Friday, 12 December 2014

GIRLS NEED TO KNOW 10 THINGS BEFORE YOU DATE WITH A PROGRAMMER

10.The Health of our Computer/Mobile is as important as your Future Child… Stop Nagging!

9.  We use a different logic than other guys you’ve dated, this is true: 1+1=2 and this is Also True: 1+1=10 … STOP TRYING TO ANYLIZE How we think! (and BTW in the Programming World… LOGIC WORKS!!!!!)

8.  Our Information & Knowledge DO EXPIRE… Believe it or not… We need to Work hard to Survive… SO STOP TALKING ABOUT it!! (I wrote “it” intentionally in small letters, we wouldn’t dare to say the whole sentence in ALL CAPITAL)..

7.  We Do LOVE other Guys Like Scott Hanselman, Bill Gates and Scott Guthrie but that doesn’t Mean that we’re GAY or  weirdoes… STOP Being JEALOUS!

6.  Technology is IMPORTANT TO US and so is using it in our relationship… So Sending an E-Greeting Card IS Considered ROMANTIC for us… CANDLE DINNER MY APPS!


5.  We’ve Made Peace with our Parents Long time ago.. Stop Trying to Teach us Manners!

4.  We Don’t Cheat.. Because more likely we will barely have time for Two Women in our Lives (One being our Mother)… STOP DOUPTING… YES I NORMALLY WORK LATE!

3.  We Don’t Lie… We may seem Dump & Reclus in how we do things; that’s because we’re used to something called ROLLBACK TRANSACTION => we can undo things as if it NEVER HAPPENED!!!!  That’s 100% TRUE!

2.  Our Brains has an Advanced Problem Solving Skills, For us as long as there is a SolutionSOMEWHERE, THERE IS NO PROBLEM! … STOP THE DRAMA!

1.  We Love in Binary… it’s either 1 or 0 … so IF We say “I love You “…  THAT”S THE ONLY WAY WE KNOW HOW TO SAY IT!

Continue Reading...

Thursday, 11 December 2014

How to shutdown ur computer with a phone

Using this method, a user can shutdown, restart,
hibernate, etc. his or her computer,
just by sending an email from his or her phone.
To do this, all you will need is Microsoft Outlook
which should come with Microsoft
Office, which most people have. This will need to
be on the computer wish you wish to
shutdown.
So, this is how you do this:
1. First, you need the batch files to perform the
Shutdown, Hibernate etc. You can write them
down yourselves or can download them from here .
2. Extract them to your C:\ drive so the path to the
shutdown batch file is
C:\sms_functions\shutdown.bat (Important this is a
must the path must be exact) or you can modify the
rule once you import it to point to the new
destination, it’s your call.
3. Open up Microsoft Outlook. Make sure that you
have already configured it for your email.Now we
will need to make it so that Outlook checks your
inbox about every minute (1 minute for testing
time can be increased if a delayed shutdown is
desired). You can do this by going to Tools:
Options.
4. Then click the Mail Setup tab, and afterwards,
the Send/Receive button.
5. Make sure that the Schedule an automatic send/
receive every… box is checked, and set the number
of minutes to 1. Now you may close all of these
dialog boxes.
6. Now go to Tools: Rules and Alerts… Next click
the options button in the upper right hand corner
and press the Import Rules button.
7. Now select the shutdown.rwz file that was found
in the zip file named sms_functions that you
downloaded.
8. Now, when you send a message from your phone
to your e-mail address with thesubject
smsshutdown%%, your computer will shutdown.
You can also make your own rule, so that you can
use your own batch file, and may specify the
phrase you want to trigger the action.

Continue Reading...

Wednesday, 10 December 2014

NEW VIRUS IN ANDROID PHONE CAN STEAL PASSWORDS

According to TOI (Times of India) Cyber security
has alerted about the infectious Trojan virus which
attacks Android-based smart phone users. This
virus is named as “ AndroidSmssend” and it
can acquire as many as four aliases to hoodwink
the user and perpetrate its destructive activities on
a personal Android enabled phone.
Android/SmsSend is a premium service abuser
family malware that arrives bundled with
legitimate Android applications and infects
Android based smartphones.

"
“Once infected, it sends text messages
(typically with a link to itself or a
different threat) to a specific number,
typically to numbers on the contact
list and is also capable to send SMS to
premium rate numbers,” the
Computer Emergency Response Team
of India (CERT-In) said in its latest
advisory to Android phone users in
the country.
The virus is so notorious, the agency
said, that it “steals contacts and
pictures, tracks the location, steals
passwords, illegally accesses text
messages, crashes a complete system,
steals personal banking information
when logged in, installs other sort of
spyware and disables firewall and
anti-virus program to defend itself.”

