We are here to demonstrate when and how protect your website network and list of good websites based on: Security, Online-service, Appearance, Content, Functionality, Website Usability, Search Engine Optimization.
Tuesday, 29 December 2015
Saturday, 19 December 2015
TOR AND VPN
The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them are meant to satisfy our belly, and the burger + fries combination does a commendable job enhancing our taste.
Monday, 23 November 2015
DID YOU EVER USE TOR!
Tor or The Onion Router, allows anonymous use of internet veiling the actual identity of the user. It protects the user from any traffic analysis and network spying. Tor is perhaps the most
Wednesday, 4 November 2015
DECENTRALIZED INTERNET BY YOU FROM KIM
Imagine the Kim Dotcom's internet decentralized an powered by you that would offer you to communicate privately with anyone else without censorship, safe from the prying eyes of surveillance authorities.
OPEN WAR: ANONYMOUS AND KU KLUX KLAN THIS 5 NOVEMBER
The Online Hacktivist group Anonymous announced it plans to reveal the identities of about 1,000 Ku Klux Klan (KKK) members on 5th November, the day of the Global Protest movement known as the Million Mask March.
Monday, 2 November 2015
HACKING TEAM
It is an information technology company based Milan-ITALY that sells Encryption Cracking Tools,
offensive intrusion and surveillance capabilities to governments, law
enforcement agencies and corporations as well as other customers to break encrypted communications. Founded 2003 by David Vincenzetti and Valeriano Bedeschi.
Thursday, 15 October 2015
ALL VERSIONS OF WINDOWS AFFECTED BY CRITICAL VULNERABILITY
Microsoft has rolled out six security updates this Patch Tuesday, out of which three are considered to be "critical," while the rest are marked as "important."
Bulletin MS15-106 is considered to be critical for Internet Explorer (IE) and affects absolutely all versions of Windows operating system.
Monday, 28 September 2015
COUNTRIES RANKED BY BROADBAND COMMISSION 2015
The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to
Monday, 21 September 2015
Microsoft has developed an Operating System powered by LINUX
Once a posted photo of my facebook wall page it is "A computer is like air conditioning; It becomes useless when you open a Windows" by Linux co-fonder.
Microsoft has built its own Linux-based operating system called Azure Cloud Switch (ACS) and believe me, under Satya Nadella, Microsoft has become more open than ever.
Sunday, 13 September 2015
ASHLEY MADISON TOP 30 PASSWORD USERS PUBLISHED
Ashley Madison is a Canada-based online dating service and social networking service marketed to
people who are married or in a committed relationship. Its slogan is "Life is
short. Have an affair."
The website was launched in 2001.The name of the site was created from two popular female names, "Ashley"
and "Madison".
Thursday, 6 August 2015
DO YOU KNOW A BLUETOOTH SPEAKER?
It’s hard to use your smartphone phone to listen your favourite music while you bath. Photive creates a waterproof portable Bluetooth shower speaker
GLOBAL INTERNET AUTHORITY ^ ICANN HACKED
ICANN (Internet Corporation for Assigned Names and Numbers) – the
organisation responsible for allocating domain names and IP addresses
for the Internet – has been hacked, potentially compromising its customers’ names, email addresses, hashed passwords, and more.
Monday, 20 July 2015
YOU CAN NOT DISABLE WINDOWS 10 AUTOMATIC UPDATES
Windows 10 is all set to launch on July 29 and will also be available on USB drives for purchase in retail channels.
Thursday, 18 June 2015
SIMPLE MESSAGE CAN CRASH SKYPE
A new bug error that crashes Skype almost all users versions of it including both desktop and mobiles with a simple message.
1337day WEBSITE HACKED BY Rab3oun AND X-Gun
Famous website named 1337day .com has been hacked by hackers called Rab3oun and X-Gun. 1337day.com is also called as Inj3ct0r.
Inj3ct0r is a famous market place for hackers to share exploits and hacks
According to Inj3ct0r Twitter account, they first tweeted saying:
IT SECURITY
Whether you are a one-stop-shop IT guy or a network admin on a large IT team you owe it to yourself to learn about Security Information and Event Management (SIEM) technology.
Monday, 1 June 2015
HOW TO FIX IPHONE CRASH TEXT MESSAGE BUG
We reported you
about a new bug in the core component of iOS and OS X that causes the device's
Messages app to crash and iPhones to reboot if it receives a certain string of characters, Arabic
characters, via text message.
