Posts

Essential skills required for Coders. || techtalksgroup ||

Image
If you want to be great at coding you need to move beyond the code and develop some essential skills for coders. To become a great coder it requires more than learning sequences of 0’s and 1’s or complicated programming languages. Anyone can learn a computer language, but the great coders, the ones who create game changing products, who truly excel in the field, possess far more than a knowledge of coding languages. They have a certain mindset that makes them imminently qualified for this technology field that is becoming increasingly dominant in our society. Essential Skills For Coders What you will discover in this article! Typing Pretty much anyone who is going to have a career at the keyboard needs to develop strong typing skills. After trying many different typing tools our favourite is Typing Instructor for Kids Platinum 5. It’s set up as a game, which my boys really enjoy. Great Editor Coding is a finicky business. One missed colon will send y...

Most Hackable Neaby Devices and Gadgets. || techtalksgroup ||

Image
Electrical grids, traffic lights, highway signs, air-traffic control, and even hospital networks—they're the large-scale operating systems we rely on to make our lives easier and better. And believe it or not, they're all connected to the Internet. These web-connected systems are so diverse in what they do, they fall into a very nondescript category called the "Internet of Things" (IoT). You might have heard of IoT. It's the same term thrown around to describe those cool gadgets that help us track our fitness, drive our cars, share our photos, stream our music, and check our email from almost anywhere. Chances are, no matter what you've done today, you've taken advantage of some device or system connected to the worldwide "web" of the Internet of Things. However, despite IoT's promising future, it has one very serious setback: it's vulnerable to attack. As much as 70 percent of IoT devices contain security flaws, which means that billions...

What are Red Rooms.? Do they really Exist in the Dark/Deep Web. ?

Image
Red Rooms are basically one of the darkest places on the deep web. It basically charge money in bitcoins for viewing unimaginable videos like murders, rapes etc... ‘Red Room’ sites, the story goes, are darkweb sites where users pay thousands – or tens of thousands – to watch rapes and murders live. Urban legends about the existence of ‘Red Rooms’ have circulated for years – but as yet, there’s no evidence that they exist. If ‘Pay per View’ torture sites do exist, it’s almost certain that they don’t work via Tor (the software used to access dark web sites) – which is too slow to stream video live. The term ‘Red Room’ has been around on the internet for more than  decade – thought to originate either from ‘red rum’/’murder’, or from the 1983 horror film Videodrome, where torture is shown live on satellite TV in a red-painted room. The video Daisy’s Destruction – widely discussed on forums and on Reddit – is not actually a snuff film, but features horrifying abuse and sexual ...

What is Cookie Stuffing and Ad Fraud Scheme ? || techtalksgroup ||

Image
Cookie Stuffing, also known as Cookie Dropping, is one of the most popular types of fraud schemes in which a website or a browser extension drops handfuls affiliate cookies into users' web browser without their permission or knowledge. This type of SIVT involves inserting, deleting, or misattributing cookies to manipulate or falsify the prior activity of users. Also known as ‘cookie dropping,’ it pertains to the fraudulent manipulation of visitor cookies to disguise or conceal legitimate user cookies. Often considered a black hat online marketing technique, cookie stuffing can potentially generate fraudulent affiliate income for the cookie stuffer by overwriting legitimate affiliate cookies. A website visitor may unknowingly receive a third-party cookie from a website unrelated to the one actually visited. Later on, if the visitor goes to a targeted website and completes a qualifying transaction or makes a purchase, the cookie stuffer illegally earns a commission from the...

eMMC vs SSD ?? What's the Difference. Check it Out.!! || tech talks group ||

Image
If you're shopping for a new laptop, there are a lot of factors to think about. One of the most important aspects to consider is the kind of storage a laptop offers. Your average laptop (whether it's a 2-in-1, big and expensive, or budget-friendly and compact) will most likely sport either eMMC storage or SSD storage, but how are they different? Keep reading to learn more about eMMC hard drives vs. SSD hard drives. What Is eMMC Storage and How Does It Work? eMMC (embedded MultiMediaCard) storage is a form of internal storage made up of a controller and NAND flash memory, both of which are located in one integrated circuit. eMMC storage chips are usually embedded in a given device's motherboard. The controllers housed within eMMC chips have the ability to put data into storage, which, according to SearchStorage, allows the device's CPU to conserve its already limited speed and power for other computing tasks. In addition, eMMC's use of NAND flash memory also r...

Security Bugs and Vulnerability - The Vulnerability Landscape

Image
Cyber security is an arms race between offensive and defensive capabilities, and unfortunately, we are losing this battle. As users, we want better technology doing cooler things enabling us to do more. But the more we have, the more we rely on it,  and the more complex these systems become. Complexity is the enemy of security. In fact, complexity is a nemesis of security, which is one of the main reasons why we’re losing this arms race. I’m going to get you up to speed on security bugs and vulnerabilities and how they affect your security. A security bug and a vulnerability are actually the same thing. So they’re synonyms for each other. So if I say security bug or vulnerability, it’s the same thing. And it’s an error. It’s an error written into software that creates a potential for a threat agent, such as a hacker, to exploit it. So an example might be the recent Heartbleed bug which you may have heard about because it was on mainstream news. This is a bug in something ...

Spyware, Adware, Scareware, Pups & Browser Hijacking || tech talks group ||

Image
Spyware have its main purpose is to gather information and send it back to the attacker, well, to spy. The attackers don’t generally want to cause damage directly, but want to compromise your privacy and anonymity based on some agenda they’ve got. Spyware is intelligence gathering malware. For example, a rootkit can also be a Trojan horse, someone could call spyware a virus. The point is just to understand the variants that exist and the possible purpose of the malware.  Adware , which some people consider it to be a form of spyware. Is undesirable software that forces advertisement on you. There are millions of different variants of this. One of the most annoying and destructive form of adware is called Cool Web Search. You may even have encountered it yourself, but there’s nothing cool about it at all. Know Your Enemy - The Current Threat and Vulnerability Landscape It hijacks your default search engine, it ...