Sunday, 22 June 2014

Looking For Codes? Try these!

Well, if you're a web designer/developer, you must have a knack for coding. Time and again coders need to check out codes that have been there for sometime. There are a number cool search engines for this purpose. Here are eight good ones!

1.Debian Code Search

Debian Code Search (DCS) is a search engine for source code — it searches all the open source projects which are included in the Debian archive (the main distribution only, not non-free or contrib). Currently, that includes about 18000 packages with 140 GiB of source code.

2.Codase

Codase hosts huge amount of open source codes providing a much better coverage, as it covers codes usually hidden inside compressed files and source control repositories, where general search engines fail to find and index.

3.GrepCode

GrepCode can be used to find: Java projects, Java classes, interfaces, enums, annotations (Java Types) and Java methods. In addition, GrepCode allows users to do stacktrace searches and find usages of classes and methods.

4.Lucene

Krugle is a search engine that allows computer programmers and other developers to search Open Source repositories to locate open source code, and quickly share the code with other programmers on the internet.

5.searchcode

searchcode is a free source code and documentation search engine. API documentation, code snippets and open source (free sofware) repositories are indexed and searchable.

6.Antepedia

Antepedia offers the newest and most relevant information for your open source management and detection projects. It is a public site where you can search for a project, or submit those that are not indexed in the Antepedia Community.

7.Ohloh

Ohloh is a free, public directory of Free and Open Source Software and the contributors who create and maintain it. Ohloh Code is a publicly available, free code search site that indexes most of the projects in Ohloh.

8.GitHub

GitHub is a web-based hosting service for software development projects that use the Git revision control system. GitHub offers both paid plans for private repositories, and free accounts for open source projects.  

Author : ShivamKotwaliaCodeKill

Tuesday, 25 February 2014

Facebook shuts down its email service

Facebook quietly ends its @Facebook email addresses due to low usage.


                               


Facebook has stopped its @facebook.com mailing service, citing low usage. Those using the email service will soon receive an email telling them that their emails from @facebook.com account will be forwarded to the primary address listed on their email accounts.

A Facebook spokesperson confirmed the news in a statement to the Verge, “Most people have not been using their @facebook.com email address.”
The email id's were initially launched in 2010 to streamline all communication under a single umbrella by the social networking site. Facebook announced the feature in a blog post, "It seems wrong that an email message from your best friend gets sandwiched between a bill and a bank statement."
The service didn't catch up, due to the lack of a friendly interface. The Messages screen always highlighted Facebook messages, and didn't support cc's, bcc's, or subject lines. Facebook received a lot of criticism in June 2012, when it highlighted @facebook.com email addresses on profiles while hiding other email addresses. The move was intended to make user email id's private, but users thought Facebook was favoring its own email services over others. The email id's also caused many privacy issues as users could easily guess others' email id's with just their profile names.
Email forwarding is turned on by default, but users can choose to opt-out of the service by simply removing their primary email address from their account or turning it off from the account settings.
Facebook recently celebrated its 10th anniversary by Look Back videos for million of users. The minute long video highlighted a user's journey on Facebook and showed their most 'liked' and shared photos shared on the site. The video montage was appreciated by users and "proven to be incredibly popular," Facebook stated.


Saturday, 22 February 2014

Android iBanking Trojan Source Code Leaked Online


Smartphone is the need of everyone today and so the first target of most of the Cyber Criminals. Malware authors are getting to know their market and are changing their way of operations. Since last year we have seen a rise in the number of hackers moving from the Blackhat into the Greyhat.

The Head of knowledge delivery and business development for RSA's FraudAction GroupDaniel Cohen warned users about the new threat via a company blog on Thursday, that explains everything about the malware app, called iBanking.

iBanking, a new mobile banking Trojan app which impersonates itself as an Android 'Security App', in order to deceive its victims, may intimidate a large number of users as now that its source code has been leaked online through an underground forum.

It will give an opportunity to a larger number of cybercriminals to launch attacks using this kind of ready-made mobile malware in the future.


Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, by sending unique one-time-use codes to their customers' registered phone numbers via SMS, but in order to defraud them, cyber criminals have started to create various mobile malware like iBanking to solve their purpose.


According to Security Researcher Daniel Cohen, the iBanking mobile bot is a relative all new to the mobile malware arena, and has been available for sale in the Underground Hacking Marketplace [Forum Link] since late last year for $5,000.
"We first saw the iBanking malware was distributed through HTML injection attacks on banking sites, social engineering victims into downloading a so called 'security app' for their Android devices," said the RSA researchers in a blog post.
In addition, with the iBanking malware, Computer malware is used to defeat the mobile-based security mechanisms used by the banking sites.

"Apart from the server-side source-code, the leaked files also include a builder that can un-pack the existing iBanking APK file and re-pack it with different configurations, essentially providing fraudsters with the means to create their own unique application," added Daniel Cohen.

In addition to SMS Sniffing, the iBanking app allows an attacker to redirect calls to any pre-defined phone number, capture audio using the device's microphone and steal other confidential data like call history log and the phone book contacts. 

During the installation process, the malicious app attempts to Social Engineer the user into providing it with administrative rights, making its removal much more difficult.
"The malware is an example of the ongoing developments in the mobile malware space and we are now seeing the next generation of malicious apps being developed and commercialized in the underground, boasting web-based control panels and packing more data-stealing features," said Daniel and added that 
"The malware’s ability to capture SMS messages and audio recordings, as well as divert voice calls makes step-up authentication all the more challenging as fraudsters gain more control over the OOB device. This highlights the need for stronger authentication solutions capable of validating users’ identities using multiple factors including biometric solutions."
These Days, the malware apps are particularly dangerous as they are often designed to look as authentic as possible and one in five mobile threats are now bots, which is a sign that the complexity of Mobile Malware is increasing.

Author : Shivam Kotwalia, CodeKill

Tuesday, 4 February 2014

8 Illegal Things Done On The Internet Unknowingly

Illegal, Internet, Wi-Fi, Connectivity, Ad blockers, GIF, Editing, Applications, Network, InstancesCodeKill Group brings you some activities which although done by us regularly over the Internet are considered illegal. 

Today’s generation utilizes web for getting things done with great comfort and ease. There are a number of applications that can be used everyday, which we don’t realize was illegal until we are caught. These can range from anything from editing an image or downloading a file or even connecting to an unsecured Wi-Fi connection.

1. Ad Blockers – There are a number of instances when one is faced with ads that keep popping up while doing something. Many times they are irritating and force you to close it without care or install an ad blocker. But blocking the advertisements that pops up on the screen is considered illegal in some countries as advertisers pay high for exhibiting their messages.

2. Making GIFs and Memes - It is illegal to create memes or parody by making use of any copyrighted materials. Even for criticising, it is not permitted to use the sources. But it is close to impossible to check the GIF making it widely distributed and nobody is really sure of its origin.

3. Working Remotely on Travel Visa – If you working from other country online on a travel visa, it is an offence. You are not permitted to login to check your professional emails when you are on a vacation in a foreign land.

4. Connecting to unsecured Wi-Fi networks – On the next occasion that you decide to connect to a Wi-Fi that can be connected without credentials, you must be careful as not to be into the trap for unauthorized usage as it is considered illegal under the Computer Fraud and Abuse Act.

5. Sharing Subscription Passwords – This should not be shared with anyone else. But there are a number of cases when multiple users use the same password for using the service that is illegal by-law. Nearly one-third of the one million subscribers of HBO are stated to share the passwords.

6. Parody Accounts - The terms and policies of Twitter clearly state that it is illegal to make fake accounts of any kind and it must be written “fake” in case of any. The social networking site has taken a lot of care not to be misidentified and does not permit playing with user names as a precautionary step against spams.

7. Underage Facebook Accounts - The terms and policies of the social networking giants, like Facebook and Twitter does not permit anybody below 13 to make an account.

8. Bypassing Paywalls - Even though it may seem simple as bypassing Google proxy servers it is illegal to make use of something that you need to pay for.

CodeKill


Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)