Monday 29 June 2015

14-year-olds Invent Condom That Changes Colour When it Detects an STD

A group of school going kids in U.K have invented a revolutionary new condom that changes its colour when it comes in contact with harmful sexual transmitted diseases (STD) such as chlamydia and syphilis.

The condom called, ‘S.T.EYE’ condom would change color as soon as it finds the presence of some bacteria and it can help to warn the couples to take quick and immediate step. Additionally it would give the couple the freedom to take actions in the privacy of their homes.

The condom comes with a built-in indicator that changes the contraceptive into a different color whenever it finds an STD infected bacteria.

The students who invented this condom won the prestigious TeenTech award for best health innovation. Daanyal Ali, Muaz Nawaz and Chirag Shah, from Isaac Newton Academy in Ilford, Essex have been behind the innovation. This color changing condom has a built-in indicator that detects STDs and changes color on the basis if the strain of the infection.

“We wanted to make something that makes detecting harmful STDs safer than ever before, so that people can take immediate action in the privacy of their own homes without the invasive procedures at the doctors,” 14-year-old Daanyaal Ali, one of the inventors said.

The teenagers also won a prize of 1,000 pounds ($1,750) and a visit to Buckingham Palace for their life-saving innovation. The innovation will impact millions of couples who practice safe sex and will only make it safer.

This revolutionary product made to make people more sexually aware is a result of the above mentioned TeenTech awards that encourages young investors to innovate. They have somehow succeeded to make something that will promote sexual awareness among the young generation.

Continue Reading...

14-year-olds Invent Condom That Changes Colour When it Detects an STD

A group of school going kids in U.K have invented a revolutionary new condom that changes its colour when it comes in contact with harmful sexual transmitted diseases (STD) such as chlamydia and syphilis.

The condom called, ‘S.T.EYE’ condom would change color as soon as it finds the presence of some bacteria and it can help to warn the couples to take quick and immediate step. Additionally it would give the couple the freedom to take actions in the privacy of their homes.

The condom comes with a built-in indicator that changes the contraceptive into a different color whenever it finds an STD infected bacteria.

The students who invented this condom won the prestigious TeenTech award for best health innovation. Daanyal Ali, Muaz Nawaz and Chirag Shah, from Isaac Newton Academy in Ilford, Essex have been behind the innovation. This color changing condom has a built-in indicator that detects STDs and changes color on the basis if the strain of the infection.

“We wanted to make something that makes detecting harmful STDs safer than ever before, so that people can take immediate action in the privacy of their own homes without the invasive procedures at the doctors,” 14-year-old Daanyaal Ali, one of the inventors said.

The teenagers also won a prize of 1,000 pounds ($1,750) and a visit to Buckingham Palace for their life-saving innovation. The innovation will impact millions of couples who practice safe sex and will only make it safer.

This revolutionary product made to make people more sexually aware is a result of the above mentioned TeenTech awards that encourages young investors to innovate. They have somehow succeeded to make something that will promote sexual awareness among the young generation.

Continue Reading...

World’s First Ever Artificial Heart Created In 1969, Now On Display

Wait, artificial heart in 1969!!!! Hard to believe, but yes. And not just that, this futuristic machine of that time kept its patient alive for 65 hours.

American surgeon Denton Arthur Cooley with his medical team created the world’s first artificial heart in case of emergency situations. Cooley successfully implanted his machine inside a 47- year old man, Haskell Karp when they were unable to find a suitable donor heart for him. The artificial heart pumped for 65 hours, keeping Haskell alive until the doctors found the replacement human heart.

World’s first artificial heart on display at Smithsonian Institute, Washington DC

The medical wonder nearly 50 years ago, is now on display at Smithsonian institute in Washington DC, USA.

The machine was connected to an exterior console and kept a constant blood flow using a double pneumatic pump. The doctors could also monitor and regulate the patient’s blood flow and pressure with it.

But even with all the technology and medical genius, Haskell Karp could not be saved. He died a few days later after the operation.

But the leap in technology that engineers and scientists took in that time is admirable.

Did you appreciate the efforts of the medical team to create life saving machine???? Let us know in comments below…

Continue Reading...

Moto X, Moto G and LG G3 Getting Android Lollipop 5.0 Update Ahead of Nexus Devices

The devices receiving this Android Lollipop 5.0 Update are: latest flagship device of LG- LG G3 smartphone, Moto X and the unlocked version of Second Generation Moto G.

Read our complete article dedicated to the release of Android Lollipop 5.0 Update on different devices:  Which Phones are Getting Android 5.0 Lollipop Update Very Soon? Know Here!

After initial testing last week, Moto X is receiving Android Lollipop 5.0 Update in North America, with the rest of the world soon to follow. Partnership of Motorola and Google has facilitated this quickness. The unlocked version of Second Generation Moto G is also reported to receive the Android Lollipop 5.0 Update.

Head to settings > about phone > software update page and see if your Moto X or Moto G device is ready for the update.

This update on Moto G is of size 236.7MB over-the-air and updates on Moto X and LG G3 are similar to this. “We are excited to announce a new software update for Moto G (2nd Generation) by Motorola. This update brings Android 5.0 Lollipop to your phone along with other improvements,” according to the official release notes for the Moto G’s Lollipop update.

LG G3 with Lollipop (Image: Android Central)

LG said that it will start sending out Android Lollipop 5.0 Update to its latest flagship smartphone, LG G3. This update will be rolled out in Poland in few days and then later the other countries. Google is generally ahead of pushing the updates to its Nexus devices- Nexus 5m Nexus 7 and Nexus 10 tablets, but this time Google seems to be lagging behind. Reports suggest that Google was going to roll out Android Lollipop 5.0 Update earlier this week but postponed due to a need to fix some bugs.

Android 5.0 Lollipop has some amazing features. Read our post top five best but lesser known features of Android 5.0 Lollipop to know them all.

A Google representative told CNET last week, “We had said that Lollipop will begin rolling out to Nexus devices in November and that is still the case.”

Continue Reading...

Google’s Self Driving Cars Hit The Roads Of California

Google has always come up with brilliant innovations. They created quite a buzz when they announced working on a driverless car concept. Google had already modified Lexus SUV and Toyota Prius with their technology a few years back, and the company has been very upbeat about the reviews.

Now Google has announced that its autonomous car that resembles a cute puppy, will be adorning the streets of Mountain View, California from today. The cars have the same computational system as that used in Lexus and Toyota, with added features for its new model.

It is an electricity-powered car that can clock up to 25 mph. However, the car is to be driven around without air bags. Google’s intentional model was to develop a car sans steering wheel and pedals, but that would be illegal in the state of California.

To give people a feel of driving and also to get their car a legal permit, Google has added  a steering wheel, accelerator pedal and brakes to the model. Google has vowed to develop and hand over to people an even better version of the autonomous car in 2020.

 

Other carmakers such as Delphi have also been working on the self-driving car concept and have been pretty successful.

Both these tech giants are now competing to give the consumers a safer and better option. And looking at their dedication, it looks like very soon everyone would be sleeping their way to office!! ��

Aff

Continue Reading...

Google’s Self Driving Cars Hit The Roads Of California

Google has always come up with brilliant innovations. They created quite a buzz when they announced working on a driverless car concept. Google had already modified Lexus SUV and Toyota Prius with their technology a few years back, and the company has been very upbeat about the reviews.

Now Google has announced that its autonomous car that resembles a cute puppy, will be adorning the streets of Mountain View, California from today. The cars have the same computational system as that used in Lexus and Toyota, with added features for its new model.

It is an electricity-powered car that can clock up to 25 mph. However, the car is to be driven around without air bags. Google’s intentional model was to develop a car sans steering wheel and pedals, but that would be illegal in the state of California.

To give people a feel of driving and also to get their car a legal permit, Google has added  a steering wheel, accelerator pedal and brakes to the model. Google has vowed to develop and hand over to people an even better version of the autonomous car in 2020.

 

Other carmakers such as Delphi have also been working on the self-driving car concept and have been pretty successful.

Both these tech giants are now competing to give the consumers a safer and better option. And looking at their dedication, it looks like very soon everyone would be sleeping their way to office!! ��

Aff

Continue Reading...

