W2F

All About Technology

Tuesday, November 24, 2015

Famous Failures

4:52 AM

Famous Failures

If you have never felt you have never tried new thing.
From your childhood you'd probably heard that ' Failure is a key to success'. But you mayn't realize how much it really means. Let's see this some of the inspiring souls who were once called as a failure.



Eminem

A high school dropout whose personal struggles with drugs and poverty culminated in an unsuccessful suicide attempt.
 30 time Grammy Award Winner, sold over 90 million albums worldwide.


Lionel Messi

At age 11 he was cut from team after being diagnosed with a growth hormone deficiency, which made him smaller in stature than most kids his age.
4 time FIFA World Player of The year


Steve Jobs

At 30 years old he was left devastated and depressed after being unceremoniously removed from the company he started.
Co-Founder of Apple Inc & Co-Founder of Pixar Animation Studios


Walt Disney

Fired from a newspaper for "Lacking Imagination" and "Having no original ideas".
Creator of Mickey Mouse & Winner of 22 Academy Awards.


The Beatles

Rejected by Decca Recording Studios, who said "We don't like their sound, They have no future in show business".
The most commercially successful and critically acclaimed band in history.


Albert Einstein

He wasn't able to speak until he was almost 4 years old and his teachers said he would "Never amount too much".
Theoretical Physicist and Nobel Prize Winner.


Thomas Eddision

A teacher told him he was "Too stupid to learn anything" and he should go into a field where he "Might succeed by virtue of his pleasant personality".
Inventor of incandescent light bulb.


Abhram Lincon

His fiance died, failed in business, had a nervous breakdown and was defeated in 8 elections.
16th President of United States.


Psy

After having 10 year unsuccessful music career he was about to leave music.
Develop most popular song worldwide Gangnam Style. 





Top 10 most popular programmer

3:20 AM
10.Matthew Charles "Matt" Mullenweg

WORDPRESS





9.Pavel Durov

VK (originally VKontakte)




8.Corrinne Yu

ex-principal programmer of
Microsoft’s Halo




7.Jade Raymond

producer of Assassin’s Creed and

managing director of Ubisoft Toronto

producer of Assassin’s Creed and managing director of Ubisoft Toronto



6.Leah Culver

founder and CEO of Grove



5.Amanda Wixted

early Zynga employee, game-maker

early Zynga employee, game-maker

early Zynga employee, game-maker


4.Kaila MacDonald

Developer at Phoenix



3.Jon Dahl
Co-founder/CEO of @Zencoder



2.Sara Haider
Software engineer at Twitter



1.Sergey Brin
created Google with Larry Page



ex-principal programmer of Microsoft’s Halo
ex-principal programmer of Microsoft’s Halo

Friday, November 20, 2015

How To Remain Anonymous Online

1:32 AM
How To Remain Anonymous Online


As for the title of this article, yes, pun intended. When I first started exploring online chat rooms and learning more about how the internet worked, I have to admit I was rather naive to it all. I remember watching an online video which led me here to Anonymous. This video, in part tells people to ask for help remaining secure and private online. In the spirit of this message I write this article.
We all hear about the NSA and government surveillance or hackers lurking in the shadows. For some people, the internet can seem like a scary and intimidating place. Do you want help feeling safer online? Do you want to be unafraid about making an online purchase? Would you like in interact and learn with people from all around the world without feeling spied on by some unknown powers at be? If you are like many people you have suspicions or hesitations online, but here are some tips from the professionals on how to help you stay anonymous on your journey.

