Wednesday 10 September 2014

iPhone 6 Plus full Specification and Reviews


I know this is not the proper place to post this, but i can't sit still without blogging. :p

Well folks, the time for wild rumors reports is finally over - Apple CEO Tim Cook just officially revealed the new iPhone 6 Plus and its 5.5-inch screen in Cupertino alongside a long-rumored (and handier) 4.7-inch model.

Apple wants to give all those other pocket-stretching phablets out there a run for their metaphorical money. The company's live press event still going along but here's what we can get you so far.



A SMALL BRIEF :

  • Spacious 5.5-inch 1080p Retina Display HD riding up front - to hear Apple's Phil Schiller tell it, it's SRGB- accurate, has an ultra thin back light, photo-aligned IPS liquid crystals, an improved polarize r, and ion-strengthened glass. More importantly (and at long last!), the screen runs at 1080p.
  • Dramatically thinner than the iPhones that came before it (the Plus comes in at 7.1mm thick, and the angular edges of the 5s have given way to a smoother, rounder look in line with the company's most recent batch of iPads.

  • Apple's snappy new 64-bit A8 chipset - Schiller says it's 50 percent more energy efficient  than the the A7 that graced earlier models, and about 25 percent more powerful to boot.
  • Speaking of power, you'll be able to squeeze 16 hours of standby time out of the 6 Plus, 14 hours of continual video playback and or a full 24 hours of 3G talk time out of the non-removable battery.

  • Mobile photographers (which is really everyone these days, right?) may be a little bummed to see that the 6 Plus has an 8-megapixel iSight camera and an f/2.2 aperture lens paired with the same True Tone flash as in the 5s.  
  • Improved face detection and a new Best Shot mode. Extra bonus for Plus owners: you get optical image stabilization, so you can lord your crisper shots over everyone else when it launches.
  • Shoot 1080p video at either 30 or 60 frames per second, and slow motion video has gotten even slower: think a whopping 240 frames per second.   

  • The front-facing camera has been updated with a sensor that's even greedier for photons, perfect for all those well-lit "LOOK I HAVE A NEW IPHONE" selfies you'll probably snap.
  • Perhaps the biggest is the inclusion of a two-paned landscape mode which makes the whole thing feel a little more like a tiny iPad than an up scaled iPhone. If you give the TouchID button (yeah, you're not escaping those sensors), you'll also invoke a one-handed mode that moves everything down to the lower half of the display for easy access -- great if you've got some short thumbs.
  • Apple has done away with the 32GB model entirely and added a 128GB model to the mix too in case you've got a few decades of movies that need to go with you everywhere.

 iPhone 6 Plus Specs
  • Dimensions: 7.1mm thick
  • Processor: A8 64 bit (2billion transistors) 50x faster than original iPhone
  • Display: 5.5"
  • Resolution: 1920 x 1080
  • Pixels Per Inch : 401
  • Camera: isight Camera - 8MP True Tone Flash, Phase Detection autofocus, Optical Image Stabilization
  • Video Camera: 1080p (30fps and 60fps) and Slow Motion 240fps
  • Battery Life: 80 Hours Audio, 14 Hours Video
  • Connectivity : 150Mbps (Network). NFC (Near Field Communication) for "Apple Pay".
  • Wi-Fi: 802.11 AC (3x faster than 5s), and Wi-Fi Calling
  • OS: IOS 8 
Shivam Kotwalia

Friday 4 July 2014

How to Reset password in Ubuntu ??

There are many reasons you might want to reset a password:
  • Someone gave you a computer with Ubuntu installed on it but not the password for the user account.
  • You just installed Ubuntu and forgot what password you selected during the installation process.
  • You have too many passwords in your life and can't keep track of them all.
  • Or you might want to hack in your Friends System.
Well, this tutorial will help you reset your Ubuntu user account password, regardless of what reason you have for resetting it.
First, you have to reboot into recovery mode.
If you have a single-boot (Ubuntu is the only operating system on your computer), to get the boot menu to show, you have to hold down the Shift key during bootup.
If you have a dual-boot (Ubuntu is installed next to Windows, another Linux operating system, or Mac OS X; and you choose at boot time which operating system to boot into), the boot menu should appear without the need to hold down the Shift key. 



From the boot menu, select recovery mode, which is usually the second boot option.  


 

After you select recovery mode and wait for all the boot-up processes to finish, you'll be presented with a few options. In this case, you want the Drop to root shell prompt option so press the Down arrow to get to that option, and then press Enter to select it.
The root account is the ultimate administrator and can do anything to the Ubuntu installation (including erase it), so please be careful with what commands you enter in the root terminal.
In recent versions of Ubuntu, the filesystem is mounted as read-only, so you need to enter the follow command to get it to remount as read-write, which will allow you to make changes:

 #mount -o rw,remount /


If you have forgotten your username as well, type  
#ls /home
That's a lowercase L, by the way, not a capital i, in ls. You should then see a list of the users on your Ubuntu installation. In this case, I'm going to reset Susan Brownmiller's password.
To reset the password, type 

#passwd username

where username is the username you want to reset. In this case, I want to reset Susan's password, so I type  

#passwd susan

You'll then be prompted for a new password. When you type the password you will get no visual response acknowledging your typing. Your password is still being accepted. Just type the password and hit Enter when you're done. You'll be prompted to retype the password. Do so and hit Enter again.
Now the password should be reset. Type 
#exit
to return to the recovery menu.  