Sunday 28 June 2015

Here’s What Will Happen If You Google ‘Gay Marriage’ Today

Today is a remarkable day for love in the U.S. In a historic judgment, gay marriage has been legalized across all states by the Supreme Court.

Celebrating the same, the internet is all colors today. To celebrate the occasion, Google is expressing itself in different ways.

Google has made a #ProudToLove video to celebrate the ruling:

 

In another news, if you type “gay marriage” in the Google search engine, you’ll see a string of colorful cartoon couples holding hands all over the top of the screen.

There’s a colorful heart too with rainbow colors that represent the gay pride flag.

It isn’t a surprising fact that Google is supporting gay marriage. Back in 2012, Google launched a “Legalize Love” campaign in 2012 to fight with the anti-gay laws.

Apart from Google, other companies too have shown their support openly.

Are you finding this gay marriage ruling by Supreme Court overwhelming? Tell us in comments below.

Continue Reading...

Google Hired 18-year-old: Kid Now Serves 1000 Businesses and Just Got $15 Million

Working at Google is a dream for most of the software engineers. And landing a job at Google just after high school is more like fantasy.

This is a story of one such kid who got a job offer from Google before entering the college at the age of 18. Larry Gadea built a plug-in for Google Desktop Search which would allow the users to find and index files in their computers that Google Desktop Search couldn’t. Larry’s plug-in made the search feature a lot more useful, and it became popular within no time. As Google did not allowed plug-ins at that time, Larry had to hack into their system.

Google immediately scouted for young Larry and offered him a job. After doing internship at Google’s Moutain View Office for three months, he then worked part time through his four years of college in Google Canada.

After college Larry wanted to try something new. He worked with Twitter for three years as a back end engineer. At that time Twitter used to crash a lot, so he created a data center optimization technique and named it “Murder” ( quite an irony) to reduce the ‘Fail Whales’, the frequent crashes Twitter encountered.

Soon Gadea got bored and he wanted to start his own company. He got the idea of a start-up a year later. As he talks to Business insider

“It was weird that Google and Apple had you type in your information in a computer at the front desk, but smaller companies didn’t have that technology. Either the receptionist would leave the desk and find the person, or there’d be no one at all.”


So Gadea built a software for such applications, called “Envoy”, to check-in people at offices and keep track of visitors.

It would basically allow visitors to sign-in through an iPad app, and print out a name tag with their photos on it. Its latest app can send push notifications to the iPhone and even show the person’s photo on the Apple Watch.

Envoy soon became the most sought after software, signing up over a whopping 1,000 offices. It boasts a client list like Airbnb, Pandora, GoPro, and Tesla.

On Tuesday, Envoy announced a $15 million Series A investment by Andreessen Horowitz, with its general partner Chris Dixon. In November 2014, Envoy has raised $1.5 million from Silicon Valley bigwigs, including Salesforce CEO Marc Benioff, Quora’s Adam D’Angelo, and Yelp’s Jeremy Stoppelman.

Dixon told the Business Insider

If you go around Silicon Valley today, almost every startup you go to has Envoy at the front desk. It’s sort of become a hit viral app. Larry’s a prodigy. He’s just a classic scrappy, super brilliant Silicon Valley entrepreneur.


Continue Reading...

Saturday 27 June 2015

MetaWear Coin Makes Bluetooth Wearable for Everyone in Less than 30-minutes

Ever thought of a device that fit in for all and help us in measuring and monitoring daily activities? Guess what, the device has arrived and it is called MetaWear Coin. It’s is a tiny, coin-cell powered, Bluetooth Sensor Platform with an SDK, used to develop Smart & Connected Wearable products.

MetaWear Coin is developed by a team of renegade engineers who wanted to change the world of Bluetooth. This highly integrated platform includes wireless hardware that is loaded with sensors, a simple and functional case, easy to use SDKs, lots of open source code and sample mobile Apps to get you started.

Who Can Use MetaWear Coin?

Anyone and I’m serious. You tell the board what to do: read temperature data, log motion data, download log data in memory, sound an alarm when a button is pressed, adjust the volume of your Bluetooth speaker when the MetaWear is shaken, or anything else you can think of. Check out below uses cases to get a feel of MetaWear Coin and its awesomeness.

Here is an example showing how simple it is to turn on the LED on the board:

 

Here is a project on Github fitness tracker MetaWare that streamlined activity tracker created on the MetaWear platform. The app demonstrates use of several advanced functionalities in the platform including accelerometer data, data logging, data processing, Android API, and more.

Another great project built using MetaWare Coin is a Boxing and MMA Glove that tracks how hard you punch. It also helps you train as a fighter:

 

Features and Technical Specs:

The hardware features a temperature sensor, motion sensors, Bluetooth radio, push-button, LED and more, all compatible with MetaWear mobile SDK.

HARDWARE SPECS: 

Low power ARM SOC256kB Flash, 16kB RAMSmart and efficient Coin Cell battery circuitGPIOs/SPI/I2C for adding your own sensor or LEDsSmart sensors including motion (accelerometer) and temperaturePre-loaded MetaWear firmware runs Bluetooth LE stackOnboard LEDSimple Push-buttonOn-board memory for logging data

SENSOR SPECS:

BOSCH Accelerometer ±2 g, ±4 g, ±8 g, ±16 g: low-noise, 12-bit digital acceleration sensor with typical operation current consumption of only 15 μATemperature sensor (-40C to 85C) is an SMT thermistor with 1C accuracy and 0.125C resolution

FIRMWARE AND SOFTWARE SPECS: 

Android and iOS API (BLE compliant)Easy to use data processing moduleANCS compatibleData streaming capableOn-Device logging capable

MetaWare Coin is currently running its Kickstarter campaign and you can pre-order the kit at $49.

Continue Reading...

Friday 26 June 2015

[UPDATED] Buhari sacks NNPC board

President Muhammadu Buhari has dissolved the Board of the Nigerian National Petroleum Corporation with immediate effect.

The announcement was made in a statement by the Director Communications, Office of Head of Civil Service of the Federation, Alhaji Haruna Imrana, on behalf of the HoS, Mr. Danladi Kifasi.

“The directive to that effect was conveyed in a letter signed today (Friday) June 26, 2015 by the Head of the Civil Service of the Federation, Danladi Kifasi. In it, the President thanked members of the dissolved board for their services to the nation,” he said.

Details later…

Continue Reading...

Thursday 25 June 2015

Mourinho loves taking credit for everything - Pellegrini

The Chilean says he is the polar opposite of the Chelsea manager, who won the Premier League title last season, but insists they are not "enemies"

Manchester City manager Manuel Pellegrini has taken a swipe at rival boss Jose Mourinho, saying the Chelsea coach takes credit for “everything”.

The Portuguese guided the Blues to Premier League glory last season, finishing eight points ahead of defending champions City in second place.

But Pellegrini believes the manner in which the two coaches celebrated their respective title wins highlights key differences in their characters, with the Chilean intimating that Mourinho took the limelight away from his players.

“When he wins, Mourinho wants to take credit for everything. I never do that,” Pellegrini told Chilean newspaper El Mercurio. “When I won the Premier League, I didn’t say a word."

The two managers have endured a fractious relationship ever since Mourinho replaced Pellegrini at Real Madrid, though the City boss insists he does not hold a grudge against his Chelsea counterpart.

“I don’t have any problem with Mourinho,” he continued. “He’s not my enemy and there isn’t any conflict - but I differ from him on all fronts. I have no interest in analysing him as a person.”

Continue Reading...

All Hail Queen Ola! One of Alaafin of Oyo’s Wives Sparkles in White

The Alaafin of Oyo is known for his beautiful wives and Olori AKA Queen Ola is no different.

She came in to Lagos for a makeover with Ifeoma of iPosh Looks.

Ayaba Olaitan wore a white long dress with a lace top and a metallic belt with crystal studs, and for her beauty look she opted for dark eyes and red lips.

Continue Reading...

Wednesday 24 June 2015

How to increase file speed

Have you ever spent almost a whole day trying to move gigabytes of data and just sitting there, waiting for the transfer to complete? Have you ever wished there was a faster way to copy and move files on Windows? Today i will be showing you how you can copy or move large files easily without stress on your computer.