Friday, 29 May 2015
GAANA.COM HACKED, 10 MILLION USERS' DETAILS EXPOSED
Gaana.com -- One of India's most
popular music streaming service with more than 10 Million registered users and
7.5 Million monthly visitors -- has reportedly been hacked, exposing the site’s
user information database.
THAT IS A SIMPLE TEXT MESSAGE CAN CRASH AND REBOOT YOUR IPHONE
A newly
discovered bug in Apple's iOS mobile
operating system has emerged this evening that lets iPhone users crash another
user’s iPhone by just sending a tiny string of text characters in a message.
Sunday, 17 May 2015
INDONESIAN HACKERS HACKED PRESIDENT OF KENYA WEBSITE
The famous Indonesian based hackers from Gantengers Crew hacked and defaced the
President of Kenya (Uhuru Kenyatta) website on 11th May 2015.Hackers left a
deface page along with their online handles on the hacked Kenyan President
website.Proper reason behind this attack is not found yet as well not stated by
the hackers.
Friday, 15 May 2015
HOW TO GET EARTHQUAKE ALERTS ON ANDROID PHONE
Today we are here with a method
for How To Get Earthquake Alerts
On Android Phone. Today we all know the Nepal earthquake Tragedy that
happens recently. This type of natural disasters can make a great loss of money
and life. So it is better to get alerts of these type of disasters and with the
advancement of technology there are certain huge notifying companies that can
tell you the about upcoming disasters by analyzing the weather reports.
So in this post i will tell you a method to get alerts of Earthquake on your
android. Just follow the below post to proceed.
Saturday, 9 May 2015
SAUDI HACKER DEFACED AND HACKED IRAN MINISTRY OF DEFENSE WEBSITE
A Saudi hacker using the name “RxR HaCker” hacked and
defaced the official website of Iranian Ministry of Defense on 7th may, according
to Hack Read.Hacker left a deface page along with a message on the hacked site,
bashing and insulting the Iran’s supreme leader Ali Khamenei over war in Yemen.
Friday, 1 May 2015
TOP 10 FREE WEB HOSTING SITES 2015
Here is a list of top 10 free web hosting sites for 2015. We have selected the best web hosters that makes it easy for you by selecting the hosting services.
MAN IMPLANTS NFC CHIP IN HIS HAND TO HACK ANDROID PHONES
When you hold an Android phone, you just hold it. When Seth Wahle holds the same phone, an NFC chip in his hand can load a malicious web page that exploits the phone. So, should you stop letting people touch your phone from here on out? Well, you don’t have to freak out just yet.
Thursday, 23 April 2015
IOS 8 VULNERABILITY LETS HACKERS CRASH ANY IPHONE AND IPAD WITHIN WI-FI RANGE
Security
researchers have uncovered a zero-day vulnerability in iOS 8 that could
repeatedly crash users' Apple iPhones, iPads and iPods when the devices connect
to a malicious wireless hotspot.
It’s like Denial of Service (DoS) attack on Apple's iOS devices that results in crashing either individual iOS
apps or users' entire iPhones.
Saturday, 11 April 2015
FREAK ATTACK: HOW TO PROTECT YOURSELF
The recently
disclosed FREAK (Factoring attack on RSA Export Keys) attack is an SSL/TLS
vulnerability that is affecting major browsers, servers and even mobile
devices.
HOW HACKERS COULD DELETE ANY YOUTUBE VIDEO WITH JUST ONE CLICK
A security researcher has discovered a simple but critical vulnerability in Google-owned YouTube that could be exploited by anyone to knock down the whole business of the popular video sharing website.
Kamil
Hismatullin, a Russian security bod, found a simple logical vulnerability that
allowed him to delete any video from
YouTube in one shot.
Monday, 30 March 2015
YOUR LOCATION HAS BEEN SHARED 5,398 TIMES IN LAST 14 DAYS
Do you realize how often
your smartphone is sharing your location data with various companies? It is
more than 5000 times in just two weeks. That is little Shocking but True!
GITHUB HIT BY MASSIVE DDOS ATTACK FROM CHINA
Github – a popular coding website used by
programmers to collaborate on software development – was hit by a large-scale distributed denial of service
(DDoS) attack for more than 24 hours late Thursday
night.