Step 1. Use a good firewall software for your computer. A good firewall software you can use is a high-end built directly into Kaspersky and Norton Internet Security (2013). Also, using Kaspersky or Norton, you are getting spyware protection and live website protection to protect you from unsafe websites.
Step 2. Purchase a hardware firewall. You can get them for as little as $50+ from a pawn shop (if they have any) and up from there. This will help in protecting not only your computer, but if you hook it into your internet connect before your router/modem, it protects all of your networked devices.
Step 3. Utilize a VPN connection. VPN (Virtual Private Network) actually simulates your computer as if you are logged into the network from another location. a good VPN company to use is from IPVanish. They offer SSL as well as VPN connections.
Step 4. Once you have completed steps 1-3, now you need to get a more secure browser than IE, FireFox, Chrome, etc. I am talking about the Tor Network. Tor is one of the leading web browsers that also comes with another VPN connection and keeps your website viewing privatized. Tor is 100% free and safe to use.
How can you further protect your privacy interacting as anonymous online? Invent an alias, a surname if you will, with a name of your choice. Go and register this name with one of the big email service providers. Use this new email to register any new Twitter, Facebook, Instagram, ‘etcetera’ accounts. Be sure to clear all browser cookies before using this alias, or better yet, use a different web browser for your anonymous identity than you would use for your more typical internet activity. If you have a further need for security beyond these steps you may want look into encryptionstenography or TAILSsystem.
Source:anonhq.com

Sunday, November 15, 2015

Anonymous Have Declared War On ISIS Following The Paris Attacks

6:56 PM





Anonymous have declared war on ISIS. The hacker group released the below video on their YouTube channel to warn of their 'biggest operation ever'. 
Fittingly enough, the video is in French. Although it is below if you want to have a look. 

According to the Mirror, they say that they will 'use their knowledge to unite humanity' and then warned the group to 'expect them'. 
"Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you.Expect massive cyber attacks. War is declared. Get prepared. The French people are stronger than you and will come out of this atrocity even stronger."Anonymous spokesperson

Anonymous - let's see what you can do. 

source: theladbible.com

Friday, November 13, 2015

How NSA successfully Broke Trillions of Encrypted Connections

5:49 AM

nsa-crack-encryption
Yes, it seems like the mystery has been solved.

We are aware of the United States National Security Agency (NSA) powers to break almost unbreakable encryption used on the Internet and intercept nearly Trillions of Internet connections – thanks to the revelations made by whistleblower Edward Snowden in 2013.

However, what we are not aware of is exactly how did the NSA apparently intercept VPN connections, and decrypt SSH and HTTPS, allowing the agency to read hundreds of Millions of personal, private emails from persons around the globe.


Now, computer scientists Alex Halderman and Nadia Heninger have presented a paper at the ACM Conference on Computer and Communications Security that advances the most plausible theory as to how the NSA broke some of the most widespread encryption used on the Internet.

According to the paper, the NSA has exploited common implementations of the Diffie-Hellman key exchange algorithm – a common means of exchanging cryptographic keys over untrusted channels – to decrypt a large number of HTTPS, SSH, and VPN connections.

Diffie-Hellman – the encryption used for HTTPS, SSH, and VPNs – helps users communicate by swapping cryptographic keys and running them through an algorithm that nobody else knows except the sender and receiver.


It is described as secure against surveillance from the NSA and other state-sponsored spies, as it would take hundreds or thousands of years and by them and a nearly unimaginable amount of money to decrypt directly.

However, a serious vulnerability in the way the Diffie-Hellman key exchange is implemented is allowing the intelligence agencies and spies to break and eavesdrop on trillions of encrypted connections.

To crack just one of the extremely large prime numbers of a Diffie-Hellman in the most commonly used 1024-bit Diffie-Hellman keys would take about a year and cost a few hundred Million dollars.


However, according to researchers, only a few prime numbers are commonly used that might have fit well within the agency's $11 Billion-per-year budget dedicated to "groundbreaking cryptanalytic capabilities."
"Since a handful of primes are so widely reused, the payoff, in terms of connections they could decrypt, would be enormous," said Alex Halderman and Nadia Heninger in a blog postpublished Wednesday.
"Breaking a single, 1024-bit prime would allow the NSA to passively decrypt connections to two-thirds of VPNs and a quarter of all SSH servers globally. Breaking a second 1024-bit prime would allow passive eavesdropping on connections to nearly 20% of the top million HTTPS websites. In other words, a one-time investment in massive computation would make it possible to eavesdrop on trillions of encrypted connections."
Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.
According to the duo, this NSA technological project to crack crypto on a scale has "not seen since the Enigma cryptanalysis during World War II."

