Tuesday 29 December 2015

TOP 10 RWANDA GOOD WEBSITE 2015

We are here to demonstrate when and how protect your website network and list of good websites based on: Security, Online-service, Appearance, Content, Functionality, Website Usability, Search Engine Optimization.

Saturday 19 December 2015

TOR AND VPN


The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them are meant to satisfy our belly, and the burger + fries combination does a commendable job enhancing our taste.

Monday 23 November 2015

DID YOU EVER USE TOR!


Tor or The Onion Router, allows anonymous use of internet veiling the actual identity of the user. It protects the user from any traffic analysis and network spying. Tor is perhaps the most

Wednesday 4 November 2015

DECENTRALIZED INTERNET BY YOU FROM KIM

 

Imagine the Kim Dotcom's internet decentralized an powered by you that would offer you to communicate privately with anyone else without censorship, safe from the prying eyes of surveillance authorities.

OPEN WAR: ANONYMOUS AND KU KLUX KLAN THIS 5 NOVEMBER

The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November, the day of the Global Protest movement known as the Million Mask March.

Monday 2 November 2015

HACKING TEAM

It is an information technology company based Milan-ITALY  that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations . Founded 2003 by David Vincenzetti and Valeriano Bedeschi.

Thursday 15 October 2015

ALL VERSIONS OF WINDOWS AFFECTED BY CRITICAL VULNERABILITY


Monday 28 September 2015

COUNTRIES RANKED BY BROADBAND COMMISSION 2015


The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to

Monday 21 September 2015

Microsoft has developed an Operating System powered by LINUX


Once a posted photo of my facebook wall page it is "A computer is like air conditioning; It becomes useless when you open a Windows"  by Linux co-fonder.
Microsoft has built its own Linux-based operating system called Azure Cloud Switch (ACS) and believe me, under Satya Nadella, Microsoft has become more open than ever.

Sunday 13 September 2015

ASHLEY MADISON TOP 30 PASSWORD USERS PUBLISHED

Ashley Madison is a Canada-based online dating service and social networking service marketed to people who are married or in a committed relationship. Its slogan is "Life is short. Have an affair." The website was launched in 2001.The name of the site was created from two popular female names, "Ashley" and "Madison".

Thursday 6 August 2015

DO YOU KNOW A BLUETOOTH SPEAKER?

It’s hard to use your smartphone phone to listen your favourite music while you bath. Photive creates a waterproof portable Bluetooth shower speaker

GLOBAL INTERNET AUTHORITY ^ ICANN HACKED

Monday 20 July 2015

YOU CAN NOT DISABLE WINDOWS 10 AUTOMATIC UPDATES

 Windows 10 is all set to launch on July 29 and will also be available on USB drives for purchase in retail channels.

Thursday 18 June 2015

SIMPLE MESSAGE CAN CRASH SKYPE


A new bug error that crashes Skype almost all users versions of it including both desktop and mobiles with a simple message.

1337day WEBSITE HACKED BY Rab3oun AND X-Gun


Famous website named 1337day .com has been hacked by hackers called Rab3oun and X-Gun. 1337day.com is also called as Inj3ct0r.
Inj3ct0r is a famous market place for hackers to share exploits and hacks
According to Inj3ct0r Twitter account, they first tweeted saying:

IT SECURITY

Whether you are a one-stop-shop IT guy or a network admin on a large IT team you owe it to yourself to learn about Security Information and Event Management (SIEM) technology.

Monday 1 June 2015

HOW TO FIX IPHONE CRASH TEXT MESSAGE BUG

We reported you about a new bug in the core component of iOS and OS X that causes the device's Messages app to crash and iPhones to reboot if it receives a certain string of characters, Arabic characters, via text message.

Friday 29 May 2015

GAANA.COM HACKED, 10 MILLION USERS' DETAILS EXPOSED




Gaana.com -- One of India's most popular music streaming service with more than 10 Million registered users and 7.5 Million monthly visitors -- has reportedly been hacked, exposing the site’s user information database.

THAT IS A SIMPLE TEXT MESSAGE CAN CRASH AND REBOOT YOUR IPHONE



A newly discovered bug in Apple's iOS mobile operating system has emerged this evening that lets iPhone users crash another user’s iPhone by just sending a tiny string of text characters in a message.

Sunday 17 May 2015

INDONESIAN HACKERS HACKED PRESIDENT OF KENYA WEBSITE



The famous Indonesian based hackers from Gantengers Crew hacked and defaced the President of Kenya (Uhuru Kenyatta) website on 11th May 2015.Hackers left a deface page along with their online handles on the hacked Kenyan President website.Proper reason behind this attack is not found yet as well not stated by the hackers.