Sometimes you will want to move files from one location to another on your PC and might be wondering how this can be done fast. It’s a fact that Windows does this but if you really want to get it done much more faster, just read on. Although a number of people know just how to achieve this already, this quick tip is basically for those who haven’t heard or, or come across, the software used to achieve this. Let me introduce you to a great software called Teracopy. With this application you don’t to spend all day moving or copying your files any longer.

It’s got a lot of features you can’t find by default on Windows. The transfer speed is awesome and with the error recovery feature, it’s just perfect for the job. With Teracopy you can; Copy Files easily – It uses dynamically adjusted buffers to reduce seek times . Asynchronous copy speeds up file transfer between two physical hard drive. Pause and Resume file transfer – You can easily pause transfer process at any time to free up system resource and continue at a single click.

Interactive File List – Teracopy shows failed file transfer and let you lets you fix the problem and and recopy only problem files. Error Recovery – In the case of copy errors, Teracopy will try several times and in the worse case just skip the file, not terminating the entire transfer Shell Integration – It can completely replace Explorer copy and move functions, allowing you to work with files as usual. This software is available for free and you can download it here.

You only need to install and it starts working, there’s no special settings needed.




Add; Jeremiahlincon.blogspot.com to your bookmark today and get the Reality

Continue Reading...

Top 10 Free Wireless Network hacking/monitoring tools for ethical hackers and businesses

Ten Free Wireless Hacking Software

There are lots of free tools available online to get easy access to the WiFi networks intended to help the network admins and the programmers working on the WiFi systems and we at Team Techworm have picked the top 10 of those for ethical hackers, programmers and businessmen.

Internet is now a basic requirement be it office or home as it is majorly used in smartphones besides computer. Most of the times people prefer to use wireless network LAN which is much easier and cost effective.

It has been observed that the neighborhood WiFi hot-spots are visible on user’s device however one can get access to the same only by cracking password with the sole purpose of using free internet. Also in case of big firms where all the employees are connected through a wireless network admin might want to keep a check on the network traffic and hence even they need tools to crack the network.

Vulnerability in the wireless LAN is majorly due to poor configuration and poor encryption. Poor configuration includes the case of weak password mainly done purposefully by the network admin to check the network traffic. Poor encryption is dangerous as it is related to the 2 security protocols WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access) and WPA is again of 2 types WPA1 and WPA2, WPA was introduced in 2003 as WEP protocol was easy to crack. The tools used to hack the network is used either for the

purpose of sniffing the network : as is the case of network admins and
cracking the password: used by programmers to rectify the trouble shooting and by the people who want to use internet free of cost. It has been seen that based on this concept there are around 10 tools together which can be understood to hack wireless LAN.
Aircrack

Most popular wireless password cracking tool, it attacks 802.11a/b/g WEP and WPA. This tool manufacturers also provides tutorial for installation of the tool and its usage for cracking the password. Prior to using this tool it is essential to confirm that the wireless card can inject packets as this is basis of WEP attack. This can be downloaded from: 
http://www.aircrack-ng.org/

2) Cain & Able: This tool intercepts the network traffic and cracks the passwords forcibly using crypt-analysis attack methods. It also helps to recover the wireless network keys by analyzing routine protocols. Can be downloaded from :
 http://www.oxid.it/cain.html

inSSIDer

This tool has been awarded “Best Opensource Software in Networking” and is a paid software available at a cost of $19.99. This is popular scanner for Microsoft Windows and OS X operating systems and can do a lot of tasks which can be helpful for the admins to sniff the network LAN. Can be downloaded from :
 http://www.inssider.com/

WireShark

This is network protocol analyzer. So again good for the network admins to keep a check on the traffic. Basic requirement is that the user should have a good knowledge of the network protocol only then they can use this tool. Can be downloaded from :
 https://www.wireshark.org/

CoWPAtty

This tool is an automated dictionary attack tool for WPA-PSK. CoWPatty is simple to use however it is slow as tool uses the password dictionary for generating hack for each word contained in the dictionary by using the SSID. Can be downloaded from:
http://sourceforge.net/projects/cowpatty/

Airjack

This is a Wi-Fi 802.11 packet injection tool. Mostly used to check for the “man-in-the-middle (MiTm) flaws” in the network and mitigate them. Can be downloaded from :
 http://sourceforge.net/projects/airjack/

WepAttack

This is an open source Linux tool for breaking 802.11 WEP keys. While working with this tool a WLAN card is required and basically the tool attacks working key using the dictionary words. Can be downloaded from : 
http://wepattack.sourceforge.net/

OmniPeek

This is again network analyzer tool working only on Windows OS. This tools captures and analyzes the network traffic. The tool can be also used for trouble shooting. Can be downloaded from :
 http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzer

CommView for WiFi

This is for wireless monitoring and protocol analysis. Captured packets can be decoded by user-defined WEP or WPA keys.  This again is mainly used to monitor the WiFi traffic by the professional programmers, protocol admins and even at homes. Can be downloaded from :
 http://www.tamos.com/products/commwifi/

CloudCracker

This is online password cracking for WPA protected WiFi networks. It is used to crack the passwords by using a dictionary of around 300 million words. Can be downloaded from :
 https://www.cloudcracker.com/

Most of these tools are free; some of them are for protocol analyzers to monitor the trouble shooting whereas others are for hacking the password for unauthorized internet access also there are tools which use the dictionary words to crack the password.

For the network admins and the professional programmers these tools should be more helpful for understanding the cracking of password and hence helping them professionally.

However, one needs to be cautious when using the tools as this might be an offense to use the tools to crack the passwords and get unauthorized access to the internet in some countries. Also such kind of tools are also used by cyber criminals and terrorists to get easy access for free usage of internet anonymously.

Continue Reading...

My hair is my identity —Korede Bello

The ladies love him while fans can’t get enough of his signature wink. The eighteen-year-old singer, guitarist, songwriter and composer talks about his craft

Have you always wanted to do music?

I did not set out to be a musician, but I always found myself singing or taking interest in musical videos. Growing up, I idolised musicians like Michael Jackson, Fela Anikulapo-Kuti, Usher Raymond and Chris Brown. I started out as a dancer. As a child, I used to dance to Daddy Showkey’s music in school.

How would you describe your childhood?

I was a good child. Growing up, I was loved by everyone and people wanted to be around me. I made people smile, I oozed happiness and people wanted to associate with me.

When did you take up music seriously?

That was few years ago, about four years ago.

Have you been able to define your style of music?

Yes I have, although I am still growing. The philosophy of my music is to give life, hope and joy. I want people to be optimistic when they listen to my music even though it could come in different sounds or genres.

You seem to have more female fans and the wink has become a signature. Does it come naturally?

I will not say I anticipated it. Nobody forced me to wink, I brought it upon myself and I have always been loved right from childhood. I appreciate the fact that my fan base is growing. It makes me want to work harder than I am already doing.

When do you plan to release your debut album?

I can’t tell now but officially, I have two singles and I have featured in two others. The first was ‘African Princess’. I have also been featured in Adaobi, Dorobucci and Looku Looku as well.

What is your selling point?

It has to be the values and goal of my music. I do good music and I call my music, sweet music. I do not know if other artistes see music the way I do. Music is a blessing. I was blessed with it and I want to share that blessing

How about the financial benefits?

I do not want to be misquoted, but I thank God for the journey so far. I am no longer where I used to be financially; I can see mega money already.

What is your idea about education?

I am passionate about education. It may not be formal education, but I encourage people to acquire some education. I am a mass communication student and I just finished my national diploma at the Nigerian Institute of Journalism. I am an associate member of the Institute of Information Management, Africa. I would like to have a degree in Mass Communication or Sociology.

How do you intend to marry schooling and your career?

I am grateful for the advancement in technology; it is not the way it used to be. I pray for God’s grace to be able to manage it. I could do a part-time course. Those are my plans, but God could have a different plan for me.

How would you describe your personal style?

Style to me is what makes the ladies smile. It is what I am comfortable in; what is inside of me and what I am trained to tell the world I am. I like to look good and attractive to the opposite sex. I like to look simple. I like to wear tee-shirts, jeans and mixed with my African prints. I have a thing for perfumes.