It seems like when users from outside
countries visit different websites on the Internet that serve advertisements
and tracking code from Chinese Internet giant Baidu, the
assailants on Chinese border quietly inject malicious JavaScript code into the
pages of those websites.
The code instructs browsers of visitors to
those websites to rapidly connect to GitHub.com every two
seconds in a way that visitors couldn't smell, creating "an extremely
large amount of traffic," according to a researcher who goes by the name A nthr@x.
"A
certain device at the border of China’s inner network and the Internet has
hijacked the HTTP connections went into China, replaced
some JavaScript files from Baidu with malicious ones," A nthr@xwrote at
Insight Labs.
"In other words, even people outside China are being weaponized to target things the Chinese government does not like, for example, freedom of speech."
"In other words, even people outside China are being weaponized to target things the Chinese government does not like, for example, freedom of speech."
The attack specifically targets two
popular Github projects – GreatFire and CN-NYTimes –
anti-censorship tools used to help Chinese citizens circumvent The Great
Firewall Of China, the government's censorship of Internet access in China.
·
GreatFire – A well-known group on Github that
fights against Chinese government censorship of the Internet.
·
CN-NYTimes – A group that hosts New York Times
mirrors to allow Chinese citizens to access the news website, which is normally
blocked in China.
Since Baidu search engine is extremely
popular, the attack results in the massive flood of traffic on the Github
website which begun around 2 AM UTC on Friday and last for more than 24 hours.
GitHub said yesterday that the flood of
traffic, a continuous string of distributed denial-of-service attacks, caused
irregular outages and that their admins have been working to mitigate the
attack with periodic success.
However, the most recent status on
the site says the company has deployed new defenses.
"We're aware that GitHub.com is
intermittently unavailable for some users during the ongoing DDoS,"
GitHub said in a message posted at 1549 UTC Friday.
"Restoring
service for all users while deflecting attack traffic is our number one
priority. We've deployed our volumetric attack defenses against an extremely
large amount of traffic. Performance is stabilizing," a message posted
by Github at 15:04 UTC says.
Later, the company noted, "We've
been under continuous DDoS attack for 24+ hours. The attack is evolving, and
we're all hands on deck mitigating."
The researcher analyzed the attack and dug
out the injected JavaScript that looks like this (pastebin), once
unscrambled.
Chinese search engine giant has denied any
involvement in the current DDoS attack, saying that Baidu was not intentionally
involved in any traffic redirection. "We've notified other security
organizations," the company said in a statement, "and are
working together to get to the bottom of this."
Thursday, 26 March 2015
HACKING AIR-GAPPED COMPUTERS USING HEAT
An air-gapped
computer system isolated from the Internet and other computers that are
connected to external networks believes to be the most secure computers on the
planet -- Yeah?? You need to think again before calling them 'safe'.
Monday, 23 March 2015
SIMPLEST WAY TO CHECK IF YOUR EMAILS ARE BEING TRACKED
You might be not aware of the companies that know
pretty much everything related to your email activities like when you’ve opened
email sent by one of their clients, where you are located, what device you’re
using, what link you click, all without your consent, even if you haven’t click
any link provided in that email.
TOR — HOW TO PROTECT YOUR DIGITAL ENVIRONMENT?
Are you aware of everything that your users are
accessing from your environment?
While most of the time, non-work-related Internet
browsing is harmless (looking at pictures of cats, online shopping, social
media, etc.) there are some instances where you could be an unknowing and
unwilling participant in criminal activity. That is, when users hide that
activity via the Tor network, or the Dark Net.
SMART ATM OFFERS CARDLESS CASH WITHDRAWAL TO AVOID CARD SKIMMERS
Banks
have tried every effort, from providing Magnetic Stripes based Credit and Debit
Cards to Chip-and-Pin Cards, in order to secure its users from
credit card cloning and card Skimmers.
It has been known from years that Magnetic stripe are incredibly hackable, but Chip-n-Pin cards have also been hacked and successfully cloned by a group of security researchers.
It has been known from years that Magnetic stripe are incredibly hackable, but Chip-n-Pin cards have also been hacked and successfully cloned by a group of security researchers.
DEEP WEB DRUG MARKET DISAPPEARED SUDDENLY OVERNIGHT, $12 MILLION IN BITCOIN MISSING
Evolution -- The largest
Deep Web drugs marketplace, disappeared suddenly overnight from the Internet.
