Got Alot to make u stunn and thirsty about this Binary World.... HapPy SurFInG

Like us on Facebook

Wednesday, August 24, 2016

 

Epic Games forums hacked, over 800,000 gamer's at risk  

Epic games forums hacked and lots of gamer's details have been compromised. As more then half a million is from Unreal Engine and Unreal Tournament's forums. 

According to ZDNet, the hackers allegedly exploited a known SQL injection vulnerability residing in an outdated version of the vBulletin forum software, which allows them to get access to the full database. The unknown hacker has stolen data from hundreds of thousands of forum accounts including usernames, scrambled passwords, email addresses, IP addresses, birth dates, private messages and posts, user activity data. It also added that Facebook access tokens for users who signed in with their social account were also stolen. Recent hacks involving Ubuntu, Dota 2, and Canadian media company VerticalScope, which exposed 45 million user accounts, also involved unpatched, older versions of vBulletin.

It is assumed that other Epic related forums were not affected, including Paragon, Fortnite, Shadow Complex, and SpyJinx.

More information will be updated as it comes from sources.
Share:

Wednesday, October 21, 2015


NSA has Decrypted 1 Trillion Encrypted Connections




Current Security;

By now, most of our internet usage is utilizing 1024-bit encryption for the passing of the Diffie-Hellman. We also use VPN, SSH, HTTPS, to encrypt our information in messages.
The Diffie-Hellman protocol is actually a method in which is used by two computers in order to generate a privately shared key in order to exchange information on an unsecure channel.
The decryption of this encryption level should take one full year as well as several hundred thousands of dollars.
VPN, shorted for Virtual Private Network, is in fact a network in which is constructed by using other public wires, commonly the internet uses. This connects to a private network that is set up by a company that has an “internal” network. This aids in protecting your computers by making your computer appear to be in another location.
Secure Shell, known as SSH, is also referred to as a Secure Socket Shell. This is a Unix based command line interface in which network engineers use to securely access remote computers. This is also used by network administrators in order to gain access and control web space as well as remote control of servers.
Lastly, HTTPS, shortened for Hyper Text Transfer Protocol Secured, ensures the secure socket layer and/or transport layer security (TLS) and performs as a sublayer in which lays underneath a regular HTTP (Hyper Text Transfer Protocol). The HTTPS not only encrypts the page requested by users, it also decrypts the page as it returns from the web server.


Current Threat;

By now, everyone knows of the NSA, as well as other governing agencies and spies, are working in order to not only track our every move but to also listen in on our conversations and personal emails. We can see the newest removal of our basic rights, when the NSA designed and developed the Data Center of Utah.For the past, x-amount of decades, our governing agencies has been violating

Edward Snowden, a famous and world known whistleblower, has performed revelations in the year of 2013. Now the NSA has a new system in which has decrypted over one trillion private and secured messages across the internet world-wide.

By now, it is no doubt that any one doesn’t know about our beloved NSA spying on us. As the “investigations” of both public and private connections have been violated for decades now. Now, the NSA has the powers to break the encryption on over one trillion devices worldwide with Internet connection.


New Threat;

While the NSA and other governing agencies and spies are lurking in the darkness, the NSA has been working on something much larger. In fact, the NSA has spent one full year as well as over three hundred million dollars on the investigation and decryption of over one trillion secured and encrypted connections from all over the world.
During the ACM Conference which was based upon Computer and Communications has presented a paper in which discusses the advances of even the most plausible theory upon how our government was able to break into some of the world’s most widespread encryption services found upon the internet.
Please, feel free to read their paper here.
While reading their work, we are able to see that the NSA has in fact exploited our common implementations of the Diffie-Hellman key encryption. This key encryption is also one of the most common forms of exchanging encrypted messages over the uses of an untrusted web channels.
While the Diffie-Hellman encryption key is supposed to be one of the most safe and secure form of encryption as this method is supposed to take a few hundred years to complete the decryption. Not to mention the financial support it would require.


Protecting Yourself;