What is your daily grooming regimen?

I take my bath twice a day. I eat healthy and drink about eight glasses of water a day. I take a lot of fruits and eat at the appropriate time.

Do you spend a lot of time taking care of your hair?

Time is relative. My hair is my identity and I wake up like this every day.

What would you be if you were not a musician?

I would have been a broadcaster; I like to be in front of the screen.

Are you in a relationship?

Yes, with my beloved fans.

Do you find fame intoxicating?

I am surrounded by people who mean well for me and are experienced. I cannot say I would do it on my own but I look up to God for grace to overcome any obstacle that may arise.

How did you meet Don Jazzy?

Someone introduced me to him. The person listened to my music and he introduced me to someone who in turn introduced me to Don Jazzy. Don Jazzy is a compassionate leader. He is a humble person and I hope to be like him.

Which artistes do you hope to collaborate with?

I will like to work with Tuface because he is a legend. He makes music to make people happy. I will like to work with Asa. Internationally, I want to make music with Ed Sheeran and Arianna Grande.

Do you write your own songs?

Yes I do. For inspiration, I have to be engaged in an activity. Most of the time, I play the guitar or keyboard.

How do you relax?

I like to communicate with my fans on social media, see movies and play musical instruments.

Source: PUNCH.

Continue Reading...

Saturday 20 June 2015

How To Root Infinix Zero 2 In Few Steps

Rooting your Infinix Zero is easy and can be done in one click but like I always say before any rooting procedure, you’re doing it at your own risk and I won’t be held responsible in case you eventually brick your device or lose your warranty. You can disregard that first paragraph, it’s just formality. This process should be safe and I don’t see any problems arising from it unless you choose to upgrade the device or restore factoring settings. It’s never safe to update a rooted device or restore factory settings. You must unroot first. I guess you know that already. Anyway, that’s not the subject here. If you don’t know what rooting means or why you need to do it, here’s an article to help you understand it.

Steps to Root Infinix Zero 2

1. Download and install Kingroot.

2. Be sure your phone is connected to the internet and launch the app. It’ll try to verify your root status first.

3. After trying to verify your root status, click the “TRY TO ROOT” button.

4. The rooting process should start and you should see something like this.

5. During this process, your phone may restart. As soon as your Infinix Zero 2 reboots, the rooting process will continue automatically. At this point, you may get a prompt to install an app. Ignore the warning, mark the checkbox and tap “Install anyway”

6. About a minute or two later, the whole process should be complete.

7. To verify if your phone is truly rooted, you can install root checker basic from Play Store or simple close the Kingroot app and re-launch. It should show you this. If you check your app drawer too, a new application call Kinguser should be installed. Filed Under: Android Tagged With: infinix, infinix zero 2, root

Continue Reading...

Tuesday 16 June 2015

Ericsson Researchers Achieve 5G Speeds Exceeding 10Gbps

On one hand most of us are using 3G networks and waiting for faster 4G LTE, researchers working in Ericsson labs have been able to achieve mind-blowing 5G speeds exceeding 10 Gbps.

Ericsson is one of the biggest names in telecom infrastructure and it is actively testing 5G and other technologies to improve the data transmission rates in the future.

One of the leading technologies being utilized by Ericsson is MIMO’s Multipoint Connectivity technology that allows the devices to connect to more than one data towers and thus enhance the transmission rates. It should be noted that Linksys launched the world’s fastest WiFi router based on similar MU-MIMO technology.

Ericsson explains it as follows in a web-release:

“Ericsson’s latest 5G initiative sounds deceptively simple; a 5G mobile device connects to several 5G cells at the same time, this is known as multipoint connectivity. It provides the resiliency to ensure that the device maintains a high-quality connection with the 5G network as it moves between cells. It also enables the transmission of several different sets of data signals (Multiple Input Multiple Output, or MIMO, streams) to the mobile device over the same radio frequency channel. This is called distributed MIMO, and it can increase downlink throughput by 100%. The combined technical capability is called Multipoint Connectivity with Distributed MIMO.”

By using this next-gen technology, the researchers are able to touch the 10Gbps mark and the app coverage with data rates exceeding 10Gbps. The network latency is also reduced to 1 millisecond while the energy efficiency gains by a factor of 1,000 per transported bit.

Watch the video below to know more:

 

The current research and progress being made in the 5G concretes my faith that the future of 5G technology is very bright. It is expected that within next 4-5 years, due to the rapid increase in the number of devices, the 5G technology will be more crucial

Continue Reading...

Mark Zuckerberg: How I Hire People for Facebook

If you ask a CEO of some big fat company this question-
“How you hire people?”, he/she might be telling you about
several kind of qualities like skill, intelligence, ethics value
etc. These things are no doubt very necessary when you
want the best person for the work, but Mark Zuckerberg, the
CEO of Facebook thinks a little different.

He checks one particular thing besides all these skill and
intelligence. Mark Zuckerberg has built a 200billion dollar
company with more than 9000 employees. Recently he made
it to the top 20 of the Forbes richest people list.

Mark Zuckerberg said in reply to this question:
“I will only hire someone to work directly for me if I
would work for that person and It’s a pretty good test
and I think this rule has served me well.” He also said,
“in an alternative universe if things were different and I
didn’t start the company, I would be happy to work
for that person.”

Continue Reading...

Sunday 14 June 2015

This Simple Trick Can Hack Your WhatsApp Account

A new vulnerable found in WhatsApp which allow hackers to hack WhatsApp account.

How does this trick works?

First hacker setup WhatApp on a new phone using the target’s phone number
From WhatsApp, the hacker calls up the phone number on the target’s phone and provides the requisite PIN code to authenticate the account.
If the hacker has access to the phone, then he can answer the phone call and take the PIN code

Anyone can answer the WhatsApp call without unlocking the screen on the phone, even if lockscreen feature is enabled.
This trick bypasses the security password mechanism that is required to access key phone features.

Especially on iPhones configured with Siri authentication for lockscreen are even more vulnerable to access without any Pin, as contact details will be readily available for access through Siri’s settings.
In other way if the person attempting to steal WhatsApp account information does not have the target’s phone number, he/she can still get it easily by calling their own number from target’s phone via Siri.

Here is a YouTube video which explains you how a WhatsApp account can be hijacked with a simple trick
Click here

Continue Reading...

How To Recover Data From An SD Card Or Hard Drive

Are you worried about the files which are deleted ? If yes then don’t worry since there are lot of softwares and tools to recover deleted files from your disk but few works and few might not. Here is the best software that we suggest you to recover your deleted files from your disk. This software have free version and paid version too, its better you go with free version. Using free version we can recover almost all the files which have been deleted or corrupted or formated accidentally.

File Name :- Recuva

File Size :- 4.5 MB

System Requirements :- Windows 8.1, 8, 7, Vista and XP.

Download Link :- http://www.piriform.com/recuva/download (Link will open in a new tab)

Continue Reading...

Spreading malware through Images with Stegosploit tool

Next gen cyber attacks could be through Internet
images using Stegosploit tool which allows
hackers to embed malware in an image
Security Researcher Saumil Shah has developed a
Stegosploit tool wherein hackers can embed executable
JavaScript code within an image to trigger a drive by
download.

Internet is becoming a major source of media and
eventually emerging as a hub of various advertisements.
Hence, we can see so many innocent images scattered
all over the Internet be it any of the social networking
sites or the search engines. Security researcher Saumil
Shah feels that it is this field which the next generation
Cyber attackers could exploit.

Saumil Shah, a security researcher from Net Square
security, recently presented his Stegospoilt project at
Hack In The Box Conference held in Amsterdam. During
the conference he demonstrated an updated method of
his digital steganography project known as Stegospoilt
Tool, which allows hackers to embed executable
JavaScript code within an image to trigger a drive by
download.

What does all this mean?

In layman terms it would simply mean that going
forward there are chances that people might download
potentially dangerous malware into their devices just by
viewing an innocent looking image, even without clicking
or downloading that image. While a person views an
image, the hidden malware could get downloaded in the
computer or smartphone or Tablets without the
knowledge and consent of the user. Now, this malicious
program or the malware can be very dangerous as it can
steal user’s confidential data like photographs, login
credentials, financial information etc. The worst part here
is that antivirus and the malware detection scanners of
present times are not equipped to detect these types of
cyber attacks yet, thus even though the devices are
protected with the safety programs they are useless in a
scenario if the attackers choose to attack through the
Stegospoilt tools.

