Posts

Showing posts from January, 2017

Anonymous Shares Simple Guide On “How To Hack Donald Trump’s Smartphone”

The notorious hacking group Anonymous has shared a little guide on Twitter, telling how to hack Donald Trump’s Android smartphone. The guide mentions that Trump’s Samsung Galaxy S3, which run Android 4.4, is outdated. It makes Galaxy S3 easily hackable using techniques like Stagefright. Notably, many security researchers have also pointed out this loophole in the past. one of the major factors in the recent US presidential elections were the email leaks of Hillary Clinton’s campaign manager John Podesta, which signaled the weak cyber security measures. Now, Donald Trump is himself a target of popular hacktivist group Anonymous. Anonymous doesn’t have much affection for the United States President Donald Trump. Given the absurd policies of Trump, this stance shouldn’t surprise anyone. The hackers have published a little guide on Twitter, telling how to hack Donald Trump’s smartphone. The notorious group claims that the President is an easy target to hacking attacks. Wondering why? Becau

How to Prevent Someone From Using Your Firefox Browser

Image
Privacy is a big problem in this age of information technology. In most of the cases, you don’t want someone else to know what we are doing (or we have done) with your personal devices. There are many things you can do to prevent someone else from tracking your behavior on your devices. If it is impossible to lock your device, why not lock a specific app and prevent someone else from using it. Here we do the same with Firefox. By default, Firefox comes with a number lists of security. But, there is no chance to us for protecting it with a password. Thankfully, there are some add-ons that we can use to do that. This article will show you how to protect your Firefox with password using Master Password+ add-on. In this article, I use Firefox 50.1.0 running on Ubuntu 16.04. Step one: Installing the Master Password+ add-on Click on the three-line menu icon on the top right of your Firefox and choose Add-ons. Type “master password” on the search bar and hit enter. Install “Master Passw

How to Enable Two-Step Verification On WhatsApp

Image
Facebook-owned WhatsApp is the latest in the list of services to add support for two-step verification. The new two-step verification is optional but your WhatsApp account is probably the one you want to secure first. The company assures that once two-step verification enabled, any attempt to verify phone number on WhatsApp will require the six-digit passcode that is created by the user. To set up two-step verification for WhatsApp, you need to take the following steps: Open WhatsApp Go to Settings Go to Account Look for Two-step verification Tap on Enable On the next screen, enter six-digit passcode. Next, re-enter six-digit passcode. Optionally, add your email address on the next screen. In the last step – optional, as mentioned – WhatsApp asks for an email address to link with your account. This email address will let WhatsApp to send a link via email to disable two-step verification in case user forgets the six-digit passcode. Remember that in case you user

Histroy of Hacking you should know

[embeddoc url="http://techworldblog.in/doc/hacking_history.pptx" download="all" viewer="microsoft"] Histroy of Hacking After reading this article you guys are going to get the answer of Hackers - innovative or immoral ??? Hackers have always fascinated the public. Films books, and video games have all attempted to explore the hacker psyche - but just who are these mysterious figures ?? Take a look at this timeline of hacking history, from the phone phreaking to corporate theft. 1960s : Hacking begins in the 60s at MIT.

Google launches root certificate authority

In an effort to expand its certificate authority capabilities and build the "foundation of a more secure web," Google has finally launched its root certificate authority. In past few years, we have seen Google taking many steps to show its strong support for sites using HTTPS, like: Giving more preference to HTTPS websites in its search rankings than others.   Warning users that all HTTP pages are not secure. Starting an industry-wide initiative, Certificate Transparency − an open framework to log, audit, and monitor certificates that CAs have issued. However, Google has been relying on an intermediate Certificate Authority (Google Internet Authority G2 - GIAG2) issued by a third party, with the latest suppliers being GlobalSign and GeoTrust, which manages and deploys certificates to Google's products and services. Google announced Thursday the creation of its own certified, and independent Root Certificate Authority called Google Trust Services , allowing the compa