Friday 15 May 2015

HOW TO GET EARTHQUAKE ALERTS ON ANDROID PHONE

Today we are here with a method for How To Get Earthquake Alerts On Android Phone. Today we all know the Nepal earthquake Tragedy that happens recently. This type of natural disasters can make a great loss of money and life. So it is better to get alerts of these type of disasters and with the advancement of technology there are certain huge notifying companies that can tell you the about upcoming disasters by analyzing the weather reports. So in this post i will tell you a method to get alerts of Earthquake on your android. Just follow the below post to proceed.

Saturday 9 May 2015

SAUDI HACKER DEFACED AND HACKED IRAN MINISTRY OF DEFENSE WEBSITE

A Saudi hacker using the name “RxR HaCker” hacked and defaced the official website of Iranian Ministry of Defense on 7th may, according to Hack Read.Hacker left a deface page along with a message on the hacked site, bashing and insulting the Iran’s supreme leader Ali Khamenei over war in Yemen.

Friday 1 May 2015

TOP 10 FREE WEB HOSTING SITES 2015



Here is a list of top 10 free web hosting sites for 2015. We have selected the best web hosters that makes it easy for you by selecting the hosting services.

MAN IMPLANTS NFC CHIP IN HIS HAND TO HACK ANDROID PHONES



When you hold an Android phone, you just hold it. When Seth Wahle holds the same phone, an NFC chip in his hand can load a malicious web page that exploits the phone. So, should you stop letting people touch your phone from here on out? Well, you don’t have to freak out just yet.

Thursday 23 April 2015

IOS 8 VULNERABILITY LETS HACKERS CRASH ANY IPHONE AND IPAD WITHIN WI-FI RANGE


Security researchers have uncovered a zero-day vulnerability in iOS 8 that could repeatedly crash users' Apple iPhones, iPads and iPods when the devices connect to a malicious wireless hotspot.
It’s like Denial of Service (DoS) attack on Apple's iOS devices that results in crashing either individual iOS apps or users' entire iPhones.

Saturday 11 April 2015

FREAK ATTACK: HOW TO PROTECT YOURSELF


The recently disclosed FREAK (Factoring attack on RSA Export Keys) attack is an SSL/TLS vulnerability that is affecting major browsers, servers and even mobile devices.

HOW HACKERS COULD DELETE ANY YOUTUBE VIDEO WITH JUST ONE CLICK




A security researcher has discovered a simple but critical vulnerability in Google-owned YouTube that could be exploited by anyone to knock down the whole business of the popular video sharing website.

Kamil Hismatullin, a Russian security bod, found a simple logical vulnerability that allowed him to delete any video from YouTube in one shot.

Monday 30 March 2015

YOUR LOCATION HAS BEEN SHARED 5,398 TIMES IN LAST 14 DAYS

Do you realize how often your smartphone is sharing your location data with various companies? It is more than 5000 times in just two weeks. That is little Shocking but True!

GITHUB HIT BY MASSIVE DDOS ATTACK FROM CHINA

Github – a popular coding website used by programmers to collaborate on software development – was hit by a large-scale distributed denial of service (DDoS) attack for more than 24 hours late Thursday night.

It seems like when users from outside countries visit different websites on the Internet that serve advertisements and tracking code from Chinese Internet giant Baidu, the assailants on Chinese border quietly inject malicious JavaScript code into the pages of those websites.

The code instructs browsers of visitors to those websites to rapidly connect to GitHub.com every two seconds in a way that visitors couldn't smell, creating "an extremely large amount of traffic," according to a researcher who goes by the name A nthr@x.
"A certain device at the border of China’s inner network and the Internet has hijacked the HTTP connections went into China, replaced some JavaScript files from Baidu with malicious ones," A nthr@xwrote at Insight Labs.
"In other words, even people outside China are being weaponized to target things the Chinese government does not like, for example, freedom of speech."
The attack specifically targets two popular Github projects – GreatFire and CN-NYTimes – anti-censorship tools used to help Chinese citizens circumvent The Great Firewall Of China, the government's censorship of Internet access in China.
·         GreatFire – A well-known group on Github that fights against Chinese government censorship of the Internet.
·         CN-NYTimes – A group that hosts New York Times mirrors to allow Chinese citizens to access the news website, which is normally blocked in China.
Since Baidu search engine is extremely popular, the attack results in the massive flood of traffic on the Github website which begun around 2 AM UTC on Friday and last for more than 24 hours.


GitHub said yesterday that the flood of traffic, a continuous string of distributed denial-of-service attacks, caused irregular outages and that their admins have been working to mitigate the attack with periodic success.
However, the most recent status on the site says the company has deployed new defenses.

"We're aware that GitHub.com is intermittently unavailable for some users during the ongoing DDoS," GitHub said in a message posted at 1549 UTC Friday.
"Restoring service for all users while deflecting attack traffic is our number one priority. We've deployed our volumetric attack defenses against an extremely large amount of traffic. Performance is stabilizing," a message posted by Github at 15:04 UTC says.
Later, the company noted, "We've been under continuous DDoS attack for 24+ hours. The attack is evolving, and we're all hands on deck mitigating."