Steganography: This is a technique of transmitting some
messages in hidden form, in such a way that the
message becomes a part of something else such as an
image or article or shopping list or even cover text. This
technique is being used since 1499 and one striking
example of Steganography would be when some hidden
message is written with an invisible ink between the
visible lines of an innocent friendly letter.

Usually in case of cryptography, the encrypted message
arouses much interest; however in case of
steganography the secret message does not trigger any
attention and thus gets saved from unwanted scrutiny,
this is why steganography is preferred over
cryptography.

History has revealed that people have used a
combination of cryptography and steganography in the
past to transmit secret messages to the ‘right people’.
In his demonstration Shah said that steganography
method “hides the message in plain sight”. On the
contrary, the technique developed by Shah i.e.

Stegospoilt tool” is an advanced method of the
steganographic method wherein the exploits will not only
be delivered in plain sight but also in style.
Besides being a security researcher, Shah also has a
passion for photography.

It was five years back when Shah decided to combine
his passions of hacking and photography; thus he
started experimenting steganographic techniques in the
images.

While speaking to iDigitalTimes , Shah said:

I really love photography and I had been
looking into jpeg files and image files just
because I could. It was then that I began to
wonder if non-image data could be encoded
inside an image itself. Of course,
Steganography in images has been around a
long time and a lot of research has been
done with encoding text on pictures, but with
classic steganography you are just adding
text into an image and both the text and the
image are passive. What I wanted to do was
encode active code into the image pixels so
that when it was decoded, it isn’t viewed as
an image, but rather, executes.

Finally, Shah discovered an executable code which can
be embedded in an image and then executed in the web
browser. Thus, Shah created his own tool ‘Stegospoilt’
with which he was able to hide executable code within
an image and then execute the same code in a web
browser that supports HTML5 Canvas. Further, the tool
uses Java Script to read the image pixel data and
decodes the image within the browser thus exploiting the
HTML5 Canvas.

Here is the video

Using this Stegospoilt tool, Shah has been taking known
exploits in Chrome, Safari, Explorer and other HTML5
Canvas supporting browsers and coded these exploits
into the image layers. Shah has dubbed the resultant
files as Imajs (image + JavaScript) which loads as
JavaScript in a browser and renders as an image as well
as an executable. Thus Shah was able to hide two
different kinds of content in one single file
delivering malicious content in the images.

During encoding process, the image may appear to be
totally unaltered depending on which layer the JavaScript
has been embedded. The Stegospoilt technique is able to
distribute the executable code around the inside of an
image file which makes it next to impossible to be
detected by the current antivirus programs. To detect
this hidden code, the antivirus needs to scan each and
every byte in an image which would directly affect the
speed of the internet.

It was in the month of March when, Shah gave the first
demonstration of his Stegospoilt tool at SyScan. Then,
the technique could render the malware by using two
images; one would contain the executable code and the
other would contain a code to decode it. However, Shah
has further worked on his technique and now both the
executable as well as the decoder codes can be
embedded within a same image. The technique is
possible with PNG as well as JPEG images. Further, as
long as the size of the file remains unchanged it can be
added to any webpage including Twitter, Imgur,
Instagram, dating profiles and many more.

People who view photographs and images online would
be easily victimized as the malware gets downloaded
just by viewing and does not need to be clicked or
downloaded. This can be a greatest technique which
cyber attackers can exploit in the near future. Shah is
pretty confident that we will witness these attacks soon,
though as of now there aren’t any cases of hackers
using this technique yet.

Shah said: “I can’t be the only guy that thought this
up. When I think of something I want to bring it out into
the light and say ‘here’s a technique that’s very difficult
to do but have at it. Use your creative thinking and find
out some defenses against, because this thing is
coming”.

I personally feel it is high time that all the anti virus
programmers and malware scanners need to work fast
and really bring some tool to act against such type of
cyber crime and be ready before the cyber crooks start
attacking the Internet users.

Continue Reading...

Peter And Paul Okoye Explain Why They Don’t Go To Church Anymore Since 2007

It may come as a surprise but the Okoye brothers has
revealed that they have not entered any church for good 8
years. They also claim that their refusal to go to church did
not affect their close relation ship to God.

According to Nigeriancamera, they said thus:

”Each time we attend, other worshipers would not listen to the
Pastor’s sermon again. All eyes will just be on us. Instead of
praying, some people will even decide to be starring at us. We
were not comfortable with that and thought we were
distracting a lot of people from serving their God, so we said
to ourselves that we should stop going. All men are equal
before God, so we don’t encourage people to abandon their
primary purpose of being in church because of us."

Continue Reading...

How to use Whatsapp without any number

Whatsapp the most leading app with over 1 Billion downloads on the Google Play Store only. You can use it for Chatting, sharing images, videos, locations, audios making calls and much more. You just need to give this app your number then verify it and you are good to go.

But have you ever wondered what if you don’t give your number and give someone else’s number. Then? Then you need to verify that number and then you can use that number on your mobile. But what if you don’t have access to that number. Then also you could use that number with a simple trick which is mentioned below.

Follow the Steps given Below to use Whatsapp without any number

First Step is to Uninstall Whatsapp from your Device.

Reinstall it from Google Play Store.

Put your mobile on Airplane Mode. We do so to stop whatsapp from verifying your number.

Now open Whatsapp and fill in any number. Whatsapp will try to verify your number.

When whatsapp will not able to verify your number. It will ask you for alternative methods to verify your number. Click on Verify through SMS and then provide your email address.

Now Click on Send and then instantly click on Cancel to stop the authentication process.

Now you need to Install another app, Spoof text message which we will use to spoof the text message. This app will ask for details. Enter this information.
TO: +447900347295

FROM: Mobile number

Message: Your E-mail Address

Wait for a few seconds and you are good to go.

Now send messages to your friends using this number and Prank them. And Don’t forget to share this trick with other people. Find more awesome How to, Tips and Tricks and Programming Articles on CodingSec.net.

Continue Reading...

Saturday 13 June 2015

How To Learn Programming

There are few students who have asked us few tips on
programming. By just watch a video or listening to a
programming class will not make you professional in
programming. Here is a list of tips for programming/coding.
Don’t buy books and waste money try to Google it and
watch videos on YouTube .

Try to use PDF or eBooks available online.

Don’t copy, paste the code try to type it out.

Look at the example code

When you learn coding, make sure you write it down on a
paper or note it in your computer

Don’t read the code – run it

Always have a backup of your programming files

Try to understand the code

Learn to use a debugger

Try to write your own program once you learn it

Code your program on Linux to get better experience

Experiment with changes of the code

Try to pick one programming language and learn it until
the end

Learn basic programming languages like Python, Java,
Html, C

Learn the core concepts of the language

Focus on one concept at a time

Examine the syntax

Visit; jeremiahlincon.blogspot.com for more

Continue Reading...

ChromePass A Easy to Use Chrome Browser Password Recovery Tool

“ChromePass” – A simple password recovery
tool for “Chrome” Browser.

After Internet Explorer, Opera and Firefox password
recovery tools, here’s another password recovery tool for
one of the world’s fast growing web browser – Chrome.
ChromePass is a free password recovery tool for
Windows, which enables you to view the usernames and
passwords stored by Google Chrome Web browser.
Chrome is a simple yet a powerful freeware tool to view
saved passwords in Google Chrome. For each password
entry, the following information is displayed: Origin URL,
Action URL, User Name Field, Password Field, User
Name, Password, and Created Time.

You can select one or more items and then save them
into text/html/xml file or copy them to the clipboard.
There is no installation process or additional DLL files
required to use ChromePass. In order to start using
ChromePass, simply run the executable file
“ChromePass.exe.” After running it, the main window will
display all passwords that are currently stored in your
Google Chrome browser. You can run this tool without
administrator rights.

There are some steps that should be followed in order to
read ChromePass passwords from external drive.
Starting from version 1.05, you can read the passwords
stored by Chrome Web browser from an external profile
in your current operating system or from another
external drive (For instance: from a dead system that
cannot boot anymore).