The government may be gaining access to our encryption messages, there are still a number of ways to protect yourself online.
The first way is to completely abandon the cloud services. Even professional IT experts have resisted the little urge to “host” their programs and data onto a public cloud storage system. The NSA is able to be “sitting” at a tier one ISP watch list. This will allow them to watch your data go by and on its way onto the Cloud Server.
While most of the population by now is used to the Texting services found on any mobile device, I strongly recommend the immediate halt on all of your text messaging as well as instant messaging applications. When you send a message, it typically goes to a server where it is kept, and then from the server it is sent to the preferred contact you have chosen. While there is not much you can do to make your texting services safer and more secure, you can control the security of your instant messaging. This is done by utilizing your own personal IM services combined with your own XMPP (Extensible Messaging and Presence Protocol).
Everyone uses email, so encrypt all of your emails that you send. This can be accomplished by using services such as PGP (Pretty Good Privacy) as well as S/MIME (Secure/Multipurpose Internet Mail Extensions). These are actually very difficult to use, and the people in which you send your emails to must also use the same S/MIME services.
One of the most common ways of “hiding” is to hide your web browsing usage. By using SSL (Secured Socket Layer) is a good idea. Yes, the NSA has broken the SSL, but it is still a very good idea to practice. One way you can do this is by installing an HTTPS Everywhere extension on your browser. HTTPS Everywhere is only available on Google Chrome as well as Mozilla FireFox.
Using the Tor Network and tools by using the Tor Browser Bundle (TBB) can be used on your current choice of operating system such as Microsoft Windows, Linux Ubuntu, and Apple iOS. When you are using Tor, this allows your connections to be private and secure wherever you gain access to.
Another great form of protecting yourself is to close all firewall applications. This can include your calendar, clocks, recording services, etc. You can also take advantage of Incognito Mode, which is aimed to allow you to surf the internet anonymously.
This one is a bit dramatic and probably harsh to some, but the best line of security is to quit all of your social media networks completely. Starting with Facebook is the worst social network of them all, as Facebook holds onto all of your data.

However, the only real way to be completely secure about your internet privacy is to have a fundamental alteration upon our laws and how we are enforcing privacy laws.
Share:

Wednesday, May 13, 2015



Lily, autonomous quadcopter that captures you in motion

Have you ever seen a remote controlled quadcopter? Not very exciting huh? What about a video recording quadcopter that follows you autonomously when you go mountain climbing or skateboarding? You can actually get one from Lily Robotics! Their quadcopter, Lily, is small enough to fit in a backpack. You throw the quadcopter into the air, and it flies by itself and tracks you via its camera. It has enough battery to film you for 20 minutes. When the battery runs low, it alerts you through an armband that vibrates.


Lily is a robotics start-up founded by former UC Berkeley Business Administration alumnus Antoine Balaresque ’13 and EECS alumnus Henry Bradlow ’14. In mid March this year, Lily closed a seed round with High Line Venture Partners, an early stage venture fund. In mid April, they closed another seed round with SV Angel, an investment firm that has funded at least 600 Internet companies, including Google, Twitter, Dropbox and Airbnb, in the past 20 years.

Share:


How To Use Pendrive As Ram On PC



Increasing PC/laptop RAM or use pendrive as ram is very easy task. Normally we use pendrive for data transfer. But there are many features which help us to increase ram by using pendrive. It’s very easy process you just need a pendrive and by following some simple steps you will increase your PC RAM. RAM is the temporary memory where all the processes run like if you have more RAM than your PC will perform better and faster. But with the low RAM some processes which requires more memory can slow your PC performance like heavy games and software’s. So increasing the RAM by replacing is costly but with the help of this simple concept you can use pendrive as ram increase your PC performance and it will work little faster without any cost. In this concept pen drive will work as virtual RAM but it will not perform same as actual RAM but with this virtual memory it will increase paging and cache memory and some other functioning which helps your PC to perform fast and better and it will help to your PC to keep the load of heavy software’s and games and helps you to perform multitasking better.


So here is we are going to discuss about how to use pendrive as ram. Below given are two different method by which you can increase ram of your PC through pendrive.



Method 1st:- Virtual Ram Concept for Windows XP, 7 and 8

§ First of all you have to insert your pen drive into computer.

§ Next open My Computer >> right click on my computer >> click on Properties.

§ Now it will open you system properties and then click on advanced system settings on the left side.





§ Now in “Advanced” Tab click on >> Settings.

§ Again it will show new window then click on “Advanced” Tab.

§ In Advanced Tab you will see option of “Virtual Memory box”, Next click on “Change Button”.






§ Next after click on Change Button it will open you dialogue box “Virtual Memory”.

§ Next you have to unchecked the box of “Automatically Manage Paging size feature”.

§ Select drive of your pen drive and then in Custom size Add Your Pen Drive current same in below format.





§ If you are using 4 GB or 8Gb Pen Drive then always add 30 to 50Mb less as from the original space available here we use 4 GB pen drive so we add less as compare to the original size available.

§ After the above steps add same “Value” in both boxes and click on Apply button.

§ Then restart your PC/Laptop and your pen drive will work as “Virtual Ram”.


Note: - In this method if you want your pen drive into normal form then simply go Virtual Settings again and unchecked custom memory value and check on the default settings “Automatically Manage Paging Size”


Method 2nd:- Ready Boost Concept Only For Windows 7, 8




§ First of all insert your Pen Drive into PC/Laptop.

§ Then right click >> on the Pen Drive >> and click on Properties.

§ Then click on Ready Boost Tab and select option Use this device.

§ Select the size according to you here we use 4 Gb pen drive and we select 3501Mb size you can select according to your pen drive. Select always 200 to 300Mb less.

