1 / 3
2 / 3
3 / 3

Showing posts with label article. Show all posts
Showing posts with label article. Show all posts

Friday, May 26, 2017

Google Selects Six More Indian Startups For The Accelerator Programme

Hello Friends,

In the six-month programme, the start-ups will undergo mentoring from Google teams and mentors from top technology firms.

Google on Wednesday, announced that it will mentor six more Indian startups in Artificial Intelligence (AI) and Machine Learning (ML) at its developers’ launchpad in San Francisco, California from July 17.
The six start-ups viz EdGE Network, Fast Filmz, IndiaLends,
Read More

Tuesday, May 16, 2017

Intel Skylake-X leak suggests first Core i9 CPUs are coming this year

Hello Friends,
Let's be honest, Intel hasn't released anything particularly exciting in a long while now. It's the reason my primary desktop is still rocking an Intel Core i7-4790K Devil's Canyon processor released several years ago. Sure, I could scamper over to an X99 configuration, but at this point it makes more sense to see what Skylake-X and Kaby Lake-X bring to the table. That remains to be seen, though if the latest rumor is to believed, at minimum we can expect new branding, at least for Skylake-X.
Read More

Thursday, April 13, 2017

Special IP Addresses

Hello Friends,
IP Addresses short for Internet Protocol address, an IP or IP address is a number (example shown right) used to indicate the location of a computer or other device on a network using TCP/IP. These addresses are similar to those of your house; they allow data to reach the appropriate destination on a network and the Internet.

IPV4  and  IPV6

As the Internet and technology
Read More

Penetration Testing with Kali Linux Methodology

Hello Friends,
Kаli Linux is designed for penetrаtion testing. Whether the penetration tester’s stаrting point is white-box testing, black-box testing, or grаy-box testing, there are аlways steps to follow when performing penetration testing with Kali or other tools.





Read More

Wednesday, April 12, 2017

Microsoft Office Word 0-day remote code execution vulnerability

Hello Friends,
On April 7, two researchers from McAfee and FireEye broke a 0-day vulnerability in Microsoft Office Word. By sending a message with an OLE2link object attachment, when the user opens the attachment, the code executes and connects to an attacker-controlled remote server, thereby downloading a malicious HTML application file (HTA) that will disguise Become a Microsoft RTF document.
Read More

Tuesday, April 11, 2017

Practice VS Theory

Hello Friends,
Education in many countries attaches great importance to theory. We are thrown into the head of a bunch of knowledge. To go to college, things aren't much better either.

Most of these theories are quite abstract, so students are difficult to absorb. By learning without knowing how to apply, these theories will fade out. Many students feel confused because they don't know "what do I learn this for ? "

Read More

How to Edit Google Drive's file on Microsoft Office

Hello Friends,
Edit any document or spreadsheet stored on Google Drive, you no longer need access through Drive, which can be edited directly on Microsoft Office.
Google has provided a very useful plugin that makes this easy. You download and install the plugin at https://tools.google.com/dlpage/driveforoffice. This plugin supports Microsoft Office for Windows XP and above.

Read More

Sunday, January 24, 2016

How to choose Your First Programming Language

Hello Friends,
Recently I came across with a very enriching infographic that addressed the same question. Udacity has utilized the date of the top ten programming languages in the US (provided by IEEE Spectrum) to pick the best programming language for you as a beginner.
The basis on which this infographic is made varies from location, your lifestyle and the potential growth in career after selecting that particular language.
Based on the flexibility, Python or C++ comes first as it allows you work on the variety of fields such as gaming to making of embedded systems. JS or PHP prepares you for a web development career. Similar observations and trends are made based on the average pay per year, geography and popularity.
Read More

Thursday, April 2, 2015

Select the Best Python IDE

Hello Friends,
I’m mainly interested in IDEs that are cross-platform and have strong web development support (Django, HTML templates, JavaScript, etc). Because of this, well-regarded IDEs like PyScripter and Python Tools for Visual Studio are out since they are Windows-only. The Python website maintains a full list of Python IDEs.

Read More

Monday, March 23, 2015

WhatsApp security tips

Hi Friends,
WhatsApp chats are more than just simple texts. We all know it. We share photos, videos, bank account details, contacts and what not on WhatsApp. And with so much personal data, if you take privacy and security of WhatsApp for granted then its jackpot for wicked minds.
ESET advices WhatsApp users by providing top security tips to stay secure on their personal chats. WhatsApp recently announced that it has more than 700 million monthly active members, sending a combined total of 30 billion messages a month. That’s an enormous volume of personal information being communicated, and even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are eight top WhatsApp security tips.
Read More