The agency has suggested some counter-measures
in this regard.

Do not download and install
applications from untrusted sources,
install applications downloaded from
reputed application market only, run
a full system scan on device with
mobile security solution or mobile
anti-virus solution, check for the
permissions required by an
application before installing, exercise
caution while visiting trusted/
untrusted sites for clicking links,
install Android updates and patches
and use device encryption or
encrypting external SD card feature
available with most of the android OS
(operating system),” it said.

And also, avoid using unsecured, unknown Wi-Fi
networks and make a practice of taking regular
backup of the Android device, the advisory said.

Continue Reading...

Monday, 8 December 2014

Manchester city opened the new academy complex

The Manchester club have opened the new academy complex
as part of their vision for building for the future, and believe
the development is unique
Manchester City have opened their City Football Academy
complex in a bid to improve the number of homegrown players
coming through the club.
Since the Premier League champions were bought by Sheikh
Mansour in 2008, City have often preferred to look abroad
when it comes to player recruitment.
While signings from overseas have helped the club add to
their trophy cabinet, a lack of English players has proven
problematic when it comes to meeting Premier League quotas
on homegrown players.
The likes of Jack Rodwell and Adam Johnson have already
moved on after struggling to impress at the Etihad Stadium,
while Scott Sinclair and Dedryck Boyata seem unlikely to
feature under Manuel Pellegrini.
However, the club opened the academy, which has been four
years in the making, with the complex tipped to serve as a
breeding ground for the club's age-group sides as well as
community initiatives.
The 7,000 capacity Academy Stadium will be used by the Elite
Development Squad, Manchester City Women and the local
community.
"We wanted to build something that was unique in the world
of football," explained academy director Brian Marwood.
"The vision was always about building for the future," added
Khaldoon Al Mubarak, with the City chairman also touching on
the importance of the academy in terms of the English
champions' place in global football.
City already have existing partnerships with New York City -
the soon-to-be MLS side - and Australian outfit Melbourne
City, and Elite Development Squad coach Patrick Vieira stated
he is excited about the project.
He said: "What I find really exciting about the project is before
designing the facilities, they've been to the football world, the
basketball world, the NFL world. There is a lot of hard work
behind the project."

Continue Reading...

The Highest Paying Programming Languages You Should Learn

These are the highest paying programming
languages you should learn its ranked by salary.
In fact, the average salary for a computer
programmer just hit an all-time high as it
approaches $100,000. But there are few languages
that are more valuable than orders.
Bases on the data, here are programming language
listed next to their average annual salary from
lowest to highest
12. PERL - $82,513
11. SQL – $85,511
10. Visual Basic – $85,962
9. C# – $89,074
8. R - $90,055
7. C – 90,134
6. JavaScript – $91,461
5. C++ – $93,502
4. JAVA – $94,908
3. Python – $100,717
2. Objective C – $108,225
1. Ruby on Rails – $109,460

Continue Reading...