 After you get back to the recovery menu, select resume normal boot, and use Ubuntu as you normally would—only this time, you actually know the password! 

Note:
Some people get freaked out about having recovery mode logging you in as root. For more information, read Recovery mode makes me root user. Isn't that a security risk?

Monday 30 June 2014

Useful Websites for Electronic Engineers

1. The Learning Pit Here you will find a number of tutorials on PLC and Software Simulators, Tutorials in Electric Circuits, Electricity Basics and other tools.

 2. Naval Electrical Engineering Training Series This website contains tutorials on AC and Transformers, matter, energy, electricity, circuit protection, wiring, electrical conductors, schematic reading, solid state devices, electronic emission tubes and power, fiber optics etc.

 3. Play-Hookey This is a very good resource for tutorials on digital electronics, DC electronics, Op Amps, Computer Basics, Semiconductors and other topics. 

 4. Properties of Electricity This one deals with somewhat basic tutorials and covers topics like Ohm's Law, Circuits and Phase, Induction and Inductance, Conductivity, Bridger, Impedance etc. 

5. Radio-Electronics Here you will find some basic tutorials on electronics components. There are also tutorials on Electronics Communications. 

6. Scots Guide to Electronics This is a collection of tutorials on Analog and Audio Electronics, Signals, Radio, Datasheets, Components and other topics. 

7. Techlearner Here you will find tutorials about basic aspects of electronics like AC and DC circuits, electronics tutorials, communications, datasheets and circuits. 

8. Virtual Oscilloscope This is not exactly a tutorial. Rather, here you will find a simulation of an Oscilloscope, which shows various features of the device and gives you sinusodial waveforms. 

 9. Williamson Labs This is a tutorial on oscilloscopes, links, elementary electricity, components, Op Amps, Optics, Intuitive Electronics, RF, TV, Filters, Cell Phones, Computers, Antennas and other topics. 

10. Beginning Embedded Tutorials Here you will find 11 tutorials that will take you through embedded electronics and the various aspects of it that you need to understand. 

 11. Electronics Tutorials Here you will find a huge list of topics related to electroncis and information on those topics that will come in handy to you. 

 12. Micheals ElectronicsDigital Electronics Tutorials If you were looking for more tutorials in electronics, then this link may suit you fancy. 

13. Electromagnetic Waves and Antennas This is a book that gives you an introduction to electromagnetic waves and antennas. 

14. Electromagnetism for Electronic Engineers This is another book that deals with Electromagnetism. It contains examples and solutions that will be useful for learning.

Best Website for Learning Wi-Fi Hacking

1.WildPackets   WildPackets Inc, founded in 1990, develops hardware and software solutions that drive network performance, enabling organisations of all sizes to analyse, troubleshoot, optimise, and secure their wired and wireless networks. 

 2.Wireshark  Wireshark is the world's foremost network protocol analyser. It lets you see what's happening on your network at a microscopic level. It is the de facto standard across many industries and educational institutions. 

3.Cracking WEP Using Backtrack: A Beginner’s Guide  This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access any network secured by WEP encryption. This tutorial aims to guide you through the process of using it effectively.  

4.How To Crack WEP and WPA Wireless Networks  With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2. 

 5.Ethical Hacker Network   The Ethical Hacker Network is the brainchild of Donald C. Donzal of The Digital Construction Company. While looking for information on advancing one’s career in the security arena of IT, he found that there was no single place to find and cross reference information on the numerous credentials now available. Security is the hot topic of the day, and there is a plethora of information out there. Don saw this as an opportunity and launched CSP Mag.  

6.Backtrack-Linux.org   BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.  

7.Wi-foo   Provides a list of tools we commonly use in pentesting wireless networks or just wardriving for fun and no profit. All these tools are covered in the book in sufficient details.  

8.Wirelessdefence.org   Wirelessdefence.org is a collection of 'top tips' for the auditing of 802.11 networks and is an attempt to provide a 'one stop shop' for common tasks encountered by new and forgetful Wireless Security Auditors.  

9.Hacking Techniques in Wireless Networks  This article describes IEEE 802.11-specific hacking techniques that attackers have used, and suggests various defensive measures. It describes sniffing, spoofing and probing in the context of wireless networks.  

10.How To Crack WPA / WPA2  The world has changed since Brandon Teska's original WPA/WPA2 Cracking tutorial was written in 2008. While there are some wireless networks still using WEP, there has been a mass migration to WPA2-AES wireless security. A key reason for this move is 802.11n, which requires WPA2/AES security enabled in order to access link rates over 54 Mbps.

Video Tutorials To Understand Logic Gates!