Friday, December 5, 2014

Hacking PayPal Accounts

Hi Friends,
The computer security industry has made many positive changes since the early days of computing. One thing that seems to be catching on with bigger tech companies is bug bounty programs. PayPal offers such a program and [Yasser] decided to throw his hat in the ring and see if he could find any juicy vulnerabilities. His curiosity paid off big time.
Read More

Thursday, December 4, 2014

81% of Tor Users Can be Easily Unmasked By Analysing Router Information

Hi friends,
Tor has always been a tough target for law enforcement for years and FBI has spent millions of dollars to de-anonymize the identity of Tor users, but a latest research suggests that more than 81% of Tor clients can be "de-anonymised" by exploiting the traffic analysis software ‘Netflow’ technology that Cisco has built into its router protocols.
NetFlow is a network protocol designed to collect and monitor network traffic. It exchanged data in network flows, which can correspond to TCP connections or other IP packets sharing common characteristics, such UDP packets sharing source and destination IP addresses, port numbers, and other information.
Read More

Sunday, October 26, 2014

Twitter Launches Digits – A Password Free Login Service For App Developers

Hi Friends,



Read More

Saturday, October 25, 2014

Jailbreak iOS 8 And iOS 8.1 Untethered Using 'Pangu' Jailbreak Tool

Hi Friends,
 Good news for iOS 8.1 users! The Chinese jailbreaking team Pangu has released a software tool that allows users to Jailbreak their iPhones, iPads and iPods running the latest version of Apple's mobile operating system, iOS 8 and iOS 8.1.

That was really very quick, as iOS users need to wait quite long for the jailbreaks. Pangu developer team is the same group responsible for jailbreaking iOS 7 few months back.
Read More

Google Launches USB-Based "Security Key" To Strengthen 2-Step Verification

Hi Friends,
Google is taking its users’ privacy very serious and making every possible effort for its users just to make them feel secure when they are online.
Today, the tech giant has announced its enhanced two-step verification service that is based on a physical USB key, adding yet another layer of security to protect its users from hackers and other forms of online theft.
Read More

Google Search Algorithm to Demote Piracy Sites In Search Results

Hi Friends,
The Search Engine giant is not going to spare the Pirated content providing sites. Google is ready to fulfill its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.
Google and the Copyright holders are, to some extent, enemies for years, but in Google's ongoing anti-piracy efforts, the company will fight copyright infringement and assure rights holders that their contents will be appeared at the top of its search results and that the search made up only a small portion of pirate traffic.
Read More

Tuesday, October 21, 2014

Tor Browser 4.0 and Tails 1.2 Update Released

Hi Friends..
Like us on facebook:- https://www.facebook.com/justhackitnow
 Tor - Privacy oriented encrypted anonymizing service, has announced the launch of its next version of Tor Browser Bundle, Tor version 4.0, which disables SSL3 to prevent POODLE attack and uses new transports that are intended to defeat the Great Firewall of China and other extremely restrictive firewalls.

Tor is generally thought to be a place where users come online to hide their activities and remain anonymous. Tor is an encrypted anonymizing network considered to be one of the most privacy oriented service and is mostly used by activists, journalists to circumvent online censorship and surveillance efforts by various countries.
Read More

Thursday, September 11, 2014

Share remote screens and control PC without using any software

Hello Friends,
we are coming back..
Remote sharing is nowadays on its peak, people use remote sharing to provide live support or for sharing screens. Most of us always use third party software's for sharing or controlling remote systems using software's like Teamviewer or Radmin etc.  Today i am going to teach you guys how to connect any two or as many as windows PC through remote without using any third party tool like team viewer etc.
As we all knows Windows OS is  full of hidden programs that are only limited to developer or geeks. Today we are going to learn about MSRA (windows remote assistance) executable. MSRA is windows inbuilt remote assistance program using which you can control remote pc's, share remote screens, provide remote support and much more. Lets learn how to use MSRA for remote sharing.
Read More

Tuesday, May 27, 2014

DDos Attack ?

Hi Friends,
Like us on facebook https://www.facebook.com/justhackitnow
If you are working in the field of computer networks or an enthusiast in the field of network security, you are sure to have come across the term “Denial of Service attack” which is simply referred to as “DoS attack”. Today, this is one of the most common types of network attacks carried out on the Internet. In this post, I will try to explain DoS attack, its variants and methods involved to carry out the same in an easily understandable manner.
Read More

What is a Proxy Server and How it Works ?

Hi Friends,
In a computer network, a proxy server is any computer system offering a service that acts as an intermediary between the two communicating parties, the client and the server. In the presence of a proxy server, there is no direct communication between the client and the server. Instead, the client connects to the proxy server and sends requests for resources such as a document, web page or a file that resides on a remote server. The proxy server handles this request by fetching the required resources from the remote server and forwarding the same to the client.

Read More

Search This Blog

Powered by Blogger.

Pages