For in-depth detail, you can read the full paper entitled Imperfect Forward Secrecy: How Diffie-Hellman Fails In Practice [PDF].

Tuesday, November 10, 2015

Facebook told by Belgian court to stop tracking non-users

5:50 AM

Facebook logo and people walkingImage copyrightGetty Images
Image captionThe company said the cookie the ruling relates to is safe
A court has given Facebook 48 hours to stop tracking people in Belgium who are not members of its social network.
Facebook says it will appeal against the decision and that the order relates to a cookie it has used for five years.
The cookie is installed when an internet user visits a Facebook page even if they are not members.
However, the Belgian court said that the company was obliged to obtain consent to collect the information being gathered.
"The judge ruled that this is personal data, which Facebook can only use if the internet user expressly gives their consent, as Belgian privacy law dictates," it said in a statement.
If Facebook fails to comply, it could face a fine of up to 250,000 euros (£180,000) per day.
The fine would go to the Belgian Privacy Commission, which brought the case, the court added.
Cookies are simple files that track whether a user has visited a website before and notify the site itself.
They can track a number of user activities, such as how long they stayed, what they clicked and any preferences selected.
"We've used the Datr cookie for more than five years to keep Facebook secure for 1.5 billion people around the world," said a Facebook spokesperson.
"We will appeal this decision and are working to minimise any disruption to people's access to Facebook in Belgium."
source: Technology

Monday, November 9, 2015

The Most Secure Linux Based OS

7:10 AM
Probably The Most Secure Linux Based OS Ever
0
Qubes Logo
As always, people are insecure about being watched and spied upon, especially when it comes to our network usage. We can find most of our security measures inside of Linux based operating systems.
Why shouldn’t we want to protect ourselves from unwanted Hackers, Governments, and annoying and harmful malware running around all over the internet collecting any and all digital information?
Yes, it is true that every operating system is designed and developed with a form of security as a requirement from the distributors. Can there be a truly secured OS? No. As time moves on, yes we will see advancing operating systems that are more secure than the last, but if they were truly secure, why provide updates to their security measures? As companies develop better security measures, there are hackers and government agencies that are “Opening Up” the OS and figuring out how it works. Once they know how it works, they then can manipulate and gain access from any device utilizing that OS from any network.
qubes-arch-diagram-1
Qubes OS is different than other operating systems starting right from the kernel. Operating systems such as Windows, Linux, BSD, and OSX are based upon a monolithic kernel, this possess a huge security problem as the monolithic kernel contains over ten million lines of code to operate, and to make the issues worse, most of the code comes from untrusted resources. With so many API’s, it would only take one exploit of the kernel to gain control over the entire system.
Qubes OS, on the other hand, utilizes Xen Hypervisor. This is able to provide a more secured isolation connection between servers, and unlike Monolithic Kernels, Xen Hypervisor only contains a few hundred thousands of lines of code instead of millions. Xen hypervisor also only focusses on the main components of your computer such as CPU scheduling, Memory Management, and your power management. And does not need to utilize 3rd party API’s.
Qubes Xen
Qubes OS is a Linux version security and open source operating system designed for personal computers and usage and runs everything inside of VM (Virtual Machines).
Xen is a bare metal, Native, hypervisor in which utilizes a microkernel framework and even offers a service that allows you to use multiple operating systems at the same time on a single hosts hardware. This is performed by each of your operating systems are using their own space of the processor and memory as well as other related resources that the operating system needs.
Qubes supports the environments of your favorite operating system such as Microsoft Windows, Linux Distributions, and even Whonix.
(Whonix is a Linux based secured operating system by using Debian and provides the user with privacy, security, and even anonymity from your actions online.)
Qubes also enforces a more secured anonymity for internet connection by utilizing the Tor Network. Most-Secure-operating-system
When we look at the hypervisor, we see there are two types. The first type is known a “Native” or “Bare Metal”, and our other type is Hosted Hypervisor. With one running directly like a normal operating system would work installed on your computer. This will host the “Guest OS” and the other will run within the Host OS…Just like you installed VM Ware and have 2 Linux distros, 3 Windows, and 1 Apple. Same concept but all running at the same time.
Installation Time;
qubesos-install
Like my other articles about a new Operating System, I had to download and install the OS myself on a VM machine. I was able to successfully download Qubes Newest Release “Qubes-R3.0-x86_64-DVD.iso” from here.
You can see a full list of their downloads from the site below;
Qubes-os.org/downloads
Installation 1
Unfortunately, for those who enjoy faster downloads by means of torrents, the Qubes-OS.org website downloads page offers no means of torrent downloads.
After figuring out I have to set my BIOS to accept Intel-VTX Technology, and then configuring my VMWare to use VTX-AMDVT I was finally able to install Qubes OS.
Installation 2
Once the installation was complete and time to reboot the “computer”, I was fascinated and eager to learn and test this operating system out. But my excitement came shortly as I found myself waiting for over 30 minutes during the initial boot up of the system.

