Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts
Friday, 18 October 2013
Common Computer Acronyms
Saturday, 5 October 2013
Awesome websites to Learn Hacking
Awesome Websites to Learn Hacking
You might also like:How to change Splash screen of Photoshop
Are you one of those who are interested in Hacking and want to learn How the Hackers do those stuff? Than the websites mentioned below will help you pull out something and you can do those hacky stuffs too.
Let's move to our list of Awesome Websites to Learn Hacking !
Backtrack
If you have used Backtrack than you must have known it's usefulness in Hacking and Penetration Testing. This website provides many tutorials using Backtrack and they have their own training programs. Visit this Site: Backtrack-Linux.orgHack This Site!
Hack This Site is one of the best ethical hacking training website. This site provides many hacking and cracking challenges to test your skills. This site also provides vast selections of ethical hacking articles and tools. Visit this Site: HackThisSite.org
HellBound Hackers
HellBound Hackers is a security training website which provides wide range of topics including programming, cracking, encryption etc. This website also provide hacking, cracking, encryption and many challenges too. Visit this Site: HellBoundHackers.orgIf you like this article please share it!
If you have any questions put them on comments!
You might also like:How to change Drive Icon in Windows
Sunday, 22 September 2013
How secure is iPhone 5S fingerprint
Prints in the cloud? Some observers have wondered aloud on Twitter and elsewhere whether Apple, armed with a potential database of millions of thumbprints, might turn over some customers' prints to the National Security Agency (NSA) if ordered to by the government. After all, Apple was reported to have been a partner in the NSA's PRISM surveillance program and has acknowledged it hands over user data when mandated by the government. But Apple has said users' fingerprint information will be encrypted and stored securely inside the phone's new A7 processor chip instead of on Apple's servers or backed up to iCloud, the company's Web-based storage service. Apple also has said it's not allowing third-party applications to access the scanner -- at least not yet. That's good news for users' privacy, experts say -- even amid news reports that the NSA can spy on smartphones. "Your iPhone knows who you call. It knows where you are. And in the newest versions, it will know your thumbprint. Given revelations about how the NSA can access Apple devices, should you be worried about it having that biometric data? No. No no no no no no. Come on. No," writes Philip Bump in The Atlantic. "Your fingerprint ... isn't traveling anywhere. Is it possible that the NSA could ask Apple to upload a user's fingerprint from the phone so that it can be transmitted to the agency? Sure. But that likely wouldn't be a request that comes through PRISM; it would probably require a separate warrant. Not impossible, but, given the burden of demonstrating need for a warrant, not as easy as a few keystrokes." Fingerprint hacks Then there's the question of hackers replicating fingerprints to break into phones. "Fingerprints are not private, you leave them lying around everywhere, and if someone has enough incentive -- and the resources available to them -- they may try to defeat any security system that you trust your fingerprint to unlock," writes noted security researcher Graham Cluley on his blog. "One thing is for sure. With the launch of the iPhone 5S, more people will be using fingerprint sensors as part of their daily security than ever before -- and the hackers will be certainly intrigued to see how they might circumvent it," Cluley adds. Dino Dai Zovi, co-author of "The iOS Hacker's Handbook," told CNNMoney that if he were trying to hack an iPhone 5S, he would first try to lift prints from elsewhere on the device "and figure out how to replay those to the sensor to log in to the person's phone." This is not as hard as it might sound. A decade ago, a Japanese cryptographer demonstrated how to fool fingerprint-recognition systems by transferring latent prints to a "finger" made from gelatin, the ingredient found in Jell-O and other sweets. It was informally known as the "Gummi bear hack." But Apple's new Touch ID technology is presumably more sophisticated than those old systems. In addition, latent prints may not provide enough of an overlapping match to unlock a phone, says digital-security expert Robert Graham. "You use a different part of your finger to touch the iPhone sensor than what you use to touch other things," writes Graham on the Errata Security blog. "That means while hackers may be able to lift your thumbprint from you holding other objects, or from other parts of the phone itself, they probably can't get the tip print needed to do bad things on your iPhone. "This means the fingerprint databases held by the NSA, FBI, and border security are largely useless at unlocking your phone: they don't cover the same parts of your fingers," Graham adds. But there is another potential vulnerability in the iPhone 5S's fingerprint scans. The Touch ID system also can be used as a secure way to approve purchases from iTunes or the App Store, which makes some security experts uncomfortable. "If Apple is right that fingerprints never leave the device, that means the new iPhones will be sending some sort of authentication token to Apple servers to verify that the end user has produced a valid print," writes Dan Goodin in Ars Technica, a CNN.com content partner. "If attackers figure out a way to capture and replay users' valid tokens, it could lead to new ways for criminals to hijack user accounts."
Source: CNN and HBH
You might also like:facebook chat codes
Friday, 20 September 2013
Introduction to Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos(στεγανός) meaning "covered or protected", and graphei(γραφή) meaning "writing".
Source:Wikipedia
Further reading:Steganography
Source:Wikipedia
Further reading:Steganography
Monday, 16 September 2013
Internet Companies and their Founders
Founders of Internet services/companies and their Innovations
Below are the list of founders of internet company and their innovations
1. Google: Larry Page & Sergey Brin
2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams
23. WikiLeaks: Julian Assange
Thursday, 5 September 2013
Your Facebook account has two password
Yes!, you heard it right your facebook account has two passwords, first is your real password and second is your real password with case inversed. For example if your password is 'Apple' then your other password will be 'aPPLE'. I've came across an article on ZDnet in which I've found it. But it is not a loophole or any kind of bug instead it is a feature of facebook. Facebook developers made it because of the fact that people having problem log in to their account when caps lock is on. I've tried it and it worked. Try yourself and see the Magic.
Check out my previous article here.
Subscribe to:
Posts (Atom)