But unlike Silk Road, there is no indication that the law enforcement took down
the Evolution marketplace.
Thursday, 12 March 2015
STUXNET PATCHED AFTER FIVE YEARS
So you thought Microsoft already issued a patch that stopped the Stuxnet worm from spreading all the way back in 2010? So did everybody else. it would however seem that the emergency update didn’t quite do it and Stuxnet Incorrectly patched for five years, based on a report by HP’s TippingPoint security wing.
Tuesday, 3 March 2015
HOW TO HOST YOUR WEBSITE ON LINUX
Alright here is the method, on how to host your website on Linux
server (vps). Since these days you can see hosting a website is costly
so for this you can host your website on Linux server at low cost and
with better brand width where it can hold a lot of traffic than shared
hosting.
Saturday, 21 February 2015
SIX REASONS : WHATSAPP WILL NOT TAKE THE PLACE OF SMS
Social
media and Instant messaging apps aren’t taking over multiple methods of
communication and advertising. It already has taken over, big time. There are
new programs seem to be released daily that claim to make our communications
with friends and companies quicker,easier,and more efficient. With all the
different platforms used on phones, tablets,and computers,we need to be able
to use a program that allows all these platforms and operating systems to work
together as well as possible.
Tuesday, 10 February 2015
LINUX BASIC COMMANDS
The below
commands are important and often used for more checkout the image at the bottom
of the article
- mkdir – make directories
Usage: mkdir [OPTION] DIRECTORY…
eg. mkdir lhn - ls – list directory contents
Usage: ls [OPTION]… [FILE]…
eg. ls, ls l, ls lhn - cd – changes directories
Usage: cd [DIRECTORY]
eg. cd lhn - pwd -
print name of current working directory
Usage: pwd
Saturday, 7 February 2015
WHY MY COMPUTER WORKS SO SLOW ?
f your computer is older more than five years then the age of your
computer could be the reason of the slow performance. Computers are
advance in technology and capabilities and newer, more advanced software
programs come out to run properly on the new computers. Older computers
are not able to run the new programs which can cause them to slow down
your computer. If your computer is older than five years then we suggest
you to buy a new computer or accept that.
Thursday, 5 February 2015
HOW TO CAPTURE A USERS IP ADDRESS
Step 1 – Get
visitors IP address with PHP
Getting a
visitors IP address can be important for a lot of reasons, for example,
logging, geo targeting, redirecting the user and so on. All of the IP relevant
informations can be found in the $_SERVER array. The simplest way to get the
visitors IP address is as simple as the following code, by reading the
REMOTE_ADDR field:
Tuesday, 3 February 2015
HOW TO PROTECT YOUR SELF FROM HACKERS
Every six seconds, a personal computer is hacked. In fact, 80% of computer has been hacked. Statistics show that for seven out of 10 people who get hacked, it’s because they indirectly gave the hacker their password. With computer hacking incidents on the rise, it’s important to educate yourself so that you don’t fall victim.
Here are 10 ways to protect yourself from cyber security attack:
1. Keep your personal information private:- On social media accounts like Facebook and Twitter, for example, don’t post the names of your family since these same names may act as your answers to your secret questions or even as passwords to your accounts. Also, don’t post what grammar, middle school or high school you attended, where you work or where you were born. These are often answers to secret questions if you ever forget your password and have to reset it.
Saturday, 31 January 2015
TROJAN INFECTS 110,000 FACEBOOK USERS IN TWO DAYS
A new Trojan currently circulating on Facebook has managed to propagate to more than 110,000 users in just two days, a researcher says, by tagging friends of the victim in a post directing to an alleged video. Tag scams are not new but recently they have been seen to be used with increased frequency.
Trojan distributed more aggressively
Trojan distributed more aggressively
Thursday, 29 January 2015
HOW TO BECOME A GOOD ANDROID DEVELOPER
Imagine
what your android smart phone would be without those apps that you love
so much. Starting from the apps that you use to access your social
media pages and games, apps are essentially make your phone what it is.
Our lives today are so dependent on apps and there are new ones being developed daily for different purposes. The apps have touched our lives in a way that if today they were to disappear from our phones life would never be the same again. Imagine if you did not have that app that you use for your diet program or work out? What if you were unable to access your favorite social media site because you did not have an app to do so?