To use this feature, you must know the last logged-on
password used for this profile, because the passwords
are encrypted with the SHA hash of the log-on password,
and without that hash, the passwords cannot be
decrypted. You can also use this feature from the UI, by
selecting the ‘Advanced Options’ in the File menu, or
from command-line, by using /external parameter. The
user profile path should be something like “C:
\Documents and Settings\admin” in Windows XP/2003 or
“C:\users\myuser” in Windows Vista/2008.
ChromePass is available in many languages. In order to
translate ChromePass to other language, follow the
instructions below:

1. Run ChromePass with /savelangfile parameter:
ChromePass.exe /savelangfile
A file named ChromePass_lng.ini will be created
in the folder of ChromePass utility.

2. Open the created language file in Notepad or in
any other text editor.

3. Translate all string entries to the desired
language. Optionally, you can also add your name
and/or a link to your Web site. (TranslatorName
and TranslatorURL values) If you add this
information, it’ll be used in the ‘About’ window.

4. After you finish the translation, Run ChromePass,
and all translated strings will be loaded from the
language file.

If you want to run ChromePass without the translation,
simply rename the language file, or move it to another
folder.
After you finish the translation, Run ChromePass, and all
translated strings will be loaded from the language file.
If you want to run ChromePass without the translation,
simply rename the language file, or move it to another
folder.

This utility is released as freeware. You are allowed to
freely distribute this utility via USB, CD-ROM, Internet, or
in any other way, as long as you don’t charge anything
for this. If you distribute this utility, you must include all
files in the distribution package, without any
modification.

The software is provided “AS IS” without any warranty,
either expressed or implied, including, but not limited to,
the implied warranties of merchantability and fitness for
a particular purpose. The author will not be liable for any
special, incidental, consequential or indirect damages due
to loss of data or any other reason.

All in all, ChromePass can come in handy to many users
out there, not only because it’s freeware, but also
thanks to the fact that it’s distributed as a very light
package. Support for multiple browsers however would
definitely attract more users, while a comprehensive help
manual to explain every single feature could make
beginners feel a bit safer.

Continue Reading...

A Tiny home projector

A new device on the market, Beam casts the
idea of a projector in a new light. Resembling a
large, odd-looking lightbulb, it was actually
designed to screw into any standard light
fixture, and can project an 854x480 resolution
image up to 120 inches in size (that’s twice as
big as a 60-inch plasma TV) under optimal
conditions. No unsightly power cables needed
(it ships with one in case you don’t want to
install it) — you just screw it in .

Don Molenaar and his L.A.-based team of
Dutch inventors created Beam as an alternative
to the “big and bulky, ugly” projectors on the
market. The device can be connected to the
Internet and left plugged in all the time, and
because it doesn’t look like a projector, it can
actually be “part of your interior,” Molenaar
suggests. Of course, the quality of projection —
whether for movies, games, presentations — is
dependent upon the surface you’re projecting
on: a kitchen counter, a bedroom ceiling, a
dining room table, an office wall.

But Beam’s secret sauce is its event-based
functionality, using if this, then that logic.
Essentially, for every detectable event — it’s 6
a.m., you added a photo to Instagram, you
came home — Beam can take an action: For
example, it can start streaming Spotify or
Netflix, show today’s weather forecast or stock
quotes or turn on the light. (Yes, it functions as
a lightbulb, too.) It works via a free app for
iOS or Android, or via Bluetooth keyboard and
mouse.

However, as with all connected products,
security should be top-of-mind. Casey Ellis,
CEO and co-founder of Bugcrowd, says that
malicious apps are always a potential threat.
“Automatic updates and a fast-release update
cycle from the Beam maintainers will minimize
this risk,” Ellis notes. That could be a problem.

Molenaar says his company will be issuing
updates to its custom version of Android, but
not every update that Google puts out will be
used. “If the next update from Google takes too
much processing power away from Beam,
we’re not going to do it.” Should you be
concerned? Probably not. Bigger companies
are often slower to respond to issues than small
teams with products still in development.

Beams just closed a Kickstarter campaign that
raised more than $750,000 — but if you’re
interested in trying out this bright idea, you
can still order them. The company says that it’s
on-track to deliver by November.

The device can be connected to the
Internet and left plugged in all the
time, and doesn’t look like a
projector.

Continue Reading...

Samsung Launched World’s First Transparent and Mirrored Display

Technology company Samsung has recently unveiled world’s
first transparent and mirrored OLED display panels earlier
this week at Hong Kong Convention and Exhibition Centre.
Till now you’ve seen transparent displays in futuristic
movies and TV shows and now for the first time they are a
reality.

The Samsung Transparent Display presents visuals in Full
HD 1920x1080p resolution. This was displayed in a
showcase for informational browsing and personalized
shopping. The OLED display technology of Samsung is
integrated with Intel RealSense technology that makes the
viewing experience for users a more enriching and engaging
experience.

The RealSense technology of Intel uses 3D cameras to see
the people around it and its surroundings. Due to its
integration with transparent and mirrored OLED displays,
Samsung has created a “virtually fitting room” where
customers can see clothing apparel, shoes or jewelry from a
different realistic perspective.

Samsung describes its possible applications as: “to deliver
highly differentiated, exquisitely personalized customer
experiences.”

The Samsung Mirror OLED display has more than 75 percent
reflectance which is 50 percent higher reflectance level than
other available Mirror LCDs. This reflective surface that
turns into a giant mirror for showing content is based on the
same OLED technology used in transparent displays.

Company partnered with the Chow Sang Sang Jewelry
company and showcased world’s first advanced
commercially used OLED panels in retail. The company says
that people could also replace their home mirrors using the
Samsung Mirror Display.

Oseung Yang, vice president, Samsung Display Company
said: “”Samsung has a long legacy of leadership in
technology innovation for digital signage, as well as for
other applications, and we are now leading the next wave of
digital signage advancement with our Mirror and
Transparent OLED display solutions. ”
Are you excited to witness transparent and mirror displays
in reality? Tell us in comments!


Source: Techworm.com

Continue Reading...

Friday 12 June 2015

Deleting your browser history could land you up in prison for 20 years in United States

Clearing your browsing history is a crime in
United States according to the Sarbanes-Oxley
Act of 2002

In a recent article published in The Nation, it revealed
the improper use of a law meant for completely different
purposes by by federal prosecutors. The Sarbanes-Oxley
Act of 2002 was meant to provide authorities with tools
to prevent criminal behavior by corporations. It was put
into practice after the Enron meltdown when it was
found out that executives or their servants following
orders torn into shreds every document they could think
of which may prove them guilty. The legislation’s goal
was to stop companies from committing large fraud and
then damaging the evidence of their conspiratorial
criminality while investigations were under way.
The appropriate section of Sarbanes-Oxley reads as
follows:

"Whoever knowingly alters, destroys,
mutilates, conceals, covers up, falsifies, or
makes a false entry in any record, document,
or tangible object with the intent to impede,
obstruct, or influence the investigation or
proper administration of any matter within
the jurisdiction of any department or agency
of the United States or any case filed under
title 11, or in relation to or contemplation of
any such matter or case, shall be fined under
this title, imprisoned not more than 20 years,
or both."

Khairullozhon Matanov, a friend of the Tsarnaev
brothers, the Boston Marathon bombers was interviewed
by the Federal authorities about his association with
them. However, the federal authorities never accused
him for any activity linked to the bombing nor have they
said that he was having knowledge of their plans or felt
for them. During the interviews, he did however
perpetrate a few small lies, of which none had any actual
relation to the case. For instance, he lied that he had
last time prayed with Tamerlan Tsarnaev together. On
that grounds,

they charged him with four counts of
obstruction of justice. There were three
counts for making false statements based on
the aforementioned lies and—remarkably—one
count for destroying “any record, document or
tangible object” with intent to obstruct a
federal investigation. This last charge was for
deleting videos on his computer that may
have demonstrated his own terrorist
sympathies and for clearing his browser
history .