The understanding of logic gates and boolean functions is an integral part of an electronics engineer's skill set. Here are 11 video tutorials that will help you in honing yours.

electronic circuits, logic gates, boolean algebra, boolean symbols, basic logic gates tutorials, top logic gates tutorials, learn logic gates, understanding logic gates
1. Digital Electronics: Logic Gates - Integrated Circuits

This is an Integrated Circuits experiment from the EE223 Introduction to Digital and Analogue electronics module at the Dublin City University.

2. Basic Logic Gates

This half hour long tutorial on Basic Logic Gates may help you in solving various electronics problems.

3. An Introduction to Logic Gates

This is a tutorial on logic gates that covers transistors, Boolean Algebra, AND OR NOT NOR NAND XOR and XNOR gates and how to build a very basic computer.

4. Logic Gates and Circuit Simplification Tutorial

This tutorial teaches you the basics of logic gates and truth tables of each of the functions.

5. Minecraft : Logic Gates - Redstone Tutorial

In this tutorial you will learn how to build all seven of the basic logic gates craftable in Minecraft. This includes AND, OR, NOT, NAND, NOR, XOR and XNOR.

6. Logic Gates Tutorial Series

This is a tutorial series on logic gates that comprises of six videos. You can look through this to understand various aspects of the topic.

Free Python Tutorials, eBooks And PDF!


Over time, Python has grown to become one of the most popular languages for developers around the world. The fact that it is well-documented and proves to be an excellent language for coding and offers exceptional error handling make it an instant hit. The popularity has led to many online resources that offer both beginners and advanced learners with the right tricks for the trade.

Python, Tutorials, ebooks, pdf, programming language, Python Monk, Python Tutorial On Codeacademy, Coursera Python Course, Official Python Tutorials, Beginning Python for Bioinformatics, Learning Python for complete n00b, Python Video Tutorials By Alison, Learn Python The Hard Way, A Byte Of Python
Here are 20 free Python tutorials, eBooks and PDF:

1. Python Monk

-Free, interactive tutorials to help you discover Python idioms, in your browser!

2. Python Tutorial On Codeacademy

-Interactive browser based tutorial for python programming.

3. Coursera Python Course

-This course is designed to be a fun introduction to the basics of programming in Python.

4. LearnPython.org

-Whether you are an experienced programmer or not, this website is intended for everyone who wishes to learn the Python programming language.

5. Official Python Tutorials

-This tutorial introduces the reader informally to the basic concepts and features of the Python language and system. It helps to have a Python interpreter handy for hands-on experience, but all examples are self-contained, so the tutorial can be read off-line as well.

6. Invent with Python

-Free eBook that teaches you how to program in the Python programming language. Each chapter gives you the complete source code for a new game.

7. After Hours Programming tutorial on python

-The Python tutorial is constructed to teach you the fundamentals of the Python programming language.

8. Beginning Python for Bioinformatics

-Introduces Python as a useful and viable development language for the computer programming needs of the bioinformatics community.

9. Learning to Program

-This web site is designed to help total beginners learn to program.

10. Learning Python for complete n00b

-This tutorial aims to walk you through the basic in and outs of the python language. This is meant to be a beginner’s course on programming in general, but is also a good reference for the more advanced programmer that hasn’t used Python before.

11. Python Bibliotheca

-This site aims to be both a library of educational materials using Python to teach computer programming, and a virtual meeting place for teachers and students engaged in learning and teaching using Python.

12. Python from Scratch - Creating a Dynamic Website By Nettuts+

-Helps you build a dynamic website with Python.

13. Python 101 Tutorials Series on Youtube

-Install python and check that it worked by using the print function in python.

14. Introduction to programming with Python and Tkinter

-The purpose of this project is to provide users an interactive environment for learning python.

15. A hands-on introduction to Python for beginning programmers

-Jumpstart your Python and programming careers with this 3-hour interactive tutorial. By the end, you'll have hands-on exposure to many core programming concepts, be able to write useful Python.

16. Python Tutorials for Beginners

-This is a collection of Python Tutorials for absolute beginners. It assumes no prior knowledge of programming but it does assume that you have Python 2.x installed.

17. Learn Python Through Public Data Hacking

-In this tutorial, you'll learn Python basics by reading files, scraping the web, building data structures, and analysing real world data.

18. Python Video Tutorials By Alison

-Learn about basics of computer programming using the Python programming language.

19. Learn Python The Hard Way

-focuses on learning by experience and trying sample code on your own.

20. A Byte Of Python

-This book serves as a guide or tutorial to the Python programming language. It is mainly targeted at newbies. It is useful for experienced programmers as well.

Videos That Will Make You A Master Hacker

Hacking is an art and it isn't easy to learn. Curiosity is the first step towards becoming a hacker, but the path to being a true hacker entails rigorous training and hard work. Here are 200 videos for you to complete your path to hacking!

Hacking, hackers, learn hacking, hacking tutorials, top hacking tutorials, best hacking tutorial, hackers, learn hacking, hack
1. OWASP AppSec USA 2011

These are 48 videos containing talks from various dignitaries at the OWASP AppSecUSA 2011. It would be very interesting for hackers.

2. Open Security Training

Description: Collection of 80 Open Security Training videos "In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community. We highly encourage people who already know these topic areas to take the provided material and pursue paid and unpaid teaching opportunities. Those who can, teach."