The researcher analyzed the attack and dug out the injected JavaScript that looks like this (pastebin), once unscrambled.

Chinese search engine giant has denied any involvement in the current DDoS attack, saying that Baidu was not intentionally involved in any traffic redirection. "We've notified other security organizations," the company said in a statement, "and are working together to get to the bottom of this."

Thursday 26 March 2015

HACKING AIR-GAPPED COMPUTERS USING HEAT


An air-gapped computer system isolated from the Internet and other computers that are connected to external networks believes to be the most secure computers on the planet -- Yeah?? You need to think again before calling them 'safe'.

Monday 23 March 2015

SIMPLEST WAY TO CHECK IF YOUR EMAILS ARE BEING TRACKED

You might be not aware of the companies that know pretty much everything related to your email activities like when you’ve opened email sent by one of their clients, where you are located, what device you’re using, what link you click, all without your consent, even if you haven’t click any link provided in that email.

TOR — HOW TO PROTECT YOUR DIGITAL ENVIRONMENT?

 

Are you aware of everything that your users are accessing from your environment?

While most of the time, non-work-related Internet browsing is harmless (looking at pictures of cats, online shopping, social media, etc.) there are some instances where you could be an unknowing and unwilling participant in criminal activity. That is, when users hide that activity via the Tor network, or the Dark Net.

SMART ATM OFFERS CARDLESS CASH WITHDRAWAL TO AVOID CARD SKIMMERS

Banks have tried every effort, from providing Magnetic Stripes based Credit and Debit Cards to Chip-and-Pin Cards, in order to secure its users from credit card cloning and card Skimmers.
It has been known from years that Magnetic stripe are incredibly hackable, but Chip-n-Pin cards have also been hacked and successfully cloned by a group of security researchers. 

DEEP WEB DRUG MARKET DISAPPEARED SUDDENLY OVERNIGHT, $12 MILLION IN BITCOIN MISSING

Evolution -- The largest Deep Web drugs marketplace, disappeared suddenly overnight from the Internet. But unlike Silk Road, there is no indication that the law enforcement took down the Evolution marketplace.

Thursday 12 March 2015

STUXNET PATCHED AFTER FIVE YEARS



So you thought Microsoft already issued a patch that stopped the Stuxnet worm from spreading all the way back in 2010? So did everybody else. it would however seem that the emergency update didn’t quite do it and Stuxnet Incorrectly patched for five years, based on a report by HP’s TippingPoint security wing.

Tuesday 3 March 2015

HOW TO HOST YOUR WEBSITE ON LINUX

Alright here is the method, on how to host your website on Linux server (vps). Since these days you can see hosting a website is costly so for this you can host your website on Linux server at low cost and with better brand width where it can hold a lot of traffic than shared hosting.

Saturday 21 February 2015

SIX REASONS : WHATSAPP WILL NOT TAKE THE PLACE OF SMS



Social media and Instant messaging apps aren’t taking over multiple methods of communication and advertising. It already has taken over, big time. There are new programs seem to be released daily that claim to make our communications with friends and companies quicker,easier,and more efficient. With all the different platforms used on phones, tablets,and computers,we need to be able to use a program that allows all these platforms and operating systems to work together as well as possible.

Tuesday 10 February 2015

LINUX BASIC COMMANDS



 The below commands are important and often used for more checkout the image at the bottom of the article


  • mkdir – make directories
    Usage: mkdir [OPTION] DIRECTORY…
    eg. mkdir lhn
  • ls – list directory contents
    Usage: ls [OPTION]… [FILE]…
    eg. ls, ls ­l, ls lhn
  • cd – changes directories
    Usage: cd [DIRECTORY]
    eg. cd lhn
  • pwd ­-  print name of current working directory
    Usage: pwd

Saturday 7 February 2015

WHY MY COMPUTER WORKS SO SLOW ?

f your computer is older more than five years then the age of your computer could be the reason of the slow performance. Computers are advance in technology and capabilities and newer, more advanced software programs come out to run properly on the new computers. Older computers are not able to run the new programs which can cause them to slow down your computer. If your computer is older than five years then we suggest you to buy a new computer or accept that.