Saturday, 6 December 2014

THE TOP ANDROID APPS FOR HACKING

Here we have in no particular order the top
Android apps for hacking using an android
smartphone.
1. SpoofApp :- SpoofApp is a Caller ID Spoofing,
Voice Changing and Call Recording mobile app for
your iPhone, BlackBerry and Android phone. It’s a
decent mobile app to help protect your privacy on
the phone. However, it has been banned from the
Play Store for allegedly being in conflict with The
Truth in Caller ID Act of 2009.
2. Andosid:- The DOS tool for Android Phones allows
security professionals to simulate a DOS attack (an
http post flood attack to be exact) and of course a
dDOS on a web server, from mobile phones.
3.Faceniff:- Allows you to sniff and intercept web
session profiles over the WiFi that your mobile is
connected to. It is possible to hijack sessions only
when WiFi is not using EAP, but it should work
over any private networks.
4.Nmapper:- (Network Mapper) is a security scanner
originally written by Gordon Lyon used to discover
hosts and services on a computer network, thus
creating a “map” of the network. To accomplish its
goal, Nmapper sends specially crafted packets to
the target host and then analyses the responses.
5. Anti-Android Network Toolkit:- zANTI is a
comprehensive network diagnostics toolkit that
enables complex audits and penetration tests at the
push of a button. It provides cloud-based reporting
that walks you through simple guidelines to ensure
network safety.
6. SSHDroid:- SSHDroid is a SSH server
implementation for Android. This application will
let you connect to your device from a PC and
execute commands (like “terminal” and “adb
shell”) or edit files (through SFTP, WinSCP,
Cyberduck, etc).
7. WiFi Analyser:- Turns your android phone into a
Wi-Fi analyser. Shows the Wi-Fi channels around
you. Helps you to find a less crowded channel for
your wireless router.
8. Network Discovery:- Discover hosts and scan their
ports in your Wifi network. A great tool for testing
your network security.
9. ConnectBot:- ConnectBot is a powerful open-
source Secure Shell (SSH) client. It can manage
simultaneous SSH sessions, create secure tunnels,
and copy/paste between other applications. This
client allows you to connect to Secure Shell servers
that typically run on UNIX-based servers.
10. dSploit:- Android network analysis and
penetration suite offering the most complete and
advanced professional toolkit to perform network
security assesments on a mobile device.
11. Hackode:- The hacker’s Toolbox is an application
for penetration tester, Ethical hackers, IT
administrator and Cyber security professional to
perform different tasks like reconnaissance,
scanning performing exploits etc.
12.Androrat:- Remote Administration Tool for
Android. Androrat is a client/server application
developed in Java Android for the client side and
in Java/Swing for the Server.
13.APKInspector:- APKinspector is a powerful GUI
tool for analysts to analyse the Android
applications. The goal of this project is to aide
analysts and reverse engineers to visualize
compiled Android packages and their
corresponding DEX code.
14.DroidBox:- DroidBox is developed to offer
dynamic analysis of Android applications.
15.Burp Suite:- Burp Suite is an integrated platform
for performing security testing of web
applications. Its various tools work seamlessly
together to support the entire testing process, from
initial mapping and analysis of an application’s
attack surface, through to finding and exploiting
security vulnerabilities.
16. Droid Sheep:- DroidSheep can be easily used by
anybody who has an Android device and only the
provider of the web service can protect the users.
So Anybody can test the security of his account by
himself and can decide whether to keep on using
the web service.
17. AppUse:– Android Pentest Platform Unified
Standalone Environment:- AppSec Labs recently
developed the AppUse Virtual Machine. This system
is a unique, free, platform for mobile application
security testing in the android environment, and it
includes unique custom-made tools created by
AppSec Labs.
18. Shark for Root:- Traffic sniffer, works on 3G and
WiFi (works on FroYo tethered mode too). To open
dump use WireShark or similar software, for
preview dump on phone use Shark Reader. Based
on tcpdump.
19. Fing:- Find out which devices are connected to
your Wi-Fi network, in just a few seconds.
Fast and accurate, Fing is a professional App for
network analysis. A simple and intuitive interface
helps you evaluate security levels, detect intruders
and resolve network issues.
20.Drozer:- drozer enables you to search for security
vulnerabilities in apps and devices by assuming the
role of an app and interacting with the Dalvik VM,
other apps’ IPC endpoints and the underlying OS.
drozer provides tools to help you use and share
public Android exploits. It helps you to deploy a
drozer agent by using weasel – MWR’s advanced
exploitation payload.
21. WifiKill: - Second app, developed also by
B.Ponury is an app which can kill connections and
kick site-hoggers from the site. This app definitely
kick then net user from the site so he cannot use it
anymore. The app also offers the list of viewed
sites by the hogger.
22. DroidSniff: - Similar to DroidSheep but with a
newer and nicer interface is DroidSniff – sniffing
app not only for Facebook. This app shows you
what is the hogger looking for and then you can
“take” his control, steal the cookies and rock’n’roll.
Works perfectly.
23. Network Spoofer: - The last app, called NetWork
Spoofer is very similar to dSploit but it’s more
easier to use. Only hitch is that you need to have at
least 500MB of free data. It offers you a lot of troll
features – change Google searches, flip images,
redirect websites, swap YouTube videos and others.
24. Droid SQLI:- allows you to test your MySQL based
web application against SQL injection attacks.
DroidSQLi supports the following injection
techniques: Time based injection, blind injection,
error based injection, normal injection.
25. sqlmapchik:- is a cross-platform sqlmap GUI for
the extremely popular sqlmap tool

Source:latesthackingnews

Continue Reading...

Wednesday, 3 December 2014

HOW TO SECURE YOU COMPUTER FROM VIRUS OR HACKERS

1.This article assumes you wish to use a network (such as the internet), share files on thumb drives and that your PC might be physically accessible to others. If none of those apply, then your many of these steps may be redundant as your PC will already be quite secure.