Our lives today are so dependent on apps and there are new ones being developed daily for different purposes. The apps have touched our lives in a way that if today they were to disappear from our phones life would never be the same again. Imagine if you did not have that app that you use for your diet program or work out? What if you were unable to access your favorite social media site because you did not have an app to do so?
Wednesday, 28 January 2015
YOUTUBE WILL NOW DEFAULT TO HTML5 PLAYERS FOR BETTER SUPPORT ON MORE DEVICES
Today, YouTube announced that its Web video player will now default to HTML5 over Adobe Flash to add more flexibility for developers, bloggers and consumers.
The team wrote that it waited on switching to HTML5 players due to numerous technical issues. For example, HTML5 previously lacked support for Adaptive Bitrate (ABR), which helps reduce buffering.
With ABR support, YouTube says it is able to use MediaSource Extensions to run smooth live streams on a variety of devices, including the Xbox One, Playstation 4, Chromecast and most popular Web browsers such as Chrome, Safari 8 and IE 11.
YouTube also says that since HTML5 supports VP9 codec, it can help save bandwidth, load time and file size. The team encourages developers to start using the iframe API rather than Flash so mobile devices that do not support Flash can easily stream YouTube videos.
YouTube has offered HTML5 functionality for many years now, so it seems overdue for the company to finally make this the standard platform.
You can read the full details of YouTube’s HTML5 benefits here.
➤ YouTube now defaults to HTML5 video
The team wrote that it waited on switching to HTML5 players due to numerous technical issues. For example, HTML5 previously lacked support for Adaptive Bitrate (ABR), which helps reduce buffering.
With ABR support, YouTube says it is able to use MediaSource Extensions to run smooth live streams on a variety of devices, including the Xbox One, Playstation 4, Chromecast and most popular Web browsers such as Chrome, Safari 8 and IE 11.
YouTube also says that since HTML5 supports VP9 codec, it can help save bandwidth, load time and file size. The team encourages developers to start using the iframe API rather than Flash so mobile devices that do not support Flash can easily stream YouTube videos.
YouTube has offered HTML5 functionality for many years now, so it seems overdue for the company to finally make this the standard platform.
You can read the full details of YouTube’s HTML5 benefits here.
➤ YouTube now defaults to HTML5 video
Monday, 26 January 2015
THE PIRATE BAY UPDATED WITH PHOENIX IMAGE AND SET TO RETURN ON 1 FEBRUARY
The Pirate Bay — an infamous Torrent website predominantly used to share
copyrighted material free of charge — could be relaunched on 1st February, the
date the website has long been expected to return.
The website went dark from the
Internet following a raid in Sweden last month. After a complaint was filed by
a group called the Rights Alliance, Swedish Police officers raided The Pirate
Bay's server room in Stockholm and seized several servers and other
equipment.
Monday, 19 January 2015
FAKE WHATSAPP PLUS APP RUMORED TO BE NEXT OFFICIAL NEW WHATSAPP
Several reports from the popular news websites had suggested
that WhatsApp,
the widely popular messaging application, is working on a new version of its
instant messaging client, called WhatsApp PLUS, in order to provide
its users a lot of handy new features. However the news seems to be completely
fake!!
WhatsApp Plus has already been
launched a long ago and is not at all genuine as it is not associated with the
Facebook-owned WhatsApp. Many users claimed to have already used WhatsApp Plus
before.
RWANDA WEBSITE CALLED UMUSEKE WAS HACKED BY ANOUNYMOUS
The technologies have many advantages and disadvantages then Rwanda like one country located in Eastern africa where technology advanced,some website like umuseke wae down from morning today until now.All domain umuseke.com and http://umuseke.rw/
Thursday, 1 January 2015
WHO HACKED SONY PICTURES ENTERTAINMENT?
Everyone has a theory about who really hacked Sony Pictures Entertainment Inc.
Despite President Barack Obama's conclusion that North Korea was the culprit, the Internet's newest game of whodunit continues. Top theories include disgruntled Sony insiders, hired hackers, other foreign governments or Internet hooligans. Even some experts are undecided, with questions about why the communist state would steal and leak gigabytes of data, email threats to some Sony employees and their families and then threaten moviegoers who planned to watch "The Interview" on Christmas.
Subscribe to:
Posts (Atom)