Waiting…Waiting….Waiting…
Qubes Booting
Now that I was finally bypassed the install and booting of the OS, I was greeted with the “Welcome” screen followed by the terms and conditions.
Once I accepted and acknowledged their License Information I was able to create my user account.
Create a User
And then I was able to set my time and date followed by creating and setting my VM’s for the new machine. I chose to utilize the default option “Create default service VMs.” Just so I can get inside and play around.
Create VM's
And then finally, the login screen. I must say. With the advancing technology, I was hoping for a more “Flashy-Techy” feel, but we are ended up with the image shown below.
Login
So…Now we are in the most secured Operating System in the world, what am I supposed to do? After looking around a bit, I found the task bar to be a similar resembelance. It looks as if though the creators took the Windows feel and applied the Linux functions.
Screen with Menu pulled up
As we can see from the image above, the first box you notice would be the [Dom0] Qubes VM Manager box. This is for advanced users to alter their own versions of the VMs that Qubes will/is hosting. I have set my main computer to Qubes OS, and utilizing one version of Fedora for my network, and another version of Fedora for my systems firewall protection.
So far…The rumors appear to be correct. But let’s test this out.
Now looking at the menu I have pulled up, this does resemble a bit of a Windows interface but with Linux abilities. The highlighted box I have set to is the FireFox web browser. This fully works as if I am using FireFox on a Linux machine. I go onto learning that banking, personal, and the untrusted links are set to protect you and your information from trackers, viruses, and hackers by utilizing their tri-level security in which is setup.
Each time you start a new internet connection, a new VM is setup just for that browsing. This makes things a bit complicated, but also I can see the difficulty of “Hacking” into this machine.
Time to test the vulnerabilities. I booted into another virtual machine known as my “Kali 2.0 Black Box” and loaded up the tools I would use for penetration. My first thought “Do I want to know the designated IP? Or should I use some sort of chat session, cookie cache, or other ways. Since this was supposed to be hard to hack…I cheated a smidge.
QubesOS
After performing vigorous tasks and penetration tests, the task was near impossible. Finally, after breaking into my code bank, there was not a single Linux virus I created. So, time to start writing some scripts. After about an hour of writing a simple Linux virus and sending in the means of an email. I downloaded the virus onto my Qubes system. And sure enough, nothing. The program wouldn’t run, install, operate nothing. It was as if it was an empty .txt file and nothing to do with it. But let’s apply the measures in reverse. I was going to use the same tasks from Kali to Qubes but in reverse. I was soon stopped as my tools and resources where on Kali and not on Qubes. So…Download manager time. After another hour of apt-get install…. And getting the right tools and using DropBox for my viruses, Hacking into Kali was easier than it was hacking into Qubes. I was able to find the location of the IP address. Or so I thought. When I looked the Qubes OS was in another state.
In conclusion, utilizing Qubes OS with a VPN service is extremely hard and practically virus free…For now. There will be a day in which a hacker, government agency, or pentester will develop a software/program in which can hack into Qubes OS. But for no, this has to be one of the safest operating systems I have ever used.

See the original article here!

FOLLOW @ INSTAGRAM

About Us

Recent

Random