Police Arrest 5 Cyber Thieves Who Stole 3.2 Million From ATMs

Law enforcement authorities from Europe and Russia have arrested five members of an international cyber criminal gang for stealing $3.2 million cash from ATMs using malware. Three of the suspects, Andrejs Peregudovs (41), of Latvia, Niklae Penkov (34) of Moldova, and Mihail Colibaba (30) of Romania, were arrested in Taiwan by the Taiwanese Criminal Investigation Bureau last summer, have already been sentenced to 5 years in prison for their role in a massive ATM heist operation, involving 22 individuals from 6 countries. The European-based cyber criminal gang used a variety of different hacking techniques to infect ATMs with malware and force them to dispense cash. According to Europol that began its investigation in early 2016, the gang used spear-phishing emails containing malicious attachments to target bank employees and penetrate the bank's internal networks. From there, the cyber crooks then located and hacked into the network of ATMs from the inside, and used a malicious so

How Your Android’s Pattern Lock Can Be Cracked In Just 5 Attempts

A few days ago, Fossbytes wrote about the list of the most popular (dumbest) passwords of 2016. You might be wise enough to consider a tough password for your devices and online accounts. But if you think that pattern lock is more secure than common passwords, your thinking will change after reading this story. According to a new research published on Phys.org , it possible to crack a smartphone’s pattern lock in around five attempts, after which the device gets locked. It is possible by recording a video of people entering pattern lock on their phone. The story isn’t as childish as it sounds. You’re not supposed to decipher the pattern from the video afterward. But a computer vision algorithm developed by the researchers – from Lancaster University, Northwest University of China, and the University of Bath – is assigned to do this task. The algorithm can work with an accuracy of more than 80 percent for complex patterns and crack them in 5 attempts. In fact, they were able to crack si

Android Malware that Infected Millions Returns to Google Play Store

Image
Security researchers have discovered a new variant of the HummingBad malware hiding in more than 20 Android apps on Google Play Store. The infected apps were already downloaded by over 12 Million unsuspecting users before the Google Security team removed them from the Play Store. Dubbed HummingWhale by researchers at security firm Check Point, the new malware utilizes new, cutting-edge techniques that allow the nasty software to conduct Ad fraud better than ever before and generate revenue for its developers. The Check Point researchers said the HummingWhale-infected apps had been published under the name of fake Chinese developers on the Play Store with common name structure, com.[name].camera, but with suspicious startup behaviors. "It registered several events on boot, such as TIME_TICK, SCREEN_OFF and INSTALL_REFERRER which [were] dubious in that context," Check Point researchers said in a blog post published Monday.   The HummingWhale malware is tricky than HummingBad,

How To Find Serial Key Of Any Software

Image
Learn How To Find Serial Key Of Any Software: Here is method by which you can easily find serial key of any software on internet. Mostly these softwares are third party software. And the product key is inturn paid for the user and at the end of day software is freeware only for few days. But there is method by which you can use these software for free. Today there are many software that are not exactly paid that is they are freely available on internet to download. But some of these software need a renewal product key for further access the service of the softwares. How To Find Serial Key Of Any Software Actually there are some sites which can provide you serial key of the software which you want to activate. But the major issue is that you can’t get those sites by directly seraching with the normal keywords. As these sites are not given that much prefrence that they can come up in google. So in this google database searching trick i will tell you a specific serching technique by whic

Angry IP Scanner : Fast network scanning tool

Image
Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write Java code is able to write plugins and extend functionality of Angry IP Scanner. In order to increase scanning speed, it uses multithreaded