2.Choose an operating system :- Based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). Find out if it uses limited user accounts,all files permissions and is regularly updated. Make sure you update your operating system with security updates and update your other software too.

3.Choose a web browser:- based on its security and vulnerabilities because most malware will come through via your web browser. Disable scripts too (NoScript, Privoxy and Proxomitron can do this). Look at what independent computer security analysts (such as US-CERT[1]) and crackers (similar to hackers) say. Google Chrome[2] is more secure and has a sandbox feature[3] so it would be more difficult to compromise the system and spread the infection.

4.When setting up, use strong passwords in your user account, router account etc:- Hackers may use dictionary attacks and brute force attacks.

5.Use trusted sources:- When downloading software (including antivirus software), get it from a trusted source (softpedia, download, snapfiles, tucows, fileplanet, betanews, sourceforge) or your repository if you are using Linux.

6.Install good antivirus software:- Antivirus software is designed to deal with modern malware including viruses, trojans, keyloggers, rootkits, and worms. Find out if your antivirus offers real-time scanning, on-access or on-demand. Also find out if it is heuristic. Avast[4] and AVG[5] are very good free editions. Choose one, download and install it and scan regularly. Keep your virus definitions up to date by updating regularly.

7.Download and install software to deal with spyware such as Spybot Search and Destroy, HijackThis[6] or Ad-aware[7] and scan regularly:- I can’t state this enough – you need to run a good anti spyware and anti malware program like Spybot if you search the web at all. Many websites out there exploit weaknesses and holes in the security of Microsoft Explorer and will place malicious code on your computer without you knowing about it until its too late!

8.Download and install a firewall:- Either ZoneAlarm[8] or Comodo Firewall[9] (Kerio, WinRoute or Linux comes with iptables). If you use a router, this gives an added layer of security by acting as a hardware firewall. Close all ports:- Hackers use port scanning (Ubuntu Linux has all ports closed by default).

Continue Reading...

How to use anyone's face as facebook chat room emoticons (smiles)

Facebook Emoticons are no longer have to be simple like anonymous smiley faces. Facebook Chat now lets you use the profile picture of any user, official Page, or event on the service as an emoticon. That means you can make one out of your best friend, Celebrity, official Page or anything else.This will let you create wide range of your emotions.

STEPS TO FOLLOW:

Go to any profile, official Page, or event that you want to use as an emoticons.
Look at the URL. Find the username or profile ID at the end of the URL such as ‘PaulWalker’ from https://www.facebook.com/PaulWalker.
Place that name  in double brackets like [[PaulWalker]]
Enter that into a Facebook Chat.
When you send it, the bracketed  letters will appear as that person, Page, or event’s current profile picture.
The emoticons has evolved!
You can send these custom emoticons from the web or mobile, but they’ll only display as photos on the web. When viewed through a Facebook app or mobile site they appear as their bracketed string. Similarly, you can’t use them in status updates, wall posts, or comments yet. They appear pretty small, but you can hover over the photos to view the user name it belongs too.
Enjoy......

Continue Reading...

