a frequently updated version of Chromium, all compiled and ready to use, from download-chromium.appspot.com . What is Chrome? Chrome is a proprietary web browser that is developed, maintained, and released by Google. Since it's proprietary, you are free to download and use it, but you...

Pure Blood v2.0 - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter ||techtalksgroup||

Image
A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter. Web Pentest / Information Gathering: Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz (NEW) File Fuzz (NEW) Shodan Search (NEW) Shodan Host Lookup (NEW)   Web  Application Attack: (NEW) Wordpress  | WPScan  | WPScan Bruteforce  | Wordpress Plugin Vulnerability Checker  Features: // I will add more soon.  | WordPress Woocommerce - Directory Craversal  | Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting  | WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion  | WordPress Plugin Events Calendar - 'event_id' SQL Injection Auto SQL Injection Features: | Union Based  | (Error Output = False) Detection  | Tested on 100+ We...