How To Upload a 360-degree Photo On Facebook

Facebook launched a feature allowing users to upload photos with a 360-degree view. With this, users can view a scene from all angles top, down, front and back. A 360-degree photo can either be created using a special 360 camera or by simply taking a panorama on your iPhone or a Samsung Galaxy smartphone. Apps such as Street View and Google Camera can also be used to do the same on your android device. Here’s a quick guide on how to post a 360 photo on Facebook: On the web Step 1: Click the Photo/Video tab at the top of the News Feed section or on your Timeline Step 2: Select a photo Step 3: Share it with your desired audience Step 4: Click and drag to view the photo On your smartphone Step 1: Tap on the What’s on your mind? box at the top of the News Feed section or on your Timeline Step 2: Select the Photo/Video option and choose a photo Step 3: Share it with your desired audience Step 4: Tilt and move your phone or drag your finger to view the photo You

Decoding the AI "JARVIS" of Facebook owner Mark Zuckerberg !!

JARVIS OF MARK ZUCKERBERG PERSONAL JARVIS OF MARK ZUCKERBERG: first of all ,starting with the JARVIS. It is AI designed to be helped out and make human life as easy as it can be possible through the machines and programming. Recently, we have seen that Mark Zuckerberg,CEO FACEBOOK posted a video, showing his house that has been automated. His house was under the control of an AI designed to work for him. The video that was posted showed that the AI controls appliances, music system,recognize faces,entertain the baby and much more... This is the beautifully designed AI of Mark. It helps him in his daily housework. It acts like it's the new housemate Mark has got in his house to help him. It's like he has a new housemate. The JARVIS does everything for him. [embed]https://www.facebook.com/zuck/videos/10103351034741311/[/embed] JARVIS AND HIS JOB 1.GREETINGS AND THE DAY'S INFORMATION: After waking up JARVIS greets him for the morning. It checks for the time and wishes him acco

Anonymous Warns Donald Trump: We Know What You Did

Anonymous Warns Donald Trump on Twitter, with the hacktivist group accusing him of having links to organized crime and told him he will “regret the next 4 years.” In a series of tweets sent from @YourAnonCentral , a Twitter account associated with the group, to the president-elect, Anonymous said: “This isn't the 80's any longer, information doesn't vanish, it is all out there. You are going to regret the next 4 years." The group also claimed he has “financial and personal ties with Russian mobsters, child traffickers, and money launderers.” https://twitter.com/YourAnonCentral/status/820794628853157888?ref_src=twsrc^tfw https://twitter.com/YourAnonCentral/status/820793828252782593?ref_src=twsrc^tfw “You are implicated in some really heavy sh*t,” read the warning. “Roy [Cohn] and your daddy aren't here to protect you anymore,” it continued, in an apparent reference to his friendship with lawyer Roy Cohn, who represented Trump during the ’70s when he was accused o

Gmail Phishing Attack: Do Not Open It

Image
Gmail users have been warned to beware a new online scam which could leave them open to hackers. Hackers are tricking customers of Google’s email service into clicking on fake links which then let criminals steal their personal information. Discovered by Mark Maunder, the CEO of WordPress security plugin Wordfence, the attack first sees the hacker send an email appearing to contain a PDF with a familiar file name. That PDF, however, is actually a cleverly disguised image that, when clicked, launches a new tab that looks like this: It’s the Gmail sign-in page, right? Not quite. A closer look at the address bar will show you that all is not quite as it seems: However the page is actually a portal for hackers to steal your email address and password information – giving them full access to your account. The hackers can then spread their virus even further by sending emails to all of your contacts. And even worse, if you use the same login details for other websites or accounts, the hacker

3 Indian Banks Are Under Cyber Attack

Systems of three banks have been infiltrated by hackers to create fake trade documents that may have been used to raise finance abroad or facilitate dealings in banned items. The banks are government owned and two of them are headquartered in Mumbai and one in Kolkata. The banks in question discovered that their SWIFT systems – the global financial messaging service banks use to move millions of dollars and documents across borders every day – have been compromised to create fake documents. However, they aren’t still sure about the origin of the attack and the intention of the hackers. It’s learned that soon after the breaches were reported to the Reserve Bank of India, the regulator last month directed several banks to cross-check all trade documents issued over the past one year. “The nature of the attack is unfamiliar to Indian banks. While there is no monetary loss and ransom demand as yet, there are fears that the banks’ systems have been misused. There was fraudulent duplication