3. Web application Pen testing

Here are another 82 video tutorials. These will teach you the art of penetration testing using Mutillidae.

4. Defcon

This is the youtube channel where you will find videos from Defcon. These can be very useful in increasing your knowledge in the field of hacking.

5. Hacking Tutorials

This playlist contains eight videos that budding hackers will find useful. It covers important topics like WiFi hacking, SQL Injection, password cracking and others.

6. Public Key Cryptography: Diffie-Hellman Key Exchange

Description: Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete logarithm problem. This test clip will be part of the final chapter of Gambling with Secrets!

7. Introduction to Hacking

This hour long tutorial covers the following topics,

- What is Hacking and Who are Hackers
- Legal Questions for "Ethical Hackers"
- Planning an Attack
- Ways to Attack
- Protecting Yourself from Discovery

Open Source Tools For Windows Admins


Windows is by far the most attacked operating system in the market. As a result, when it comes to security, Windows system admins need to be on their toes all the time. Here are 10 admin tools that come in handy for the same.

Windows, Microsoft, Wireshark, Nmap, Zenmap, open source tools for Windows, best open source tools, top open source tools
1. Wireshark

This is a free software-based protocol analyser, which is a very useful tool for Windows administrators. Many say that it makes network traffic analysis easier by many degrees.

2. AMANDA

This is a Windows-based tool that stands for Advanced Maryland Automatic Network Disk Archiver. It allows the administrator to create a master backup server, which can support both Windows-powered servers and desktops.

3. MailArchiva

Email archiving is front and center in Exchange 2010, thanks to the increase in compliance regulation enforcement across the industry. But for those who are not yet using Exchange 2010, MailArchiva provides a worthwhile means for bringing compliance to Exchange 2000/2003 and other mail servers, such as Postfix, Sendmail, Qmail, iMail, and Lotus Notes.

4. Exchange 2010 RBAC Manager

Exchange 2010 RBAC Manager is a great tool for admins working with role-based access control and Exchange. RBAC Manager (aka RBAC Editor GUI) helps overcome the lack of a GUI tool to work with the new role-based administration side to Exchange, enabling admins to connect, whether or not you're a PowerShell master. The tool is written in C# and uses PowerShell behind the scenes to allow you to create and manage roles in your Exchange 2010 environment.

5. Core Configurator 2.0 for Server Core

This is a command-line tool for Windows Server 2002 and Windows Server 2008 R2.

6. AutoSPInstaller for SharePoint 2010

This tool makes use of a number of different scripts in order to install SharePoint and implements database names that are untouched in all of this process.

7. OCS Inventory

This tool helps you to locate the devices that are connected to your network and hardware and software that has been installed on your computer. You have to instal the OCS client inventory agent on your systems.

8. UltraDefrag

This is a defragmentation tool for Windows-based computers. It is updated continuously to ensure improvements in the performance.

9. Nmap for Windows

Yes, this used to be a Linux-only platform at one point of time. But just like it was for Linux, Nmap for windows is a very useful and important security resource fr Windows computers.

10. Zenmap

This tool can be used for mapping a topology of devices that have been connected to your network. It works on Nmap and provides a graphical user interface for the comman-line tool.

Google Can Be Used For Hacking Too! Here's How!

Google, hacking, Security Cameras, Confidential Documents, Free Stuff, excel documents, bank accounts, financial summaries, credit card numbers  Global search engine giant Google is priceless. We use it on a more than daily basis for all our search needs. Whether you're looking for that fancy word or the location of a good restaurant, you'll get everything with Google search and more. Enough on the good part. Did you know Google has a dark side too? Did you know Google can be used to gain access to confidential information or download free music? Here's how...


1.Hacking Security Cameras!

You might have noticed many security cameras monitoring places like parking lots, college campus, road traffic etc (and yes, some of them work!). Did you know you can use Google to hack into these cameras to view images captured by these cameras in real time. How do you do it? Well simply open the Google search box and type in the following query:

inurl:”viewerframe?mode=motion”

You will get a search result that will give you access to live cameras with full controls (move the camera in all the four directions, perform zoom in and zoom out). The above mentioned query usually gives access to cameras with less refresh rate. In case you're looking for faster refresh rates:

intitle:”Live View / – AXIS”

2.Hacking Personal and Confidential Documents!

You can access an email repository containing personal and confidential documents (CVs for instance) using Google. Simply open the Google search box and type in the following query:

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

To access a list of excel documents which contains contact details including email addresses of people:

filetype:xls inurl:”email.xls”

To access documents potentially containing information on bank accounts, financial summaries and credit card numbers:

intitle:index.of finances.xls

3.Gaining Access to Free Stuffs!

If you're looking to download free music, simply enter the following query on Google search box and hit enter:

“?intitle:index.of?mp3 artist name“

If you're looking to download free ebooks:

“?intitle:index.of?pdf book name“

Must-Read Books On NoSQL Architecture

NoSQL Architecture, Seven Databases in Seven Weeks, Professional NoSQL, MongoDB in Action, NoSQL Distilled, Data Access for Highly-Scalable Solutions, Getting Started with NoSQL, An Introduction to Database Systems, Making Sense of NoSQL, Scaling MongoDB, The Definitive Guide to MongoDB  Many enterprises and developers have already replaced their MySQL databases with the NoSQL version. In fact, many say that NoSQL will gradually eradicate MySQL. So, just in case that does happen, here are some books that will keep you ready!


1.Seven Databases in Seven Weeks

Data is getting bigger and more complex by the day, and so are the choices in handling that data. As a modern application developer you need to understand the emerging field of data management, both RDBMS and NoSQL. Seven Databases in Seven Weeks takes you on a tour of some of the hottest open source databases today. In the tradition of Bruce A. Tate's Seven Languages in Seven Weeks, this book goes beyond your basic tutorial to explore the essential concepts at the core each technology.

2.Professional NoSQL

This comprehensive hands-on guide presents fundamental concepts and practical solutions for getting you ready to use NoSQL databases. Expert author Shashank Tiwari begins with a helpful introduction on the subject of NoSQL, explains its characteristics and typical uses, and looks at where it fits in the application stack.

3.MongoDB in Action

MongoDB in Action is a comprehensive guide to MongoDB for application developers. The book begins by explaining what makes MongoDB unique and describing its ideal use cases. A series of tutorials designed for MongoDB mastery then leads into detailed examples for leveraging MongoDB in e-commerce, social networking, analytics, and other common applications.

4.NoSQL Distilled

The need to handle increasingly larger data volumes is one factor driving the adoption of a new class of nonrelational NoSQL databases. Advocates of NoSQL databases claim they can be used to build systems that are more performant, scale better, and are easier to program. NoSQL Distilled is a concise but thorough introduction to this rapidly emerging technology.

5.Data Access for Highly-Scalable Solutions

To help illustrate how to build a polyglot solution, this guide presents a case study of a fictitious company faced with building a highly scalable web application capable of supporting many thousands of concurrent users.

6.Getting Started with NoSQL

Getting Started with NoSQL is a from-the-ground up guide that takes you from the very first steps to a real-world NoSQL application. It provides you with a step-by-step approach to design and implement a NoSQL application that will help you make clear decisions on database choices and database model choices. The book is suited for a developer, an architect, as well as a CTO.

7.An Introduction to Database Systems

An Introduction to Database Systems provides a comprehensive introduction to the now very large field of database systems by providing a solid grounding in the foundations of database technology while shedding some light on how the field is likely to develop in the future.

8.Making Sense of NoSQL

Making Sense of NoSQL clearly and concisely explains the concepts, features, benefits, potential, and limitations of NoSQL technologies. Using examples and use cases, illustrations, and plain, jargon-free writing, this guide shows how you can effectively assemble a NoSQL solution to replace or augment the traditional RDBMS you have now.

9.Scaling MongoDB

Create a MongoDB cluster that will grow to meet the needs of your application. With this short and concise book, you'll get guidelines for setting up and using clusters to store a large volume of data, and learn how to access the data efficiently. In the process, you'll understand how to make your application work with a distributed database system.

10.The Definitive Guide to MongoDB: The NOSQL Database for Cloud and Desktop Computing

MongoDB, a cross-platform NoSQL database, is the fastest-growing new database in the world. MongoDB provides a rich document-oriented structure with dynamic queries that you'll recognize from RDBMS offerings such as MySQL. In other words, this is a book about a NoSQL database that does not require the SQL crowd to re-learn how the database world works.

Tools That Let You Browse The Net Anonymously


Browsing the internet anonymously is your business and many people prefer to remain anonymous. As a result, there are a number of tools that allow you to do so. Some are cross platform tools, while others work only on a single operating system. Here are six examples.

Proxy finders, best anonymity networks, top anonymity networks, remain anonymous online, hide while online, how to leave no trace online

1. Proxy Finder

This tool allows you to automatically search and extract the free proxy servers from web sites.

2. Tor

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

3. Hotspot Shield

This is a VPN shield that lets users protect their privacy and browse anonymously.

4. PC Mesh

This tool masks your IP address in order to allow you to browser the internet anonymously.

5. Anonymizer

This is a paid tool that works on Windows, Linux, MAC and Apple's OS X.

6. Ghostsurf Platinum

As the name suggests, this tool, meant for Windows, lets you surf the web anonymously.

Tools for Remove Malware

Hackers today are not only becoming increasingly successful in finding new ways to break into computers, but achieving a one hundred per cent success rate at the same time. Cybersecurity firms are witnessing a rampant multiplication of cyberattacks categories that now range from malware and spyware to highly sophisticated breaches directed towards large businesses/enterprises. Today we bring you a list of 8 free tools to get rid of malware.

Malware, Ad-Aware, Emsisoft Emergency Kit, Norman Malware Cleaner, SUPERAntiSpyware, Spybot, Combofix, Malwarebytes Anti-Malware


1.Ad-Aware

Anti-spyware and anti-virus program developed by Lavasoft that detects and removes malware, spyware and adware on a user's computer.

2.Emsisoft Emergency Kit

The Emsisoft Emergency Kit contains a collection of programs that can be used without software installation to scan for malware and clean infected computers.

3.Norman Malware Cleaner

This simple and user friendly tool not only detects malicious software but also removes them from your computer. By downloading and running the program it will clean an infected system completely.

4.SUPERAntiSpyware

Shareware which can detect and remove spyware, adware, trojan horses, rogue security software, computer worms, rootkits, parasites and other potentially harmful software applications. Although it can detect malware, SUPERAntiSpyware is not designed to replace antivirus software.

5.Spybot

Spybot Search & Destroy is a set of tools for finding and removing malicious software. The immunisation feature preemptively protects the browser against threats. System scans and file scans detect spyware and other malicious software and eradicates it.

6.Combofix

Executable software, intended for users with advanced computer skills to run it only on occasions where a regular antivirus would not detect certain malware, or where an antivirus cannot update or otherwise function.

7.Microsoft Security Scanner

Free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.

8.Malwarebytes Anti-Malware

Made by Malwarebytes Corporation, it was first released in January 2008 and is available in a free version, which scans for and removes malware when started manually.

Video Resources That Can Make You A Master Of Python Programming!

Videos are often better sources for learning than texts or classrooms. When it comes to programming in Python, their are many who prefer this mode than reading an ebook or tutorial. That said, here are 14 resources that can help!

Python, best Python tutorials, top Python tutorials, learn Python, video tutorials on Python, Python video tutorials, Python tips, learning Python, best Python tips
Video Tutorials

1. Python Django tutorial

This tutorial will teach you to package URL with apps and add them to your project, while passing values to the URLs as well.

2. Google Python Class

This is a class on Python from the Google Python Class. It is a basic tutorial that introduces you to the subject.

3. Python 2.7 Tutorial

Databases are often created using PYthon's SQLite module. This video teaches you how to do so.

4. Python for Programmers

This is a project-based tutorial on Python that covers data structures, debugging and other topics.

5. Learning Python

This tutorial shows you how to use Python for scientific programming and synchrotron beamline.

Websites With Python Video Tutorials

1. Google Python Class

These are free video lectures on Python that are meant for developers.

2. Python for Beginner

These tutorial videos teach you the basics of looping, file handling, lists, string functions, debugging, classes etc.

3. ShowMeDo

This website has a pretty big collection of videos on Python that you can use to learn from.

4. Learners TV

Here you will find over 40 videos on programming in Python that will teach you various aspects of the language.

5. Learning Python Programming

This is a blog that contains a number of video tutorials on Python.

Game Programming

1. Programming physics games with Python and OpenGL

This tutorial teaches you to use Python and OpenGL in order to write your own games.

2. Collision detection and resolution

This is a tutorial that can teach you about vectors and how to use them.

3. Game Programming Tutorial

This is a video tutorial on game programming in Python that will give you some beginner code and tell you about the various tools needed for game programming.

4. Program Your Own Game With Python

This is a guided walkthrough on how to use Python 3.3.0 to write a very simple game.

30+ 'Most Wanted' Hacker Tools (Misc.)

ethical hacking, hacking tools, hackers, Vulnerability Scanners, Password Cracker, Anonymous Tools, Game Hacking Tools, SAINT, Nessus, Brutus, Medusa, John the Ripper, Cain and Abel, Art Money, Cheat Engine Ethical hacking is not bad, is it? It's fun actually! To aid the same, there is a wide array of tools floating in and around the internet each claiming to outsmart the rest, while effectively giving hackers an edge over others! While these tools may be a dangerous nuke in the hands of the deranged, give them to an ethical hacker and you will know how wonderful these can be! It must be remembered though, you might have the right tools, however without the right skill these are all but useless! Go get your hacking shoes!

Password Cracking Tools To Help You!

Password Cracking, Brutus, Wfuzz, RainbowCrack, SolarWinds, L0phtCrack, Medusa, Ophcrack, THC-Hydra, John the RipperWhile a great deal of time and effort is invested in designing and developing a software, it only takes a few seconds to bring it down on its knees via hacking. You might choose one of the most secure passwords (according to you, that is) for your online activities, but the fact is cracking the same is no big deal. With the right tools at hand, cracking a password can be a walk in the park. However, in all purposes, do remember the deed takes considerable risk. Do it at your own risk!


1.Brutus

Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000, there is no UNIX version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page.

2.Wfuzz

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc.

3.RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.

4.SolarWinds

Transform the complexity of IT security and compliance management with SolarWinds Log & Event Manager (LEM) — powerful, easy-to-use Security Information & Event Management (SIEM) in an affordable, all-in-one virtual appliance.

5.L0phtCrack

L0phtCrack 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding. Yet it is still the easiest to use password auditing and recovery software available. Software runs On Windows XP and higher. Operates on networks with Windows NT, 2000, XP, Server 2003 R1/R2, Server 2008 R1/R2, on 32- and 64-bit environments, as well as most BSD and Linux variants with an SSH daemon.

6.Medusa

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible.

7.Ophcrack

Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

8.THC-Hydra

A very fast network logon cracker which support many different services.

9.John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

10.Aircrack

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimisations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Websites That Hackers Will Love

learn hacking, top websites to learn hacking, hacking websites, best hacking websites, top security websites, best security websites, hacking security websites, how to hack. The two buzzwords, hacking and security have received quite a lot of attention recently. There are many websitses that an independent hacker can go to for information, tools etc. Here are the top eight websites that you can refer to.



1. Hack a day

This website contains news, projects, videos, forums and some other information on hacking, which can all come in handy if you are or want to be a hacker.

2. Security Focus

This website has been running since 1999 and carries information from news to posts by experts and guest columnists, all of them related to security.

3. Astalavista

This website tells you how vulnerable your system is and gives you information on your websites and overall assets.

4. PacketStorm Security

Their tagline says, "What you don't know can hurt you," and they try to avoid just that by bringing news, information and tools that can help protect personal and enterprise ad data.

5. Black Hat

This company has been operating for over 15 years and has been at the forefront of security-related events all around the world. They conduct briefing, training and many other activities.

6. Metasploit Project

This is one of the most popular penetration testing tools, which is used by people all around the world. The software has been created by an open source community along with Rapid7.

7 Insecure.org

This is a website where you can find a list of 125 security tools and various other information ta

8. 2600 Store

This website gives you information on hacking. news and many other useful resources related to hacking.

Android Tools For Hacking!


Hacking requires significant in depth knowledge of everything that abounds the digital world. Tech savvy users like to play around with their smartphones. Android devices are everywhere these days. No wonder, there has been a rampant growth of various hacking tools to exploit/secure the platform. We have compiled a list of 10 awesome Android hacking tools!

Hackode, androrat, APKInspector, DroidBox, Burp Suite, zANTI, Droid Sheep, AppUse, Shark for Root

1.Hackode

Hackode : The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc.

2.androrat

Remote Administration Tool for Android. Androrat is a client/server application developed in Java Android for the client side and in Java/Swing for the Server.

3.APKInspector

APKinspector is a powerful GUI tool for analysts to analyse the Android applications. The goal of this project is to aide analysts and reverse engineers to visualise compiled Android packages and their corresponding DEX code.

4.DroidBox

DroidBox is developed to offer dynamic analysis of Android applications.

5.Burp Suite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities.

6.zANTI

zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.

7.Droid Sheep

DroidSheep can be easily used by anybody who has an Android device and only the provider of the webservice can protect the users. So Anybody can test the security of his account by himself and can decide whether to keep on using the webservice.

8.dSploit

dSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.

9.AppUse – Android Pentest Platform Unified Standalone Environment

AppSec Labs recently developed the AppUse Virtual Machine. This system is a unique, free, platform for mobile application security testing in the android environment, and it includes unique custom-made tools created by AppSec Labs.

10.Shark for Root

Traffic sniffer, works on 3G and WiFi (works on FroYo tethered mode too). To open dump use WireShark or similar software, for preview dump on phone use Shark Reader. Based on tcpdump.

Useful Books For Every Programmer

To keep abreast with new and updated programming methods, every programmer needs to take assistance of books from time to time. We bring some selected ones for you...

As stated on fromdev.com, here’s looking at ten most influential books that offer a wealth of information for a computer programmer.

1. Code Complete

This practical handbook written by Steve McConnell and the first edition provides classical programming information. The second edition offers chapters related to C++ and Java programming that assist in improving the overall capabilities of a developer and resolving doubts.

2. The Pragmatic Programmer

This book explains the mechanics of programming that assist in writing flexible and adaptable code. It offers guidelines for utilizing tools and testing codes in an efficient manner. Further, it offers several concepts for developing high quality code.

3. Structure and Interpretation of Computer Programs

This book has researched material collated by Professors Abelson and Sussman. The book offers answers to several difficult questions of programming. The book also offers simple solutions to complex programming. The book further explains the four trends of programming languages – imperative, object-oriented, logic based and applicative programming.

4. C Programming Language (2nd Edition)

This book by Kernighan and Ritchie offers classic programming structures for core C programmers that has the use of data types, if/else, for, print, while, functions, arrays, variables etc. It even has good programming methods and code reuse.

5. Introduction to Algorithms

This book offers a series of mathematical operations and algorithm required for core programming. It has lessons on introduction to algorithm offering programming courses designed specifically for college students learning programming courses. The book is authored by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein.

6. Refactoring: Improving the Design of Existing Code

The book authored by Martin Fowler, Kent Beck, John Brant, William Opdyke and Don Roberts is about refactoring, principles of refactoring, smell codes, building test scripts, composing methods, organizing data, designing methods, generalization and using tools.

7. The Mythical Man-Month

This book written by Frederick P. Brooks offers information about many developments in software tools and environment for over two decades. It also provides details regarding man-month system, second system effect, the conceptual integrity, pilot plant, documentation, communication, code freezing, system versioning and tools.

8. The Art of Computer Programming

This book is authored by Donald Knuth and it provides chapters on basic algorithm, sorting & searching, semi-numerical algorithm, syntactic algorithms, combinatorial algorithm, compilers and the theory of context free languages. It is a good reference guide for a programmer.

9. Clean Code

This book by Robert C. Martin talks about clean code practices and suggests the Boy Scout Rule to write clean code. The code examples cited in the books are primarily in Java but the guidelines have also been explained in other languages.

10. Coders At Work

This book authored by Peter Seibel is based on conversation with computer scientists and great programmers. The entire concept is based on the series of 15 interviews written with an introduction in the format of transcripts. It has a Q & A part that explains how programmers learn programming and practice it.

Powerful SQL Injection Tools


An SQL injection attack is a code injection attack that is used to exploit web applications and websites. It is one of the most common methods for hackers to get into your system. Learning such attacks are important for anyone looking to perform their own exploits. Here are 10 of the most powerful tools that aid in performing SQL Injection attacks.


SQL Injection, SQL, PHP, SQL Poizon, SQL attacks, hacking, best hacking attacks, top hacking attacks, hacking SQL

1. BSQL Hacker

This is a useful tool for both experts and beginners that automates SQL Injection attacks on websites.

2. The Mole

This is an SQL Injection tool that uses the union technique or the boolean query-based technique.

3. Pangolin

This is a penetration testing tool developed by NOSEC. It is aimed at detecting and exploiting SQL injection vulnerabilities on websites.

4. Sqlmap

This is an open source penetration testing tool that security professionals can use. Like the BSQL Hacker tool, this one also automates SQL Injection attacks.

5. Havij

This is an automated SQL injection tool that can be used by penetration testers in order to detect vulnerabilities in web applications and exploit them.

6. Enema SQLi

This is a dynamic penetration testing tool for professionals. It is an auto-hacking software.

7. Sqlninja

This is a tool targeted at exploiting SQL injection vulnerabilities. It uses the Microsoft SQL server as its back end.

8. sqlsus

Written using the Perl programming language, this is an open source penetration testing tool for MySQL Injection and takeover.

9. Safe3 SQL Injector

This is a powerful penetration testing tool, which automates the process of detecting and exploiting SQL Injection vulnerabilities.

10. SQL Poizon

This tool includes php , asp , rfi , lf dorks that can be used for penetration testing.

10 Awesome Tools (Open Source) For Your Big Data Needs

Open Source tools, Big Data, Gluster, Lucene, Sqoop, Chukwa, Terracotta, Rattle, ZooKeeper, Oozie, Apache Flume, KNIMEBig Data as well as Open Source go hand in hand. We live in an age where both the aforementioned technologies are being increasingly embraced by one and all. While Big Data holds the distinction of emerging as one of the fastest growing technologies around, the Open Source technology is meanwhile pulling the rug from underneath closed software. Here are 10 awesome Open Source tools for your Big Data needs.



1.Gluster

GlusterFS is an open source, distributed file system capable of scaling to several petabytes (actually, 72 brontobytes!) and handling thousands of clients. GlusterFS clusters together storage building blocks over Infiniband RDMA or TCP/IP interconnect, aggregating disk and memory resources and managing data in a single global namespace.

2.Lucene

Apache Lucene is a high-performance, full-featured text search engine library written entirely in Java. It is a technology suitable for nearly any application that requires full-text search, especially cross-platform.

3.Sqoop

Apache Sqoop is a tool designed for efficiently transferring bulk data between Apache Hadoop and structured datastores such as relational databases.

4.Chukwa

Chukwa is an open source data collection system for monitoring large distributed systems. Chukwa is built on top of the Hadoop Distributed File System (HDFS) and Map/Reduce framework and inherits Hadoop’s scalability and robustness. Chukwa also includes a flexible and powerful toolkit for displaying, monitoring and analyzing results to make the best use of the collected data.

5.Terracotta

BigMemory Max lets you create a distributed in-memory data store made up of pairs of servers, or stripes. Each stripe consists of an active server and a mirror server, which stores a copy of the active. If the active goes offline, the mirror takes over, ensuring high availability.

6.Rattle

Rattle (the R Analytical Tool To Learn Easily) presents statistical and visual summaries of data, transforms data into forms that can be readily modelled, builds both unsupervised and supervised models from the data, presents the performance of models graphically, and scores new datasets.

7.ZooKeeper

ZooKeeper is a centralised service for maintaining configuration information, naming, providing distributed synchronisation, and providing group services. All of these kinds of services are used in some form or another by distributed applications.

8.Oozie

Oozie is a workflow scheduler system to manage Apache Hadoop jobs. Oozie is integrated with the rest of the Hadoop stack supporting several types of Hadoop jobs out of the box (such as Java map-reduce, Streaming map-reduce, Pig, Hive, Sqoop and Distcp) as well as system specific jobs (such as Java programs and shell scripts).

9.Apache Flume

Apache Flume is a distributed, reliable, and available service for efficiently collecting, aggregating, and moving large amounts of log data. Its main goal is to deliver data from applications to Apache Hadoop's HDFS.

10.KNIME

KNIME is a user-friendly graphical workbench for the entire analysis process: data access, data transformation, initial investigation, powerful predictive analytics, visualisation and reporting. The open integration platform provides over 1000 modules (nodes), including those of the KNIME community and its extensive partner network.

Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)