Monday, 1 December 2014

LIST OF THE MOST EXPENSIVE UNIVERSITIES IN NIGERIA

1) BABCOCK UNIVERSITY
This is a private Christian co-educational university owned
and operated by the Seventh-Day Adventist Church in Nigeria.
The university was established as the Adventist College of
West Africa (ACWA) in 1957. Their school fee ranges from
N620,000 to N3 million. In Babcock University, your meal and
hostel defines your fee. It offers two and three daily meal
services. And for accommodation, there are three to seven
students in a room. When it comes to accommodation, it
depends on your choice. Either it is regular (7 in a room),
premium (4 in a room) or classic (3 or 2 in a room). Here is a
breakdown of Babcock school fees: Medicine: N3 million, Law:
N2 million, Accounting: N1.5 million, Nursing: N1 million, other
faculties: N860,000 – N620,000.
2) AMERICAN UNIVERSITY OF NIGERIA (AUN)
AUN is the first Nigerian university with American structure
and curriculum. It is in north eastern Nigeria, Yola, capital of
Adamawa State. At ABTI, students pay as much as
N1,378,500 to receive quality education. Parents, however, pay
in dollars. For tuition: $6,600 (N990,000), meals: $1,900
(285,000), four in a room: $500 (N75,000), private room:
$1,900 – N285,000). In total, it amounts to N1,378,500 per
annum. Accommodation and feeding are taken care by the
school.
3) AFE BABALOLA UNIVERSITY
Afe Babalola University is a private higher institution in Ado-
Ekiti, Ekiti State. It was established in 2009 by Nigeria’s
foremost lawyer and legal icon, Chief Afe Babalola (SAN). The
fee covers tuition, development levy, ICT, ID card, medical,
sports, PTCF levy, course registration, caution fee and
accommodation which is either four per room or two per
room. Here is a breakdown of their school fees: For
Engineering: N925,000 (4 beds) and N1,075,000 (2 beds).
Health Science: N725,000 (4 beds) and N875,000 (2 beds)
Sciences: N675,000 (4 beds) and N825,000 (2 beds)
Social Management Science: N675,000 (4 beds) and N825,000
(2 beds) The fee ranges from N675,000 to N1,075,000
annually. There is no provision for feeding.
4) IGBINEDION UNIVERSITY
The university came into existence following the presentation
of certificate of approval on May 16, 1999. Thus, it became
the first licensed private university in Nigeria. The tuition
ranges from N540,000 to N820,000 without feeding. For
Medicine, Pharmacy, Law and Engineering, they pay a tuition
of N610,000, accommodation: N100,000 and other facilities:
N110,000.
5) BOWEN UNIVERSITY It is owned and operated by the
Nigerian Baptist Convention, at Iwo in Osun State and opened
November 4, 2002. The tuition fee ranges from N500,000 to
N750,000 per annum. The university is only responsible for
accommodation and tuition. Students are made to buy their
food from the cafeteria.
6) CRAWFORD UNIVERSITY
Crawford University is a private Christian institution in Igbesa,
Nigeria. It was established in 2005. The school provides
accommodation for students but does not provide feeding.
Parents only pay for tuition, accommodation and some
additional charges. The school fee ranges from N400,000 to
N600,000.
7) REDEEMER’S UNIVERSITY
Redeemer’s University is a Christian school located in
Redemption City, Ogun State, Nigeria. It was opened in 2005.
At Redeemers, Natural Science pays N605,000, Management
Sciences; N575,000 and Humanities pays N545,000. All this
fees are paid without feeding but tuition and accommodation.
We can see that the fees range from N500,000 to N650,000
per annum.
Other Institutions with high fee are:
8) Lead City University: ₦550,500
9) Caleb University: ₦505,000
10) Ajayi Crowder University: ₦500,000
11) Benson Idahosa: ₦500,000
12) Joseph Ayo Babalola University: ₦436,000
13) Covenant University: ₦432,000
14) Achievers University, Owo: ₦420, 000
15) Novena University: ₦400,000
16) Adeleke University,Ede: 350,000.00
17) Rhema University: ₦325,000
18) Lagos State University: Between N240,000 and N345,000
19) Obong University Nigeria: ₦190,000
20) Oduduwa University: ₦164,000
21) Osun State University– Between ₦130500 and 160,500
COMMENTARY by Femi Osinusi, Moyosore Solarin and Yinka
Olukoya of the Nigerian Tribune
FOR several years in Nigeria,public universities (both federal
and state-owned) were the major sources of higher education.
Especially, given the much talked-about disparity between
products of the universities and polytechnics in the country
over the years, the number of candidates gravitating towards
universities kept increasing in geometrical terms. Soon, it
became obvious that government-owned institutions could no
longer meet the ever-increasing demands for university
education.
But aside the inability of government-owned universities to
absorb the growing population of candidates, factors such as
cultism, unrestrained immorality and worsening infrastructural
facilities in these universities began to make private
universities a necessity.
To worsen the situation, incessant strikes by the Academic
Staff Union of Universities (ASUU), ostensibly as a protest
against infrastructure decay, became so rife that students
often spend five, six or more years on four-year courses or
seven to eight years on five-year courses. These all made
many wish they had the option of private university education
in the country.
But when that wish was eventually granted and private
universities began to be licensed beginning from 1999, most
Nigerians woke up to the reality that what they had thought
would be a source of escape for them from the dying
public tertiary education was, and still is, accessible only to
the affluent and most privileged in the society.
Strangely too, the rate at which the private universities have
since been springing up suggests that profit motive may not
be far from the card. It has been observed that more than 50
private universities have sprung up in the country in a space
of 15 years – and many more are still in the pipeline.
According to information gathered from the National
Universities Commission (NUC), there are 51 private
universities in Nigeria, more than half of them owned by faith-
based organisations; some by individuals and one by a
corporate organisation.

Continue Reading...

Advertising

Advertise Here

Blogroll

About