The Uses Of Functions Keys You Should Know

All of us have seen function keys before. They are pretty much the standard keys you would find on any laptop or computer (Except if you are one of those Macbook 2016 users). If you are a programmer, you would have already used some of them, but for normal people, their purpose is still unknown. In various programming environments, these keys are used to compile or run a program. There are a lot of uses to the function keys that you should know. F1 through F12 may have a variety of different uses or no use at all. The operating system installed on the computer and the software program that is currently open dictates how each of these keys operate. A program is capable of not only using each of the function keys, but also combining the function keys with the Alt or Ctrl key. For example, Microsoft Windows users can press Alt + F4 to close the currently active program. Note: Some keyboards' F1-F12 keys include additional functionality when used in combination with the Fn key, which

Clash Of Clans Forum Hacked, Millions Users Data Leaked

Another Day and Another Hack ! Popular and addict game, Clash of Clans Forums Hacked . Which is owned by Supercell is the latest victims of the data breach. Cyber crooks have targeted Supercell's community forum and about one million of users data have been stolen.  On the statement Supercell have warned its all users about the latest data breached that firm has been suffered. “Our preliminary investigation suggests that the breach happened in September 2016 and it has since been fixed,” - statement says. According to the Motherboard, the data that they had received for verification consist of usernames, email addresses, IP addresses, and hashed passwords. As the Supercell community forum running on vBulletin that stores passwords in encrypted manner are easy to crack for hackers. Breach notification site LeakeBase have notified that the stolen data that it received contains information of about 1.1 million users. On statement Supercell clearly mention that only forum service

Hackers Listen to Your Facebook Voice Messages Sent Over Chat

Image
Most people hate typing long messages while chatting on messaging apps, but thanks to voice recording feature provided by WhatsApp and Facebook Messenger, which makes it much easier for users to send longer messages that generally includes a lot of typing effort. If you too have a habit of sending audio clip, instead of typing long messages, to your friends over Facebook Messenger, you are susceptible to a simple man-in-the-middle (MITM) attack that could leak your private audio clips to the attackers. What's more worrisome is that the issue is still not patched by the social media giant. Egyptian security researcher Mohamed A. Baset told about a flaw in Facebook Messenger's audio clip recording feature that could allegedly allow any man-in-the-middle attacker to grab your audio clip files from Facebook's server and listen to your personal voice messages. Let's understand how this new attack works. Here's How Attackers can Listen to your Personal Audio Clips: When

India wants more details from WhatsApp on its data sharing policy

WhatsApp won’t be able to get away with its privacy policy changes so easily in India. India’s Supreme Court today sent a notice to the central government, telecom regulator TRAI, as well as Facebook and WhatsApp to address a petition that raises issues with WhatsApp’s move to share some user data with its parent company Facebook. Today's ruling by Chief Justice JS Khehar reignites the plea two students brought to the Delhi High Court last year. At the time, the Delhi High Court had directed WhatsApp to make two alternations to its then forthcoming policy changes. Chief Justice Khehar asked the petitioner why WhatsApp, a private company, should protect the privacy of a user. To which the petitioner, senior advocate Harish Salve, argued that WhatsApp with over 160 million users in India, has become a utility service and thus it needs to safeguard data and privacy of its users. "The Government of India should protect my rights under Article 19 (freedom of speech and expression)

10 Reasons Why Your Computer Runs Slow

Image
There are reasons for slow computer and any one of them could result in Cash and BSOD(Blue screen of Death). A Slowdown usually occurs over a period of time .Unless you are on dial-up that is slow to begin with have less than 512 MB of Ram ,that too can be a major issue Reasons Why Your Computer Runs Slow Startup Overload The more programs you have that are loading at start-up,the Slower the startup Remove the program you do nor want  or are not necessary to be starting at boot-up   Clean up PC :   Update windows Detect and repair disk error Disk Cleanup Spyware These are Malicious Programs that stealthily embed themselves into your software They are installed in your Software without your knowledge,especially through email These must be removed from your computer before they cause damage to your operating system and applications   The Registry If your registry is corrupted or bloated,there colud be a BSOD in your future. Corruption or overload can cause:

Student Faces 10 Years In Prison For Creating And Selling Limitless Keylogger

Image
A 21-year-old former Langley High School student, who won a Programmer of the Year Award in high school, pleaded guilty on Friday to charges of developing and selling Limitless Keylogger  malware that infected thousands of victims. Zachary Shames from Virginia pleaded guilty in a federal district court and now faces a maximum penalty of up to 10 years in prison for his past deeds. Shames was arrested this summer while he was working as a technical intern at Northrop Grumman, a security and defense government contractor, developing front-end site code and backend Java software and managing a MySQL database, according to what appears on his Linkedin page. According to a press release from the U.S. Department of Justice, Shames developed a keylogger in 2013 that allowed users to steal sensitive information, including passwords and banking credentials, from a victim's computer, while he was still a high school student in 2013.   Keylogger is malicious software designed to record every

WhatsApp Backdoor allows Hackers to Intercept and Read Encrypted Messages

Most people believe that end-to-end encryption is the ultimate way to protect your secret communication from snooping, and it does, but it can be intercepted if not implemented correctly. After introducing " end-to-end encryption by default " last year, WhatsApp has become the world's largest secure messaging platform with over a billion users worldwide. But if you think your conversations are completely secure in a way that no one, not even Facebook, the company that owned WhatsApp, can intercept your messages then you are highly mistaken, just like most of us and it's not a new concept. Here's the kick: End-to-end encrypted messaging service, such as WhatsApp and Telegram, contain a backdoor that can be used, if necessary, by the company and of course hackers, or the intelligence agencies to intercept and read your end-to-end encrypted messages, and that’s all without breaking the encryption. And that backdoor is — TRUST . No doubt most of the encrypted messagi

Airtel Zambia Hacked By Hackers

A Kabwe Magistrate’s Court has fined a 28-year-old man K5,000 or eight months simple imprisonment for hacking into Airtel Zambia network to reroute international calls. Chanda Chiti of Highridge Township in Kabwe pleaded guilty to one count of securing access to an electronic communication network contrary to section 77 (2) (d) of the Information and Communication Technologies Act. Facts before Magistrate PumuloMubita yesterday were that Chitiused an electronic gadget known as simbox to intercept international calls on Airtel network and bill them at the local rate. The court heard that his action between January and March last year resultmagistrateed in the loss of more than US $24,000 by the mobile phone company. Airtel Zambia had reported to the police on April 8, 2016 that it had lost more than US $24,000 in phone call re-routing between January and March 2016. The ideal situation is that Airtel bills the other mobile service provider making an international call for using its netw

Hackers Hacked Mobile Hacking Company

The mobile hacking company Cellebrite has been pretty popular last year due to its involvement in the hacking in the iPhone that belongs to the terrorist from San Bernardino scandal. Now the company again made it to the headlines, not because of their accomplishment, but the reason is different. A hacker managed to hack the company and steal more than 900 gigabytes of data. According to a report from the Motherboard, an unnamed hacker has breached Cellebrite’s systems and managed to steal 900 Gb of data . The data includes the customer usernames and passwords, the data collected by the company from various mobile devices, and other technical information of the company. All the stolen files and data is reportedly traded in some IRC chat rooms, but the hacker claims that he did not leak the data to the public. The motivation of the hacker is still not clear, but he seems to have dome this against the changes in surveillance legislation and the “recent stance taken by Western governments.