Based on the records section of Sarbanes-Oxley
mentioned above, the last charge was applied. The law
meant to stop and punish corporate wrongdoing is
instead used as a hammer against a private citizen to a
great extent. Some people may feel that any possible
application of a law is tolerable, especially in the
continual war on terror. However, if that law is ever used
against them, they might end up feeling differently about
it.
The most unpleasant or offensive part of this is that it is
being used to punish “pre-crimes.” When Matanov
deleted his browser history, he had not been accused of
anything and was not aware that he was under a formal
inquiry. His crime was not predictable that federal
agents may someday make a decision to examine him
and thus failing to maintain any self-incriminating
potential evidence.
As Hanni Fakhoury of the Electronic Frontiers Foundation
put it, the government is saying:

“Don’t even think about deleting anything
that may be harmful to you, because we may
come after you at some point in the future for
some unforeseen reason and we want to be
able to have access to that data. And if we
don’t have access to that data, we’re going
to slap an obstruction charge that has as
20-year maximum on you.”

The article in The Nation shows that this is not an
remote and unfair use of Sarbanes-Oxley, discussing
many other similar cases. Traders and bankers danced
away with multi-million dollar bonuses after their
criminally reckless maneuvering almost put an end to the
global economy. Their companies paid fines that are not
worth to be considered for market manipulations and
criminal money laundering. Until now, none of them have
go to jail and none of them have been sued under
Sarbanes-Oxley.

However, it is a different rule of law for an
undistinguished or average citizen. As more and more
data are stored online, the government wants and
believes it has the rights to access that data for policing
purposes. But Fakhoury disagrees.

“The idea that you have to create a record of
where you’ve gone or open all your
cupboards all the time and leave your front
door unlocked and available for law
enforcement inspection at any time is not the
country we have established for ourselves
more than 200 years ago.”

This law has been in the books for thirteen years now. It
has not managed to control the corporate wrongdoing,
but it is proving to be having a negative effect on
citizens who have never swindled a shareholder in their
lives. Combined with federal investigations through our
online communications and their efforts to break secure
encryption in our data storage, they want us to
completely give up our personal freedom of thought and
privacy.

Continue Reading...

Samsung launches New 55 Inch Transparent and Mirror OLED Displays

Samsung Launches New 55 Inch Transparent
and Mirror OLED Displays Which Create “The
Magic Mirror”

Samsung has introduced its first 55-inch mirror and
transparent OLED display panels today at Retail Asia
Expo, which the company will be targeting at the
personalized shopping market.

OLED (Organic Light Emitting Device) is a display
technology that offers bright, colorful images with a wide
viewing angle, low power, high contrast ratio and fast
response time for sports and action movies.

This 55-inch mirrored display offers up a typical
reflection of someone standing in front of it, but is also
able to add augmented imagery overtop, like a necklace
around the user’s neck. The transparent display was
demonstrated as a billboard ad, with advertising
information appearing on a clear panel, and background
scenery still visible.

The technology supports gesture controls and face
tracking, can measure distances, and can scan objects to
be ported into 3D environments. This could lead to some
quite novel interactive shopping and ad experiences in
the future.

“Samsung has a long legacy of leadership in technology
innovation for digital signage, as well as for other
applications, and we are now leading the next wave of
digital advancement with our Mirror and Transparent
OLED display solutions,” said Oseung Yang, vice
president, Samsung Display Company. “We are very
excited to help bring a new interactive dimension to the
world of multi-channel shopping through the integration
of our newest OLED displays with Intel® RealSense™
technology,” he added.

Continue Reading...

Top 10 Tips And Tricks for WhatsApp users

Top 10 Tips and Tricks of WhatsApp which all the users of this addictive app should know

WhatsApp has almost half billion users across the world. Its the most commonly used app however wonder how many users would claim to know the app thoroughly in the sense there are minute details which most of the users are not aware of like how to lock the app or say how to avoid downloading unwanted media files or simple methods to send the important data across to some friend. In this article we will try to go through certain tips and tricks useful in day to day activities of the users while using the WhatsApp:

Get connected to WhatsApp without any phone number: User needs to get connected to Internet via Wi-Fi or modem and get WhatsApp installed in the smartphone. For installation user needs to  visit the official site of WhatsApp and click the application to get it downloaded. Once the app gets downloaded it gives the welcome screen, just click the “Agree to the terms” and then user would be asked to provide the phone number so user needs to type their phone number and click OK. In the next 10-15 minutes the verification process will begin, in the meantime the downloaded application gives a text message in this user needs to click the “call me to confirm” and user gets a call from WhatsApp followed by a verification code on the phone number that they provided. Type this verification code in the downloaded application’s screen and soon the WhatsApp would be activated on the smartphone without any phone number.
Change your WhatsApp phone number: Most of the time the Phone number synced with the WhatsApp is seen by other users and suppose if user is using multiple phone numbers then user will have to uninstall and reinstall their WhatsApp to change the synchronized phone number. An easy way to change the synchronization of the WhatsApp number is present in the WhatsApp application : Go to ‘Settings’ then ‘Account’ then ‘Change number on your WhatsApp’, here user would need to type their new phone number in the first field and then in the lower field add the old phone number and click Done. The new phone number needs to be validated and all the chat history and WhatsApp data get transferred to the new phone number as this number has now been synchronized to WhatsApp. User needs to understand that the device is same and only the phone number has been changed in this case.
Need to Send files that are not officially supported by Android: WhatsApp has some limitation to its file sharing capability. RAR, ZIP, PDFs, .EXE, APKs, Word files and the files which are more than 15MB cannot be shared through WhatsApp. Users need not worry, now they can download the CloudSend app and upload the required file through this app then copy the link and send it across to the person via WhatsApp. When recipient clicks on the link they will be able to download the file without any restrictions.
Stop Automatic media download in WhatsApp: Media files like images, videos, audio files get downloaded automatically in WhatsApp previously users needed the WhatsApp plus application to stop this download. However, now WhatsApp has included this feature in its configuration settings and users can choose whichever images or videos they want to download hence controlling the overall space in the device.
Users can create Fake WhatsApp Conversation: There is an application “Whatsaid – Whatsapp Prank 1.2″, users can download this from http://whatsaid-whatsapp-prank.soft112.com/. Users can start fake conversation using a different display picture, last seen and even personal settings. Now, this app is mostly used by celebrities, common users can use this fake conversation just as a prank.
Disabling the “Last Seen” time stamp: WhatsApp’s feature of Last seen timing is helpful to know when the friend was online however it can also be frustrating as it gives away the personal information of the user and hence is a threat to user’s privacy. Now users can learn the trick of disabling the Last seen time stamp. User just needs to go in WhatsApp settings : Click on Account; Click the ‘Last seen’ button and make the necessary changes. This feature is available both in iOS as well as Android users and user can easily disable the “Last seen” time stamp however if user is online it will still show up.
Locking of WhatsApp: Yes locking of the WhatsApp is possible. For Android users they can download the “Messenger and Chat Lock” from https://play.google.com/store/apps/details?id=com.whatsapplock. For iPhone users they can download “Password for WhatsApp” from http://www.app-pocket.com/app/password-for-whatsapp/ and for Blacberry users “Lock for WhatsApp Messenger” can be downloaded from https://appworld.blackberry.com/webstore/content/27179877/?countrycode=IN&lang=en.
Managing the notification sounds: The sounds and notifications especially from the Group chats can be frustrating hence user can manage the notification and the message sounds by going to Settings and then Notifications and turn off the sound and notifications from group chats.
Archiving all chats: Basically this helps users to back up and restore all the chats. WhatsApp has auto backup facility and users can also create manual backups for their WhatsApp chats. In case user changes the device or uninstalls the WhatsApp then WhatsApp restores the chat information automatically. For manual backup and restoration users need to follow these steps: In case of Apple iOS, users need to Go to Settings then Chat Settings then Chat Backup then click Backup. In case of Android : users need to Go to Settings then Chat settings and then click Backup chats. Android users need to make a note that this method will only take back up of the chats and for the media they will need to use a File manager to backup the media files in either of these Sdcard/WhatsApp/Media in their phones. On the contrary one more easier method for backup and restoration would be by using the Google Drive check here for more details on Techworm,
Users can use WhatsApp from their computer using a rooted Android phone: This is done by “over the air transfer of messages” from user’s rooted Android phone to a Computer running a modern browser like Chrome. Basically here user would need to Install WhatsAir app in their Android device, then grant it root permission. Please note that the Android phone is connected to the network of the computer through Wi-Fi. Click the start button and the WhatsAir app generates a password and gives a address which needs to be typed in the browser of the computer. This works fine with Chrome browser in the computer, the browser page will ask for a password and user needs to type the same password which the Android phone’s WhatsAir app had given while installation. After authentication process the Computer gets connected to the WhatsApp. Users need to understand that this connection stays till the web browser tab is closed or the stop button in app is clicked. Users can enjoy the WhatsApp messages from their Phone to computer and the replies would promptly go through Computer to phone.
 

As already mentioned these are just few tips and tricks for WhatsApp users which they can try and yes enjoy WhatsApping. There may be few more tricks which users can share with us in case they are using it themselves.

Continue Reading...

Wednesday 10 June 2015

Compilation of Top 6 dumbest hacks of all time

The Top Six dumbest Hacks of All Time
Alan Wlasuk, believes that not all hackers are geniuses
and most of them are average folks who are either
smart or may be even dumb just like a normal human
being!

With advanced technology, high speed internet and
availability of much more technologically advanced
gadgets it has helped hackers to get easy access to our
personal and confidential credentials be it bank accounts
or access to social networking sites. Normally, people
are scared of the cyber crooks and hackers as these
people are believed to be extraordinarily smart and
genius who can get access to our data be it on smaller
scale or even huge organisational level.

However, CEO of 403 Web Security, Alan Wlasuk, has
given us examples which indicate that to consider all
hackers as genius is a myth. In fact, Alan believes that
most of the hackers are as smart as or as dumb as any
normal person.

In this article we have compiled Top 6 examples which
indicates that hackers are average people who are
capable of making few dumb mistakes either in the way
they attack or the clues which they left behind that could
trace them.

World’s Dumbest Cyber criminal

Four years back, in 2011, a dumb hacker hacked Kelly
Osbourne’s (the one from Dancing with the Stars fame)
email account. The hacker not only traced her old and
new emails but also forwarded them to his own personal
email account which could be easily traced. This is
considered to be one of the world’s dumbest hacking
incidence which indicates that the hacker was so dumb
that by forwarding the emails to his personal account he
actually invited police to trace and arrest him.

Self proclaimed hactivist Shahee Mirza :

Way back in 2008, a group of people defaced the military
website of Bangladesh government which is known as
Rapid Action Battalion (RAB). The website
www.rab.gov.bd was sabotaged and forced to
temporarily shut down. Moreover, when people entered
the elite security site they found a message
posted which stated: ‘Hacked by Shahee_Mirza’.
Mirza, a twenty one year student of Saic Institute of
Management and Technology in Mirpur, plead guilty and
also told the authorities that he did not have any ill
intent in hacking the site. The authorities were able to
retrieve the site after about 24 hours and it was also
found that Shahee had earlier hacked the websites of 22
organization including one that belonged to the army. It
was found that the name and e-mail address which
Shahee Mirza had posted after hacking the RAB site
were all found to be real.

Further, the self proclaimed hacker, Mirza had also left a
message on the website alleging the Bangladesh
government for not taking sufficient steps for developing
the IT industry in the country though it had passed
sufficient laws to prevent the cyber crimes. Shahee
claimed:

“GOVERNMENT DOES NOT TAKE ANY STEP
FOR ICT DEVELOPMENT. BUT PASSED A LAW
ABOUT ANTI-CYBER CRIME. YOU DO NOT
KNOW WHAT IS THE CYBER SECURITY OR
HOW TO PROTECT OWNSELF. LISTEN.
HACKERS R NOT CRIMINAL. THEY R 10
TIME BETTER THAN YOUR EXPERT. WE ARE
GINIOUS THAN YOU CAN’T THINK. DEFACED
FROM BANGLADESH.”

Obviously that was not a ‘Ginious’ act of the young
hacker as mentioned in his hack. Shahee Mirza might
end up with 10 years of federal imprisonment as per the
law in Bangladesh.

Samy Kamkar’s blog post boasting of his hacking
feat

Samy Kamkar acquired fame for his ‘Samy Worm’ which
he released in the year 2005. Samy Worm first tried a
self propagating cross site scripting worm that would
infect the MySpace accounts. The worm carried a
payload which would display a string “Samy is my hero”
on the profile of the victim’s home page which would
ultimately cause the victim to send a friend request to
Kamkar.

Whenever, the user viewed their profile the malicious
virus would have got planted on the homepage of their
MySpace account. Within a matter of 20 hours of
releasing the malware, Samy was able to spread the
virus to over one million users. The MySpace team had
to shut down their website temporarily to fix the
problem. Samy also boasted his hacking feat in one of
his blog post and ultimately got caught by the United
States Secret Service.

Unfortunately for Samy, his blog contained an image with
license plate in background which helped the officials to
trace him. In 2006, Kamkar was raided by U.S. Secret
Service and Electronic Crimes Task Force for releasing
the worm. Kamkar pleaded for guilty and he was
prohibited from using the computer for next three years.

Ultimately since 2008, Kamkar is into independent
computer security and privacy research and consulting.
He is also making famous hacking gadgets after
outgrowing the dumb hack of 2005.

Daquan Mathis clicked his selfies using the
stolen phone and sent it via victim’s email ID

In 2009, 20 year old Sayaka Fukuda was robbed of her
iPhone when she was on the N train platform at the Fifth
Avenue station near 59th Street in New York. The thief,
Daquan Mathis clicked his selfie using Sayaka’s iPhone
while he was still wearing the same clothes that he wore
when he robbed her. Later, the dumb robber also sent
this image to his email address via victim’s email ID.
Fukuda was able to access her iPhone email account via
internet. Unfortunately, for Mathis, Fukuda was much
smart and she immediately noticed that the thief had
sent some email from her outbox to his email account.
With the details of email address it was much easy to
trace Mathis and with his profile picture attached it only
made matter much simpler for the cops.

Eduard Lucian Mandru, though a clever hacker,
was traced through email ID

Comparatively we can say that Eduard Lucian Mandru
was a much clever hacker. It was in the year 2006 that
Mandru who called himself “Wolfenstein” broke into the
secure computer network that belonged to the
Department of Defense (DoD) and infected several
systems.

Mandru was able to hide himself from the authorities as
they did not have any clue to this hacker except his
email address (wolfenstein_ingrid@yahoo.com). The
authorities had a tough time locating Mandru as he was
much smarter and was accessing the network through
some compromised servers in Japan. Besides, he was
also deleting all the access logs making it impossible to
trace him.

However, after about 2 years Mandru was unemployed
and thus had to apply for jobs and then he opted to use
this same yahoo email address on his resume which led
to his arrest. It seems if he had not used this email
address he would have been safe!!!

Foiling Euro Traffic cameras by using Drop
Database Tables

A clever hacker in a way realized that the recent speed
traps use the Euro Traffic cameras which can
automatically register the speed in addition to clicking
the photograph of the license plate. By using character
recognition the authorities can even translate the license
plate number into a format which they can further use as
a lookup with the DMV database.

In the year 2010, this hacker changed his license plate
number to (‘ZU 0666′, 0, 0) which is a Drop Database
Table. This is a SQL Injection method of licence plates
and if the DMV uses this string of characters in their
database lookup then there is a good chance that all the
database records which contain his actual licence plate
number (ZU 0666) would get deleted. This is an
intelligent and creative move; however Alan is not sure if
this hack is just for fun or is it real.

The security breaches always point out some mistakes
which the victim did like reusing the passwords or not
running the firewall software. Sometimes the hacker
could be actually pretty smarter than the victim. As per
Marc Maiffret, CTO of eEYE Digital Security, in general
hackers are “very calculating and successful, so there
aren’t a lot of ‘dumb hackers’ out there”. So it is always
advisable that all the online users always remain alert of
such hackers and take apt precaution to save
themselves from the getting hacked.

Let us know your views on the hackers, whether they are
genius or dumb…… in the comments section below.

Resource : IT Business Edge.

Continue Reading...

Advertising

Advertise Here

Blogroll

About