Thursday 5 February 2015

HOW TO CAPTURE A USERS IP ADDRESS

Step 1 – Get visitors IP address with PHP
Getting a visitors IP address can be important for a lot of reasons, for example, logging, geo targeting, redirecting the user and so on. All of the IP relevant informations can be found in the $_SERVER array. The simplest way to get the visitors IP address is as simple as the following code, by reading the REMOTE_ADDR field:

Tuesday 3 February 2015

HOW TO PROTECT YOUR SELF FROM HACKERS





Every six seconds, a personal computer is hacked. In fact, 80% of computer has been hacked. Statistics show that for seven out of 10 people who get hacked, it’s because they indirectly gave the hacker their password. With computer hacking incidents on the rise, it’s important to educate yourself so that you don’t fall victim.
Here are 10 ways to protect yourself from cyber security attack:
1. Keep your personal information private:- On social media accounts like Facebook and Twitter, for example, don’t post the names of your family since these same names may act as your answers to your secret questions or even as passwords to your accounts. Also, don’t post what grammar, middle school or high school you attended, where you work or where you were born. These are often answers to secret questions if you ever forget your password and have to reset it.

Saturday 31 January 2015

TROJAN INFECTS 110,000 FACEBOOK USERS IN TWO DAYS

A new Trojan currently circulating on Facebook has managed to propagate to more than 110,000 users in just two days, a researcher says, by tagging friends of the victim in a post directing to an alleged video. Tag scams are not new but recently they have been seen to be used with increased frequency.
Trojan distributed more aggressively

Thursday 29 January 2015

HOW TO BECOME A GOOD ANDROID DEVELOPER

 Imagine what your android smart phone would be without those apps that you love so much. Starting from the apps that you use to access your social media pages and games, apps are essentially make your phone what it is.
Our lives today are so dependent on apps and there are new ones being developed daily for different purposes. The apps have touched our lives in a way that if today they were to disappear from our phones life would never be the same again. Imagine if you did not have that app that you use for your diet program or work out? What if you were unable to access your favorite social media site because you did not have an app to do so?

Wednesday 28 January 2015

YOUTUBE WILL NOW DEFAULT TO HTML5 PLAYERS FOR BETTER SUPPORT ON MORE DEVICES

 Today, YouTube announced that its Web video player will now default to HTML5 over Adobe Flash to add more flexibility for developers, bloggers and consumers.
The team wrote that it waited on switching to HTML5 players due to numerous technical issues. For example, HTML5 previously lacked support for Adaptive Bitrate (ABR), which helps reduce buffering.

With ABR support, YouTube says it is able to use MediaSource Extensions to run smooth live streams on a variety of devices, including the Xbox One, Playstation 4, Chromecast and most popular Web browsers such as Chrome, Safari 8 and IE 11.
YouTube also says that since HTML5 supports VP9 codec, it can help save bandwidth, load time and file size. The team encourages developers to start using the iframe API rather than Flash so mobile devices that do not support Flash can easily stream YouTube videos.
YouTube has offered HTML5 functionality for many years now, so it seems overdue for the company to finally make this the standard platform.
You can read the full details of YouTube’s HTML5 benefits here.
➤ YouTube now defaults to HTML5 video

Monday 26 January 2015

FACEBOOK WAS DOWN SINCE MORNING IN RWANDA

Facebook was down since morning, then 09h:09' was working

THE PIRATE BAY UPDATED WITH PHOENIX IMAGE AND SET TO RETURN ON 1 FEBRUARY



The Pirate Bay — an infamous Torrent website predominantly used to share copyrighted material free of charge — could be relaunched on 1st February, the date the website has long been expected to return.

The website went dark from the Internet following a raid in Sweden last month. After a complaint was filed by a group called the Rights Alliance, Swedish Police officers raided The Pirate Bay's server room in Stockholm and seized several servers and other equipment.

Monday 19 January 2015

FAKE WHATSAPP PLUS APP RUMORED TO BE NEXT OFFICIAL NEW WHATSAPP



Several reports from the popular news websites had suggested that WhatsApp, the widely popular messaging application, is working on a new version of its instant messaging client, called WhatsApp PLUS, in order to provide its users a lot of handy new features. However the news seems to be completely fake!!
                    
WhatsApp Plus has already been launched a long ago and is not at all genuine as it is not associated with the Facebook-owned WhatsApp. Many users claimed to have already used WhatsApp Plus before.

RWANDA WEBSITE CALLED UMUSEKE WAS HACKED BY ANOUNYMOUS


The technologies have many advantages and disadvantages then Rwanda like one country located in Eastern africa where technology advanced,some website like umuseke wae down from morning today until now.All domain umuseke.com and http://umuseke.rw/

Thursday 1 January 2015

WHO HACKED SONY PICTURES ENTERTAINMENT?


Everyone has a theory about who really hacked Sony Pictures Entertainment Inc.
Despite President Barack Obama's conclusion that North Korea was the culprit, the Internet's newest game of whodunit continues. Top theories include disgruntled Sony insiders, hired hackers, other foreign governments or Internet hooligans. Even some experts are undecided, with questions about why the communist state would steal and leak gigabytes of data, email threats to some Sony employees and their families and then threaten moviegoers who planned to watch "The Interview" on Christmas.