Tools To Kick Devices Off Your Network

Image
Tools to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. Different tools available for different platform. NETCUT Download Now NetCut is a Tool helping Discover who is on your wireless/Wire network instantly.Netcut Works in office LAN, school LAN/ISP LAN or or even Iphone/Xbox/Wii/PS3andriod/andriod network.Find/export all MAC address in your network in seconds. NetCut can Turn off & on network on any device , computer/phone/xbox/wii/Router/switcher in your LAN and Protect user from ARP SPOOF attacks Works with Windows and Android   Download Now KickThemOut Download Now A tool to kick devices out of your network Compatible with Python 2.6 & 2.7. You can download KickThemOut by cloning the Git Repo and simply installing its requirements: $ git clone https://github.com/k4m4/kickthemout.git $ cd kickthemout $ pip install -r requirements.txt Download Now  

How To Add Recycle Bin To Android Smartphone

Image
One of the plus points of using a PC is that you can retrace your deleted data back from the recycle bin. But when it comes to smartphones, once a file is deleted, its gone forever. That is the moment we wish we have recycle bin like feature in our Android smartphone too. Here in today’s article, we will tell you how you can get recycle bin features in your smartphone. Use Dumpster to Restore Photos & Videos: For this purpose, you can use  Dumpster . It works just like recycle bin on your windows or mac PC. The recovery ability of Dumpster is perfect complementary cloud for backup tools (Dropbox, Google Drive, Microsoft OneDrive). It completely eliminates the need to constantly backup all your data. Dumpster also gives you the ability to recover accidentally deleted data including vids, images, pdf, audio, mp3, mp4, zip, doc, ppt, Avi, jpg, mpg, rar and all common file types. You can find this application in Google Play store and download it to have a Recycle Bin on your mobile.You

Browser AutoFill Feature Can Leak Your Personal Information to Hackers

Image
Just like most of you, I too really hate filling out web forms, especially on mobile devices. To help make this whole process faster, Google Chrome and other major browsers offer "Autofill" feature that automatically fills out web form based on data you have previously entered in similar fields. However, it turns out that an attacker can use this autofill feature against you and trick you into spilling your private information to hackers or malicious third parties. Finnish web developer and whitehat hacker Viljami Kuosmanen published a demo on GitHub that shows how an attacker could take advantage of the autofill feature provided by most browsers, plugins, and tools such as Password Managers. Although, this trick was first discovered by Ricardo Martin Rodriguez , Security Analyst at ElevenPaths, in the year 2013, but it seems Google haven't done anything to address weakness in Autofill feature. The proof-of-concept demo website consists of a simple online web form wit

Stolen NSA "Windows Hacking Tools" Now Up For Sale!

Image
The Shadow Brokers who previously stole and leaked a portion of the NSA Windows Hacking Tools and exploits is back with a Bang! The hacking group is now selling another package of hacking tools, “ Equation Group Windows Warez ,” which includes Windows exploits and antivirus bypass tools, stolen from the NSA-linked hacking unit, The Equation Group. For those unfamiliar with the topic, The Shadow Brokers is a notorious group of black-hat hackers who, in August 2016, leaked exploits, security vulnerabilities, and "powerful espionage tools" created by The Equation Group. On Saturday, the Shadow Brokers posted a message on their ZeroNet based website, announcing the sale of the entire " Windows Warez " collection for 750 Bitcoin (around US$678,630). The data dump contains many windows hacking tools, categorized as following: Fuzzing tools (used to discover errors and security loopholes) Exploit Framework Network Implants Remote Administration Tools (RAT)

Nokia Working on its own AI assistant called Viki

Image
As like Google which have Now and Apple have its AI Siri, now Finnish company Nokia is also working on its own Artificial Intelligence app which may be named as "Viki" . GSMinfo obtain an document that points Nokia has filled a trademark request with the European Union for what might be an upcoming virtual assistant. This trademark has been filled only by Nokia brand not the HMD Global who have recently acquired Nokia . Recently Samsung have also acquired AI firm Viv, that clearly makes that Samsung also featuring AI with its smartphones.   This news about AI has been out just after Nokia announced its first Android based smartphone Nokia 6. Nokia 6 will be initially available in China on JD.com with the price tag of 1,669 CNY (RS 16,750). Given that the Finnish company appears to be working on its new AI-powered assistant independently of HMD, details are still hazy as to whether Viki will remain exclusive to the Nokia brand or will eventually make its way to other Android