§ And then click on apply button.





Note:- In case if you want to change back your pen drive to normal then switch it back Don’t use device in Ready Boost tab.

Important: - Whenever you want to eject your pen drive first Safely Eject Your Pen Drive. And don’t remove it directly it will leads to device damage.


       
       



Share:

Saturday, April 25, 2015

Turn your iPhone or Android smartphone into a satellite phone 
The modern smartphone is a wonder of modern technology, and in combination with the carrier network can allow you to make calls from the densest urban jungle to Mount Everest. But despite the amazing global coverage of the carrier networks, sometimes it just isn't enough.
This is when you need to rely on satellite coverage. And believe it or not, you can add satellite capability to your existing iPhone or Android smartphone. Yes, that's right, you no longer need a dedicated satellite phone. What you need is a Thuraya SatSleeve.

In addition to offering support for calls and SMS messaging, the latest SatSleeves also have satellite data functionalities for emails, instant messaging, browsing and so on.
Just slide on the sleeve, and BINGO! You have a satellite phone. Yes, calls and data are going to cost you an arm and a leg (don't be surprised if it adds up to several dollars a minute depending on where you want to use your handset).
The SatSleeve comes in two flavors:
SatSleeve for iPhone: Adaptor for iPhone 5/5s is inside the package (adaptors for iPhone 4/4s and iPhone 6 are available separately from Thuraya Service Partners)
SatSleeve for Android: Adaptor for Samsung Galaxy S4 is inside the package (adaptors for Samsung Galaxy S3 and S5 are available separately from Thuraya Service Partners)
The SatSleeve isn't cheap -- around $499 -- but if you need coverage where there isn't a ground-based carrier service, this could very well be what you need.


Share:

Sunday, January 11, 2015

Facebook Vulnerability Allows to Video-Call Mark Zuckerberg! 



Have you ever desired to Video-Call the Founder of Facebook?

Well if your ans is yes then with this Vulnerability it's still possible!.

The following used vulnerability allows with a GET (In-URI) CSRF Parameter to avoid the Video-Calling blocks into Mark Zuckerberg Privacy Setting's.



First let me introduce what a CSRF Vulnerability IS:

"A Cross-Site Request Forgery (CSRF) Vulnerability is a type of attack that occurs when a malicious Web site, email, blog, instant message, or program causes a user's Web browser to perform an unwanted action on a trusted site for which the user is currently authenticated."

Now, Let's start analyzing it!

First we start from this URL (like we are actually Video-Calling one of our Friends):

https://www.facebook.com/videocall/incall/

When we've identified the Vulnerable GET Parameter, we may apply it as below!

https://www.facebook.com/videocall/incall/?peer_id=

After the peer_id= parameter, we'll insert Mark Zuckerberg ID (which is id=4)


So, definitely, the Complete URL, will look like this below:

https://www.facebook.com/videocall/incall/?peer_id=4



Regarding this Bug, Facebook Security Team have not yet released a FIX, on the fact continuing to allow Attackers to use this flaw against the whole Social Community!.

Share:

Friday, September 5, 2014




Windows hidden "god mode" folder Windows offers a centralized Control Panel for all of the OS settings, which makes it easy for users to tweak everything from desktop background to setting up a VPN. To enter this mode, create a new folder with this exact name (copy and paste it): God Mode.{ED7BA470-8E54-465E-825C-99712043E01C}. The folder icon will change to a Control Panel-style icon, and you will be able to jump in and change all kinds of settings. Note: Don't try this on Windows Vista 64-bit as it's known to cause a reboot loop.




Use Problem Steps Recorder This handy tool automatically records any mouse clicks and takes screenshots for you. If you need tech assistance with your computer, go to Run by typing Windows + R, and then type "psr." Use the tool and by the time you are finished, you can send this information, neatly compiled automatically, to the person helping you with the issue. It will make the process of finding the problem much easier for them, which means you will be able to get your system up and running faster.


Find/Delete large files wasting space A handy tool called WinDirStat (Windows Directory Statistics) can be used to easily find which files and folders are taking up the most space on your drive. From there, you can delete them and open up a ton of storage space.





Reduce the number of programs running at startup If your PC is taking too long to boot, it’s probably because you have far too many programs running at startup. Reducing this is easy, it will make your PC launch noticeably faster and lighter upon first load. To change the items running at startup, go to Run using the hotkey Windows key + R, and type "msconfig." A small window will appear (see the screenshot below), select the Startup tab. From here you will be able to turn off many startup programs, which can shave several seconds (or minutes) off your boot time. (Note Windows 8 has moved this functionality to the Task Manager). Try to make sure you research what you are turning off as some processes might be needed by third party programs or drivers you have installed.





Hope  u like the blog ... Will come with more interesting facts and tricks ....till then bye bye ....              Happy Surfing


https://www.facebook.com/TechBasket



Share: