Saturday 22 February 2014

Learn How to Hide WhatsApp 'Last seen at' Time and Profile Picture from Other Users


WhatsApp for Android added most awaited privacy option for all who do not want to display information about when they last used the app.

This is the first impressive update of the WhatsApp after acquisition by Facebook, who has paid a lot of money in cash and stock to acquire it.

The Popular Smartphone messaging application WhatsApp version 2.11.169 will provide you more ability and control over privacy options i.e. Hiding ‘last seen at’ time, Profile picture, status updates from others, which are currently visible for all WhatsApp users.

Currently, these options are set to 'everyone' by default, that allows any WhatsApp user to find out exactly when you used WhatsApp for the last time, also reveals your image and Status message. Most of the times we don't want it to be shown to anyone or to non-contact users.


How to hide WhatsApp 'last seen at' time and Profile Picture?
WhatsApp now allows you to Modify your Privacy settings in three ways:
  1. Show to 'Everyone'
  2. Show to 'My Contacts'
  3. Show to 'Nobody'
To Apply, Open your WhatsApp Settings -> Account -> Privacy and here you can set your Privacy settings as you wish.

So, if you set all the options to 'My Contacts', then only your phone contacts can see your 'last seen  at' time, profile picture and Status, and no one else would have these visibility available.

The WhatsApp's Founder said in a statement:
"There would have been no partnership between our two companies (Facebook and Whatsapp) if we had to compromise on the core principles that will always define our company, our vision and our product."
I wish, the company keeps doing great work for the users' privacy and Security.

How to Get the latest version before official release?

It is not known that the same has been released for other platforms or not, at the time of writing the article. The Latest version update has not yet rolled out via Google Play Store, but users can manually download and install it from WhatsApp's Official website.

Author: Shivam Kotwalia, CodeKill


Android iBanking Trojan Source Code Leaked Online


Smartphone is the need of everyone today and so the first target of most of the Cyber Criminals. Malware authors are getting to know their market and are changing their way of operations. Since last year we have seen a rise in the number of hackers moving from the Blackhat into the Greyhat.

The Head of knowledge delivery and business development for RSA's FraudAction GroupDaniel Cohen warned users about the new threat via a company blog on Thursday, that explains everything about the malware app, called iBanking.

iBanking, a new mobile banking Trojan app which impersonates itself as an Android 'Security App', in order to deceive its victims, may intimidate a large number of users as now that its source code has been leaked online through an underground forum.

It will give an opportunity to a larger number of cybercriminals to launch attacks using this kind of ready-made mobile malware in the future.


Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, by sending unique one-time-use codes to their customers' registered phone numbers via SMS, but in order to defraud them, cyber criminals have started to create various mobile malware like iBanking to solve their purpose.


According to Security Researcher Daniel Cohen, the iBanking mobile bot is a relative all new to the mobile malware arena, and has been available for sale in the Underground Hacking Marketplace [Forum Link] since late last year for $5,000.
"We first saw the iBanking malware was distributed through HTML injection attacks on banking sites, social engineering victims into downloading a so called 'security app' for their Android devices," said the RSA researchers in a blog post.
In addition, with the iBanking malware, Computer malware is used to defeat the mobile-based security mechanisms used by the banking sites.

"Apart from the server-side source-code, the leaked files also include a builder that can un-pack the existing iBanking APK file and re-pack it with different configurations, essentially providing fraudsters with the means to create their own unique application," added Daniel Cohen.

In addition to SMS Sniffing, the iBanking app allows an attacker to redirect calls to any pre-defined phone number, capture audio using the device's microphone and steal other confidential data like call history log and the phone book contacts. 

During the installation process, the malicious app attempts to Social Engineer the user into providing it with administrative rights, making its removal much more difficult.
"The malware is an example of the ongoing developments in the mobile malware space and we are now seeing the next generation of malicious apps being developed and commercialized in the underground, boasting web-based control panels and packing more data-stealing features," said Daniel and added that 
"The malware’s ability to capture SMS messages and audio recordings, as well as divert voice calls makes step-up authentication all the more challenging as fraudsters gain more control over the OOB device. This highlights the need for stronger authentication solutions capable of validating users’ identities using multiple factors including biometric solutions."
These Days, the malware apps are particularly dangerous as they are often designed to look as authentic as possible and one in five mobile threats are now bots, which is a sign that the complexity of Mobile Malware is increasing.

Author : Shivam Kotwalia, CodeKill

Friday 21 February 2014

20 Things You Didn't Know About Computer Hacking

20 Things You Didn't Know About Computer Hacking :

1.  Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

2.  Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.

3.  One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voilà: computer Ping-Pong!

4.  By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).

5.  Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.

6.  Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.

7.  Hacking went Hollywood in the 1983 movie WarGames, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.

8.  That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.

9.  In 1988 Robert T. Morris created a worm, or self-replicating program, purportedly to evaluate Internet security.

10.  The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF).

11.  They all come home eventually. Morris now researches computer science at...MIT.

12.  British hacker Gary McKinnon broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.

13.  McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.

14.  According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.

15.  It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: “I thought, ‘Gosh, this is a big problem.’”

16.  Unclear on the concept: When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online.

17.   Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.

18.  Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.

19.  This does not bode well for patients receiving wireless deep-brain stimulators.

20.  The greatest kludge of all? Roger Angel of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.


Author : Shivam Kotwalia, CodeKill

Free Ebooks And 6 Tutorials On The PIC Microcontroller

The Peripheral Interface Controller has been used widely since it was first developed in the 1970s. It can be used for various purposes in CPUs and other electronic devices. Here are 14 resources that will teach you about these tiny yet useful devices.
PIC, PIC microcontroller, Peripheral Interface Controller, PIC tutorials, PIC books, free PIC ebooks, PIC resources,
1. Programming PIC Microcontrollers PDF 117

This book is about programming PIC microcontrollers in C using the PIC-C compiler. It covers PIC architecture, PIC, specific limitations and extensions to C, Programming PIC hardware such as ports, ADC, timers, etc and using software libraries.

2. PIC Microcontrollers Programming in C

Book Description: What are microcontrollers, anyway? Electronics built into one single chip capable of controlling a small submarine, a crane, an elevator… It’s up to you to decide what you want them to do and dump a program with the appropriate instructions into the chip. You're probably wondering what you need for it? Just a PC, a program for compiling and a simple device to transfer your code from the PC to the chip itself. Is it complicated? Absolutely not!

3. The PIC Course

This is a book for beginners to learn programming in the PIC12C508A and PIC16F84 microcontrollers. It comes with the best

4. Programming PIC Microcontrollers

Book Description: From cell phones and television remote controls to automobile engines and spacecraft, microcontrollers are everywhere. Programming these prolific devices is a much more involved and integrated task than it is for general-purpose microprocessors; microcontroller programmers must be fluent in application development, systems programming, and I/O operation as well as memory management and system timing.

Using the popular and pervasive mid-range 8-bit Microchip PIC® as an archetype, Microcontroller Programming offers a self-contained presentation of the multidisciplinary tools needed to design and implement modern embedded systems and microcontrollers. The authors begin with basic electronics, number systems, and data concepts followed by digital logic, arithmetic, conversions, circuits, and circuit components to build a firm background in the computer science and electronics fundamentals involved in programming microcontrollers.

For the remainder of the book, they focus on PIC architecture and programming tools and work systematically through programming various functions, modules, and devices. Helpful appendices supply the full mid-range PIC instruction set as well as additional programming solutions, a guide to resistor color codes, and a concise method for building custom circuit boards.

Providing just the right mix of theory and practical guidance, Microcontroller Programming: The Microchip PIC® is the ideal tool for any amateur or professional designing and implementing stand-alone systems for a wide variety of applications.

5. Microprocessors: From Assembly To C with the PIC18FXX2

This is a book written by Robert B. Reese from the Mississipi State University. You can also find material to supplement the above mentioned book, like lecture notes, tests, quizzes etc. that can be really useful in learning about PIC microcontroller.

6. PIC in Practice

Book Description: The book can be used at a variety of levels. While the carefully graded practicals make it ideal for colleges and schools, many university students and professionals are also newcomers to PIC, so this book will provide a painless introduction for more advanced readers. In addition, electronics hobbyists will find this book to be an exciting introduction to the world of microcontrollers.

*A practical guide for all newcomers to the PIC microcontroller
*Discover microelectronics by building PIC circuits
*Based on Manchester Metropolitan University's highly successful short courses on the PIC

Tutorial

1. PIC Microcontroller

This contains tutorials on the Pic Microcontroller, with topics such as PIC Microcontroller, Development Contd, Architecture, PIC18 Architecture and Features & Peripherals.

2. Fast Track to PIC Programming

According to the website, this tutorial will teach you how to,

- Write code to define outputs.
- Write code to read inputs and use those inputs to affect outputs.
- Write code to react to a clock cycle.
- “Burn” code into the device.

3. PIC16F877A Beginner Tutorial

This tutorial will show you how to code simple input and output for your robot with the help of the PIC 16F877A microcontroller.

4. PIC Tutorials

This tutorial from Googlium Electronics could be your complete guide to PIC Microcontrollers. It contains an introduction to the subject, followed by various other aspects of this device.

5. PIC Tutorial - 16F877A

This is a set of articles that can work as effective tutorials for the PIC learner.

6. WinPicProg PIC Tutorial

This is a group of 17 tutorials to understand the PIC microcontroller.

Author : Shivam Kotwalia, CodeKill

Video Tutorials On How To Build A Computer

build your own computer, AMD, Windows, how to build a PC, make your own PC, easy PC builder, PC building tutorialsWouldn’t it be nice if you could make your own gaming PC for less than $200? Well, it’s not entirely impossible. Read on.. 


Building your own computer used to be a task reserved for geeks and engineers. But, in recent years, it has become much easier. It can save you a considerable amount of money than buying your own device. All you need is the right set of components and some training about the process that is involved. Let’s get right down to it.
1. Build Easy PC

2. The New Boston

3. How To Build A Computer

4. How To Build A Gaming Computer

5. Newegg TV:Choosing Your Components

6. Newegg TV: The Build

7. Installing Windows & Finishing Touches

8. Easy PC Builder

9. Guide to building a budget AMD PC

10. Super Cheap Gaming Computer

Author : Shivam Kotwalia, CodeKill

12 Penetration Testing Add-Ons For Firefox

Mozilla, Firefox, Firebug, FoxyProxy, JavaScript, HTML, CSS, Live HTTP headers, Mozilla add-ons, Firefox add-ons, penetration testing add ons for firefox, adds ons for firefoxNow you can use your Firefox browser as a penetration testing tool with the help of these amazing add ons! Have a look 

Firefox is not popular only for its open source nature but it can also be turned into a very effective penetration testing tool. Mozilla has its own section for add-ons and all of the following are available. Here they are...
1. FoxyProxy Standard: This advance proxy management add-on for the Firefox internet browser supplements the built-in proxy capabilities of Firefox. The add-on switches the user’s internet connection over one or more proxy servers based on the URL patterns and has many other features as well.

2. Firebug: This tool allows the user to debug and edit JavaScript, HTML and CSS live on a webpage and see the changes take effect. The add-on is useful for analysing JavaScript files for XSS vulnerabilities.

3. Web Developer: This add-on helps in penetration testing by adding various web development tools to Firefox.

4. User Agent Switcher: This add-on is useful if you want to spoof your browser while attacking a network. It places a tool bar on the browser that lets you switch between user agent and browser seamlessly.

5. Live HTTP Headers: The add-on displays live headers for each of the HTTP requests and responses on Firefox. It also allows the user to save header information by a click of a button. It is a really helpful tool for penetration testers.

6. Tamper Data: This add-on is quite similar to the one above, but it brings the added header editing capacity to Firefox. The user can view and then modify HTTP and HTTPS headers and post parameters. You can use it for penetration testing for web applications by modifying the POST parameters. It can also be used to make XSS and SQL Injection attacks.

7. Hackbar: This penetration testing tool for Firefox helps the user in testing simple SQL injection and XSS loopholes through Firefox. In addition, the add-on also has encoding and encryption tools, which can help in testing XSS vulnerability using encoded XSS payloads.

8. Websecurify: This add-on can detect most of the common vulnerabilities in any web applications. It is a complete penetration testing tool that can be added to the Firefox brower.

9. Add N Edit Cookies: As the name suggests, this Firefox browser lets the user add or edit the cookies data for the browser. It is quite useful for penetration testing, especially when trying to perform session hijacks.

10. XSS Me: This add-on helps in detecting XSS vulnerabilities in web applications. It scans all the different forms of a web page and then attacks the pages that qualify with a predefined XSS payload.

11. SQL Inject Me: This one helps in finding SQL injection vulnerabilities in web applications. It displays the vulnerabilities in a web application without exploiting them.

12. FlagFox: This browser adds a country’s flag on Firefox and determines where a web server is located. The add-on also has a web server. 


Author : Shivam Kotwalia, CodeKill

9 Arduino Projects You Cannot Ignore

Arduino CEO, Massimo Banzi has made some really cool videos of what all you can do with this little piece of hardware.


Arduino can be much more fun than just being an electronic prototyping platform. The fact that it is open source allows you to do various crazy, wacky, yet creative things. For those living in caves, Arduino is an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. It's intended for artists, designers, hobbyists and anyone interested in creating interactive objects or environments. Well, Arduino CEO Massimo Banzi has made some really cool videos of what all you can do with this little piece of hardware. Here we present nine interesting Arduino projects that will make your tryst with this platform even more fun. Check them out. Arduino, Arduino Projects, Open source hardware, Electronic prototyping board,Massimo Banzi, Video projects on Arduino, Arduino CEO
Spaceship Interface

Within the demonstration, Banzi creates a circuit that shows how easy it is to connect LEDs and buttons to the Arduino board. Banzi even shows us how the Arduino software can interact with the various other components. Specifically, he sets the conditions and variables within the Arduino code that can manipulate the LEDs when certain criteria are met.



The Love-O-Meter

Massimo Banzi shows us how to create the inexplicably named "Love-O-Meter". Quite simply, the system acts as a thermometer, and it is capable of measuring how hot (or not) you are. Banzi also uses several clever pieces of kit, including a temperature sensor that emits a voltage proportionate to every degree of centigrade it detects. Banzi then runs through the code needed to implement this rather curious behaviour.



Light Theremin

This time, Banzi is showing us how to make a light Theremin using the Arduino starter kit. In his simple circuit, Banzi uses a buzzer and a light sensor that will be used to judge the distance of your hand from Arduino. Banzi then hacks the hardware to show users how to change the pitch of the sound in relation to the amount light that the sensor detects. So if you are feeling musical, make sure to check out the latest Arduino video from RS Components. It is a great lesson that will surely help you to get the most from your starter kit!



Keyboard

In this tutorial video, Massimo Banzi explores the possibility of making musical sounds with the Arduino Starter Kit. To do this, Banzi has created simple circuit on the Arduino board, which is then completed with four buttons and a mini piezo speaker. But to make the device resemble a mini keyboard, Banzi has programmed each button to play a different note. Banzi then uses the Arduino software define different frequencies for each note within the code. But don’t worry if this sounds rather complicated, as he goes through the code line-by-line to show us exactly how to make a mini-keyboard. So to start making music, make sure that you watch the latest video.



Twitter-controlled Mood Lamp

This time, Banzi will be using a Wi-Fi shield module to connect his Arduino unit to the Internet. This obviously opens up a whole range of new possibilities, which Banzi explores in the video. For the purposes of this demonstration, Banzi creates a simple lamp circuit that will change colour according to the messages posted on Twitter. So if someone, for instance, Tweets a message that begins with #ArduinoRGB followed by a colour represented by a six digit decimal number (like the way colours are displayed in HTML), the lamp will then change colour accordingly. So to see how this clever device works, make sure that you tune in to the final video.



Motorized Pinwheel

It's time for another instructional video from Massimo Banzi, and this time he's showing us how to make a motorized pinwheel with Arduino. To do this, Banzi will be controlling a DC motor using the Arduino board so that he can spin the wheel at different speeds. However, creating a motorized pinwheel has its own set of unique challenges. For instance, a DC motor works at a higher voltage than the Arduino. This means that it requires more current that an Arduino pin can provide. This is, of course, a difficult problem to overcome, as too much current will burn and destroy the Arduino pin. So how will Banzi overcome this obstacle? Well watch the video to find out...



Crystal Ball (Magic 8-Ball)

Many of us fondly remember having a crystal ball (Magic 8-Ball) in our younger days, but now Massimo Banzi is showing us how to construct one from the materials in the Arduino starter kit. The electronic version of the Magic 8-Ball is completed with a LCD screen and tilt sensor, which will provide the user with a randomly generated answer after the circuit is shaken. If you would like to know how this is done, Banzi also looks at the code to show us how everything works.



Touchy-Feely Lamp

Back with a brand-new Arduino starter kit project, Massimo Banzi walks us through the process of making a touch sensor lamp. Banzi also introduces us to the concept of external libraries for the Arduino. This is an extremely useful tool that should help streamline the development process for beginners and experts alike. Put simply, an external library can be downloaded and installed into the Arduino development environment. They are essentially a database of pre-written code that can be used in your device to programme certain behaviours. In this case, the eternal library enables Banzi to create his touch sensor lamp quickly and efficiently.



Tweak the Arduino Logo

Good news... it's time for another Arduino instructional video with Massimo Banzi! And this time, our favourite Italian hardware hacker will be using the Arduino to control software running on your computer. To do this, Banzi will be hooking the Arduino board up to a computer via a USB connection, and then use a specific programme to change the colour of the Arduino logo. By the end of the video demonstration, you should be able to send a value from Arduino to your computer, and then use a program to interpret this software as a colour. Finally, you will be able to change the colour of the Arduino logo easily using a simple dial.

 


Author : Shivam Kotwalia, CodeKill

Ultrasonic Password Security for Google Accounts


Does a Strong Password Guarantee you the Security of your Online Account? If yes, then you should once check out our 'Data breaches' section on the website.

A Startup Company, SlickLogin has developed a technology that enables you to login into online accounts using Ultrasonic sound, instead of entering username and password on your.

The company claims its technology offers "military-grade security" that replaces passwords in the two-step process simply by placing your Phone next to their laptop or tablet.


When you sign-in via SlickLogin enabled website, the computer will play a sound which is encrypted into Ultrasonic Sound, inaudible to the human ear, but your Smartphone can hear it.

The Smartphone Sends data back to the SlickLogin Servers for authentication and grants immediate access. Each sound is different, unique and cannot be reused to hack an account.



Recently, Google has acquired this two month old Israeli Startup, "Today we're announcing that the SlickLogin team is joining Google, a company that shares our core beliefs that logging in should be easy instead of frustrating, and authentication should be effective without getting in the way." SlickLogin website said.

SlickLogin also uses WiFi, Bluetooth, NFC, QR codes and GPS to prevent your account from hackers on the other side of the world.

SlickLogin Technology gives you a way to set an unforgettable password, but at the same time physical access to the Smartphone may pose critical threat to your online accounts and Smartphones with Low battery Backup may trouble you most of the times.

Author : Shivam Kotwalia, CodeKill

Videos For Hacking Using Python

Python, Python hacking, hacking with Python, Python hackers, hackers, Python programming, programming through python, python news, hacking news, technology news, newsPython is a favorable programming language for hacking. We bring ten video that will help you in your hacking endeavours... 

Although some question it, many hackers prefer using Python for their work. They feel that this high level programming language has its pros when it comes to hacking. For example, it offers one of the quickest ways to make a socket, interact with a program and make a pad shell code.
Python for Hackers - Networkers Primer (Sockets, Webserver Scapy!)



Python for Hackers - Networkers Primer (Multithreaded Server and the Force of Scapy)



Learn Python Through Public Data Hacking



Programming a Custom Backdoor in Python



Hack of the Day: Wireless SSID Sniffer in 10 Lines of Python



Hacking With Python #1 - What is Brute-Forcing?



Simple Python Virus Tutorial



Hacking DOS binaries using Python – intro



Python : Making A Simple Email Bot



Hack login and admin panels using python script



Author : Shivam kotwalia, CodeKill

Turning your iPhone or Android camera into Microscope


Have you ever been wanting to take a picture of something you're looking at under your microscope but you just can't? Well, but now the Microphone Lens turns your iPhone or Android camera phone into a portable handheld microscope.

By attaching a lightweight, inexpensive device to the back of a smart phone, researchers at the University of California (UCLA) can convert the phone into a sensitive fluorescence microscope.

Microphone Lens allows the phone's camera to take pictures of single nanoparticles and viruses, possibly providing a portable diagnostic tool for health care workers in developing countries.
In an experiment, A Nokia 808 PureView smartphone has been used to do fluorescent imaging on individual nanoparticles and viruses. By clipping on a 3D-printed attachment that included a laser bought on eBay



Their work is funded by Nokia university research funding, the Army Research Office, the National Science Foundation, and other sources.

Author : Shivam Kotwalia, CodeKill

Free eBooks On Embedded Systems

embedded system, free ebooks, ebooks, free ebooks on embedded systems, Aurdino, microcontroller, Programming Embedded Systems, electronics, programmingHere's bringing 14 free ebooks to help you learn more about different aspects of embedded systems.

From introduction to embedded system to unified hardware/software approach to programming embedded systems and what not, we bring to you a sorted list of ebooks that cover all what you wanted to learn about embedded systems.

 1. Embedded Systems - High Performance Systems, Apps and Projects

This book addresses a wide spectrum of research topics on embedded systems, including parallel computing, communication architecture, application-specific systems, and embedded systems projects.

2. Embedded Systems - Theory and Design Methodology (K. Tanaka)

This book addresses a wide spectrum of research topics on embedded systems, including basic researches, theoretical studies, and practical work.

3. First Steps with Embedded Systems (Byte Craft Limited)

Author(s) Byte Craft Limited
Publisher: Byte Craft Limited

This book is intended to fill the need for an intermediate level overview of programming microcontrollers using the C programming language.

4. Introduction to Embedded Systems - A Cyber-Physical Systems

Author(s) Edward Ashford Lee, Sanjit Arunkumar Seshia
Publisher: Lulu.com (April 13, 2011)

This book strives to identify and introduce the durable intellectual ideas of embedded systems as a technology and as a subject of study.

5. PaulOS: An 8051 Real-Time Operating System (Paul P. Debono)

Author(s) Paul P. Debono
Publisher: Bookboon (2013)

This book covers mainly the 8051 family of micro-controllers starting with the basic architecture and then moves on to assembly language and Real-Time Operating System (RTOS) where three main types of self-developed RTOSs are discussed.

6. Patterns for Time-Triggered Embedded Systems (Michael J. Pont)

Author(s) Michael J. Pont
Publisher: Addison-Wesley Professional; 1st edition (July 12, 2001), ebook (2009)

This book introduces 70 powerful, proven design techniques patterns for enhancing rapid development and reliability in embedded systems based on the popular 8051 microcontroller family.

7. Embedded System Design: A Unified Hardware/Software Approach

Author(s) Frank Vahid and Tony Givargis
Publisher: Wiley; New edition edition (October 17, 2001)

This book introduces a modern approach to embedded system design, presenting software design and hardware design in a unified manner.

8. Embedded Software Development with eCos (Anthony J. Massa)

Author(s) Anthony J. Massa
Publisher: Prentice Hall (December 5, 2002)

In this start-to-finish guide to eCos solution building, the author covers eCos architecture, installation, configuration, coding, deployment, and the entire eCos open source development system.

9. Programming Embedded Systems using C (Mikael J. Pont)

Author(s) Mikael J. Pont
Publisher:Addison-Wesley Professional (May 4, 2002), eBook (2006)

A book designed for programmers with desktop experience in C. Key techniques required in all embedded systems are covered in detail.

10. Programming Embedded Systems in C and C++ (Michael Barr)

Author(s) Michael Barr
Publisher: O'Reilly Media; 1 edition (January 30, 1999)

The techniques and code examples presented in this book are directly applicable to real-world embedded software projects of all sorts.

11. Programming Memory-Constrained Networked Embedded Systems

Author(s) Adam Dunkels
Publisher: Mälardalen University Press (2007)

This book focuses on three topics regarding programming memory-constrained networked embedded systems: the TCP/IP, simplifying event-driven, and dynamic loading for memory-constrained systems.

12. Real-Time Systems, Architecture, Scheduling, and Application

Author(s) Seyed Morteza Babamir
Publisher: IN-TECH (April , 2012)

This book is a rich textbook for introducing diverse aspects of real-time systems including architecture, specification and verification, scheduling and real world applications.

13. Arduino Programming Notebook (Brian W. Evans)

Author(s) Brian W. Evans
Publisher: Lulu.com (September 10, 2008)

This book is a beginner's reference to the programming syntax of the Arduino microcontroller.

14. Interfacing with C++: Programming Real-World Applications

Author(s) Jayantha Katupitiya Kim Bentley
Publisher: Springer; 1 edition (April 11, 2006)

This book is for people who are interested in learning and exploring electronic interfacing as well as C++ programming in a practicable and enjoyable way.
Author : Shivam Kotwalia, CodeKill

50 Open Source Software For Your Windows PC

Using a Windows PC doesn't mean that you have to be trapped within it. There are many open source applications that run on Microsoft's Windows. Here are 50 of the best of the lot!
Linux, Windows, Microsoft, GCompris, Frets on Fire, FlightGeat, AssaultCube Reloaded, best open souce windows apps
App Collections: These are tools that contain a numbebr of open source software within them. They are complete packages that can run on Windows.

1. OpenDisc

2. PortableApps.com

3. winPenPack

Antivirus: You already know an what Antivirus is, add something get a good one, for example, use this software

4. ClamWin Free Antivirus

Astronomy: These are nifty tools that map the night sky for you and show you how the sky is looking at a particular moment from a particular point.

5. Celestia

6. Stellarium

Audio Tools: While VLC is the obviously the most popular open source audi player on Windows, there are some others that cater to musicians and audio/video editors as well.

7. Amarok

8. Audacity

9. Clementine

10. MuseScore

Backup: It is always advised that you should backup the data on your machine. This is where these open source tools can be very handy.

11. AMANDA

12. Areca Backup

13. Redo

Blogging: Wordpress is the suite of choice for those looking to develop their own websites and blogs. It contains a number of functionalities and features.

14. WordPress

Browsers: You would of course known about Mozilla's Firefox internet browser. This is the most popular open source brower used by many people all over the world. In addition, there are

15. Chromium

16. Firefox

17. Tor Browser

CAD

18. BRL-CAD

Groupware: These are software that help you track and manage group projects where you are collborating with a lot of other people.

19. Collabtive

20. Feng Office

Compression:

21. PeaZip

Content Management Content Management Systems are computer programs that allow the publishing, editing and modification of content from a central source. Best examples of this would be Drupal and Jhoomla.

22. DNN (formerly DotNetNuke)

23. Drupal

24. Joomla

25. Plone

Customer Relationship Management: These software aid companies in future and current customer relationship maintenance.

26. Sugar Community Edition

Databases: Windows may not exactly be a friend of open source, but no one can deny its contributions to the tech world. Many programmers have created the best of programs while using the Windows OS. For this they needed databases and many of them used open source databases.

27. Firebird

28. MySQL

29. PostgreSQL

Data Destruction: Recycing it just as important on your computer as it is in real life. There comes a time when you need to get rid of data. This is where this software comes in handy.

30. BleachBit

31. Darik's Boot And Nuke

Desktop Enhancements: These are software that add various elements to your desktop. This could include sticky notes, screensavers and a bunch of other interactive components.

32. Electric Sheep

33. PNotes

34. VirtuaWin

Desktop Publishing: These are page layour publishers. Other examples of this would be QuarkExpress, Adobe Indesign etc.

35. Scribus

Email Client: These clients can manage your email, especially the one mentioned here, which integrates beautifully with the Firefox internet brower

36. Thunderbird

Encryption: These software can make encrypting files so easy that you sometimes have to do nothing more than make a simple mouse click.

37. AxCrypt

38. Gpg4win

39. TrueCrypt

Enterprise Resource Planning: As the name suggests, these software aid enterprises in their planning purposes.

40. ADempiere

41. Apache OFBiz

42. Compiere ERP + CRM Business Solution

43. Openbravo

44. Postbooks/xTuple ERP

Games: Windows has been the better platform for games, but open source games have still penetrated this platform and made a name for themselves.

45. 0 A.D.

46. Alien Arena

47. AssaultCube Reloaded

48. FlightGear

49. Frets on Fire

50. GCompris

Author : Shivam Kotwalia, CodeKill

11 Top Circuit Simulators For Engineers

electronic circuits, digital circuits, analog circuits, circuit simulators, best circuit simulators, top circuit simulators, SPICE, circuit analysis, tools for circuit analysis, free circuit simulatorsWhether it is for Analog Electronics, Digital Electronics or both, we bring you 11 of the best circuit simulators for your analysis purposes.

software license from various platforms. These tools replicate the working of an actual circuit and hence electronic device, on the computer. They use mathematical models for the same. As a result, circuit simulators can be invaluable analysis tools for engineers. Here are some of the top freely available electronic circuit simulators.
Analog Electronic Circuit Simulators: These tools simulate analog circuits on your system. You can use them for their analysis.

1. Electric

2. gpsim

3. SPICE

4. Oregano


Digital Electronics: These tools are for digital electronic circuits. These tools are invaluable when you need to analyse digital circuits.

1. KTechLab

2. Deeds

3. Hades

4. Logisim


Mixed: These tools can be used for both digital and analog circuits. They can simulate both kinds of circuits on your system.

1. GNU Circuit Analysis Package

2. Ngspice

3. Quite Universal Circuit Simulator

Author : Shivam Kotwalia, CodeKill

LibreOffice Version 4.2.1 Is Out Now

LibreOffice Version 4.2.1, Document Foundation, LibreOffice, Open Source, Microsoft Office, LibreOffice 4.2, mediawiki extension, Windows, office suite The new release comes with some changed or added menu entries. 


 The Document Foundation has announced a minor update for LibreOffice, Open Source's very own answer to Microsoft Office. LibreOffice Version 4.2.1 comes with some changed or added menu entries as the release not states. The update is the successor to LibreOffice 4.2.


“LibreOffice 4.2 was extremely ambitious, in terms of code refactoring. Because of this, we planned an extensive quality assurance cycle, based on automated tests followed by QA sprints in December and January, but we were not able to catch all the issues. Based on early adopters feedback, developers and QA experts have jumped in immediately, and have solved the most urgent problems in less than three weeks, showing the importance of our large community.” Thorsten Behrens, chairman, Document Foundation was quoted as saying. LibreOffice 4.2.1 for Windows will allow multiple user interface languages. Meanwhile, the Mac version has done away with the mediawiki extension.

LibreOffice 4.2 was targeted towards early adopters and was another significant step forward for the best free office suite ever. LibreOffice 4.2 featured a large number of performance and interoperability improvements targeted to users of all kinds, but particularly appealing for power and enterprise users. In addition, it was better integrated with Microsoft Windows.

You can download LibreOffice Version 4.2.1 here: LibreOffice Version 4.2.1 


Author : Shivam Kotwalia, CodeKill

An Indian Student Builds Computer Sans Hard Disk

Afreed Islam, Computers, Class X Student, CBSE exams, computer system , hard disk, microchip, Revo Book, dual operating system, Windows , Linux, storage unit, data loss, system crash, ReVo IX operating systemWhile his classmates have been toiling hard for their upcoming board exams, Afreed has been busy doing something really different! 

Afreed Islam is a student of Little Flower School, Hatigaon. He will soon be appearing for his Class X CBSE exams, which begin on 3 March. While his other classmates have been toiling hard preparing for their board exams, Afreed has been busy doing something really different, something far more remarkable, something that proves you don't need so and so qualification to prove genius. Afreed has built his very own computer system that interestingly replaces a hard disk with a microchip.
Afreed had first conceived the idea to build the 'Revo Book', while he was in Class 8. Back then, owing to some issues in the system (let's be honest, what had you been doing when you were in Class 8?) he was not successful in leading to a formidable conclusion, however, that did not deter him at all, in fact it motivated him to keep working. So much so that Afreed is now out with the prototype of the computer system dubbed Revo Book.

Revo Book comes with a dual operating system allowing a seamless use of both Windows and Linux-based software simultaneously on one device. However, contrary to usual computers, Afreed has replaced both mechanical and electronic hard disk drives here with a microchip that acts as the primary storage unit. The use of a chip he says minimises the risk of data loss or system crash.

If that was not enough, Afreed has also developed his own ReVo IX operating system that comes pre-installed on the microchip for faster execution speed. The OS also comes with a built-in firewall. Afreed has already applied for a patent for the stand alone operating system. Furthermore he is currently in talks with a German company to manufacture the computer system on a larger, commercial scale. 


Author : Shivam Kotwalia, CodeKill

Google acqui-hires Spider.io to help stop online ad frauds

Adding to the acquisition spree of 2014, Google today announced the acqui-hiring of London based startup spider.io. It’s a web based security firm into checking the online advertisement frauds. Confirming the news on the blog, Neal Mohan,VP – Digital Advertising, Google said,

Today we’re announcing our latest investment: we’ve completed an acquisition of spider.io, a company that has spent the past 3 years building a world-class ad fraud fighting operation.


Spider.io came into limelight last year, when it was able to identify the YouTube hijack by a notorious adware company, Sambreel. The amount of deal is not yet disclosed. From immediate effect, the 7 membered team founded by Douglas De Lajer of spider.io will be joining Google.
Google further added,

Our immediate priority is to include their fraud detection technology in our video and display ads products, where they will complement our existing efforts. Over the long term, our goal is to improve the metrics that advertisers and publishers use to determine the value of digital media and give all parties a clearer, cleaner picture of what campaigns and media are truly delivering strong results. Also, by including spider.io’s fraud fighting expertise in our products, we can scale our efforts to weed out bad actors and improve the entire digital ecosystem.



Google also expressed its concern for the industry overall, “As an industry, we can address this issue and block those who seek to game the system. We can make digital the platform of choice for all marketers — including brands — to invest. And we can offer accountable media for all; we’re excited to take this big next step.”
Updates coming soon.

Author : Shivam Kotwalia, CodeKill

Here Are 10 Must Know WhatsApp Tips And Tricks

WhatsApp offers a compelling, dependable and practical messaging experience! Here's all you need to know to achieve the very best out of it! 
WhatsApp, WhatsApp Tips, messaging experience, Facebook Inc, Timestamp, iOS users, Android users, Hide WhatsApp Status, Backup And Restore , WhatsApp Lock, 1TapWA , WhatsApp Phone Number, Android Tablet

There's been a lot of fuss going around the whole 'social networking giant Facebook Inc buying mobile messaging sensation WhatsApp', leaving fans and enthusiasts alike in a state of dizziness regarding the future of the app. Of course, WhatsApp on its part has made it clear that it would continue to remain an independent entity prior to the deal. But, honestly we know Facebook integration might eventually be pushed at some point of time. As of now, WhatsApp undoubtedly remains to be a compelling, dependable and practical messaging experience!

Here are 10 tips, tricks and apps to get more out of your Whatsapp:

1. Hide "Last Seen" Timestamp

-WhatsApp shows a "last seen" timestamp by default. However, you can disable this timestamp on both iOS and Android.

-For iOS users: all you need to do is go into Settings > Chat Settings > Advanced and set Last Seen Timestamp to Off.

-For Android users: third party apps such as Hide WhatsApp Status is there for help. It works by disabling your WiFi and data connection when you open WhatsApp.

2. Backup And Restore WhatsApp Chats

-WhatsApp allows automatic backups of your chats, however there is also a manual option to do it.

-For iOS users: Settings > Chat Settings > Chat Backup, then tap Back Up Now.

-For Android users: Settings > Chat settings and tap Backup conversations to create a backup. To backup media you will need to use a file manager to copy the media folders in /sdcard/WhatsApp/Media.

-However, if you want to restore a backup you will have to uninstall and reinstall WhatsApp.

3. Lock Your WhatsApp

-For Android users: use WhatsApp Lock.

-For BlackBerry users: use Lock for WhatsApp.

-You can then protect WhatsApp by a PIN (WhatsLock) or a password (Lock for WhatsApp).

4. Create Shortcuts For Important Contacts

-For Android users: simply long press on the group or contact you want to create a shortcut for. Tap on Add conversation shortcut on the menu that pops up and you have shortcut right on your homescreen.

-For iOS users: third-party apps such as 1TapWA are there to help.

5. Stop WhatsApp Images from Appearing In Gallery Or Camera Roll

-For iOS users: go to Settings > Privacy > Photos and then turn the WhatsApp switch off.

-For Android users: create a .nomedia file in WhatsApp’s images or video directories by using a file explorer such as ES File Explorer (Navigate to the images or video folders, tap the 'New' button in the lower left, pick 'File' and create a file named .nomedia)

6. Change Your WhatsApp Phone Number

-You don’t need to uninstall and reinstall WhatsApp everytime you change numbers on the same phone.

-Go to Settings > Account > Change number. Enter your old phone number in the top field and then your new phone number in the bottom field and press Done. Verify your new phone number, and you're good to go!

7. Install WhatsApp On An Android Tablet

-Get the latest version of the WhatsApp .apk. Then download SRT AppGuard. Install both.

-Run AppGuard first. Select WhatsApp from the Dashboard then press Monitor. At completion, scroll down and disable read phone status and identity under Phone calls. WhatsApp will now successfully run on your tablet.

8. WhatsApp Chat Heads On Android

-Using WhatsApp Chat Heads you can add chat heads for your conversations.

-The chat heads are also customisable, and come with specific LED colors, notification sounds and chat head colors for each of your contacts.

-Advisory: The app requires root access. Plus, it’s also still in beta.

9. Get Messaging Statistics On Android

-WhatStat provides information on your 'top' friends, most active times of the day when your friends and groups use WhatsApp as well as message distribution for both one-on-one and group chats.

10. Get WhatsApp notifications On Desktop

-You need to install Desktop Notifications on your Android phone. Install either the Chrome or Firefox extensions depending on your choice of browser. Link the extension to the app using the code provided and you’ll now get WhatsApp notifications on your desktop.

Author: Shivam Kotwalia, CodeKill

Why Facebook is buying WhatsApp for $19 Billion?



Popular Smartphone Messaging app WhatsApp's $19 billion acquisition by Social Network giant Facebook made Headlines this week.

While Some are applauding the move, and many other users are worried about WhatsApp’s future and their privacy after this acquisition.

Why So Serious?
WhatsApp currently having 450 million active users and processes 50 billion messages a day. Service charges a nominal service fee of $1/year, that means Facebook is buying at $42.22 per user.
.
$19 Billion / 450 million users  = $42.22 per user


These figures showobviously future revenue from WhatsApp can’t cover the acquisition cost in the short or mid-term.

"You can still count on absolutely no ads interrupting your communication. There would have been no partnership between our two companies if we had to compromise on the core principles that will always define our company, our vision and our product." WhatsApp founder said in a blog post.

So, What Facebook is planning for? Facebook is by far the world’s most popular social network, with over 1.2 billion users worldwide, but all WhatsApp users may not have an account on Facebook. Facebook CEO Mark Zuckerberg posted on his wall, "Our mission is to make the world more open and connected", that means Facebook could merge WhatsApp data with them, but Mark also said, "WhatsApp will continue to operate independently within Facebook".


"Facebook Mobile Messenger is widely used for chatting with your Facebook friends, and WhatsApp for communicating with all of your contacts and small groups of people. Since WhatsApp and Messenger serve such different and important uses, we will continue investing in both and making them each great products for everyone.Mark Zuckerberg added.



Mark said,'Making them each great products for everyone'
By design, WhatsApp collects all contact information from phones and uploads that information to the company's servers. This is hugely valuable data that Facebook has apparently been after from last two years. In simple words, 'Facebook Just Bought 450 Million Phone Numbers in $19 Billion'.

WhatsApp claim that users’ messages are never stored on their server after delivery to the recipient. So we are expecting that Facebook could never dig into our private messages history, but that doesn't mean -- it will not store in the future.

Can we trust Facebook and WhatsApp?
Well, 70% users don't trust Facebook with their personal information, whereas a large percentage of users still trust WhatsApp for sharing personal information.

WhatsApp has many Security issues as well as privacy issues, but that hasn't scared off its more than 450 million users around the world.

Alternate Secure & Encrypted messaging Smartphone apps? 
If you care about your privacy a lot and don’t want to hand your communication to Facebook, you might want to look into secure messaging solutions, like - Surespot an open-source Android and iOS messaging solution and Threema, end-to-end encrypted app for Android and iOS.

What would be the next in Facebook's shopping list? A mobile handset company? 

Author : Shivam Kotwalia, CodeKill

Blog Archive

Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)