FBI Hacked — Hacker Blames “Lazy” Security and Outdated Operating System

Image
A hacker has claimed to have breached the content management system used by the FBI. The hacker uses Twitter handle @CyberZeist and claims to have dumped email addresses and hashes on Pastebin. The fbi.gov’s server was hosted on an outdated FreeBSD VM, according to the hacker. A hacker, who operates the Twitter handle @CyberZeist , has made claims regarding hacking the FBI’s website, fbi.gov , and gaining sensitive information. Prior to this claim, the hacker claimed to have exposed the flaw on 22 December. The hacker has dumped 155 stolen credentials on the Pastebin.  @CyberZeist accessed the data by exploiting a zero-day vulnerability in the open source CMS software, named Plone, used by the FBI to host its website’s content. He found the flaw in a Python module. The websites of the National Intellectual Property Rights Coordination Center and the European Union Agency for Network and Information Security are also hackable, says @CyberZeist. On Twitter, @CyberZeist tweeted that var

Difference between Windows Program Files & Program Files (x86)

Ever wondered why 64-bit Windows needs to have two Program Files folders? This is done to separate the 32-bit DLL executables from 64-bit DLLs. It also eliminates the chances of a 32-bit application trying to load a 64-bit DLL, fail, and give an error message. Back in 2005, Microsoft launched both 32-bit and 64-bit versions of Windows operating system. This was done to support new 64-bit CPUs. The 64-bit CPUs have the ability to work with large numbers and access more memory. If you’re running 64-bit Windows operating system, you might have noticed that your PC has two Program Files folders. One is the regular Program Files and the other one is Program Files (x86). But, why is it necessary? What’s the difference between these two folders? Well, to answer these questions, one should understand that 64-bit applications are compiled differently. While a program with 64-bit instructions can’t be read by PCs with 32-bit CPUs, a 32-bit program can be read by 64-bit CPU. Windows has a separat

Netgear Bug Bounty Program for Hacker "$15,000" Rewards

Image
Netgear launched on Thursday a bug bounty program to offer up to $15,000 in rewards to hackers who will find security flaws in its products. Since criminals have taken aim at a rapidly growing threat surface created by millions of new Internet of things (IoT) devices, it has become crucial to protect routers that contain the keys to the kingdom that connects the outside world to the IP networks that run these connected devices. To combat this issue, Netgear, one of the biggest networking equipment providers in the world, has launched a bug bounty program focusing on its products, particularly routers, wireless security cameras and mesh Wi-Fi systems. Bug bounty programs are cash rewards given by companies or organizations to white hat hackers and researchers who hunt for serious security vulnerabilities in their website or products and then responsibly disclose for the patch release. Bug bounties are designed to encourage security researchers, hackers and enthusiasts to responsibly r

How To Find Out If Someone Is Secretly Using Your Computer

Image
You may not want to compromise your privacy by giving your personal computer to other as when you do so all your media and other secret files and their access is in other hands and you can’t make sure that the other person is well using it. So better is to do some measures that will help you to know about the person that was using your computer. Yes, it’s possible on your windows PC, you can check out about the person that was accessing your computer in your absence. So have a look on complete guide discussed below to proceed. How To Find out if Someone Is Secretly using your PC Here we are discussing some of the best methods that you can use to know about the activities done by the person in your absence. So have a look on all the possible methods below. #1 Method: Using Windows Event Viewer Step 1:  Go to Start and Run or press consecutively both Windows Keys+R . If you are running the latest version later than XP, you have to type the following in smart search present in the start