Friday, 21 February 2014

20 Things You Didn't Know About Computer Hacking

20 Things You Didn't Know About Computer Hacking :

1.  Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

2.  Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.

3.  One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!

4.  By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).

5.  Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.

6.  Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.

7.  Hacking went Hollywood in the 1983 movie WarGames, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.

8.  That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.

9.  In 1988 Robert T. Morris created a worm, or self-replicating program, purportedly to evaluate Internet security.

10.  The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF).

11.  They all come home eventually. Morris now researches computer science at...MIT.

12.  British hacker Gary McKinnon broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.

13.  McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.

14.  According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.

15.  It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: “I thought, ‘Gosh, this is a big problem.’”

16.  Unclear on the concept: When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online.

17.   Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.

18.  Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.

19.  This does not bode well for patients receiving wireless deep-brain stimulators.

20.  The greatest kludge of all? Roger Angel of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.


Author : Shivam Kotwalia, CodeKill

Thursday, 13 February 2014

8 Unknown Facts About Android

Android, android facts, lesser known android facts, android history, Smartphone, Google, Microsoft, Nexus, Resolution scaling, Mobile platform, Rubin, Mobile userDid you know that Android wasn't Google's idea or that in the beginning it was almost doomed? We bring you some relatively unknown facts about Android.

The very popular Android is an open book for an average smartphone user. However, there are certain facts that are still unknown about Android.

• It wasn't Google's idea: Android was the brainchild of Andy Rubin, who founded Android Inc. in October 2003 with the aim of creating a new mobile platform. Google later bought Android Inc. and hired Rubin and others in August 2005.
• It almost didn't work out: Android almost immediately ran out of cash after its founding, only to be saved, according to the Businessweek, by Steve Perlman.

• The Nexus line was a hot rumour years before the Nexus One: People started predicting about the "gPhone" as early as 2007 though Nexus came out in 2010.

• Microsoft thought it would be a non-event: Microsoft's Scott Horn, then head of the Windows Mobile marketing team, had told Engadget after Android's release, "I don't understand the impact they are going to have."

• Resolution scaling was introduced in Version 1.6: The ability to automatically scale images based on display size appeared in Donut, or Android 1.6, paving the way for the huge range of device form factors on the Android market today.

• There's an Android phone in space: A British firm launched a Nexus phone on Space, to control a satellite as part of an experiment and see how well consumer-grade electronics stand up to the rigors of space.

• Every app you run on your Android phone gets its own virtual machine: Each active app on an Android device runs in its own Dalvik VM, which keeps it safe and separate from core functions. This improves battery life and boosts performance of the phone.

• The first official version code name was NOT a dessert: Google's Dan Morrill confirmed in January that the very first alpha version of Android released to internal developers was R2-D2. 

Author : Shivam Kotwalia, CodeKill

Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)