Friday, 14 August 2015

How to run Kali on your Android device


Home  How To

How To

How to run Kali on your Android device

By 7h3 Wh173 R4bb17 -

 

Apr 19, 2014

   


This tutorial mainly created for Linux fans. Follow the given steps below to install Kali Linux on your Android phone.

Step 1: Install Linux Depoly on your Android Mobile.

Step 2: Now launch “Linux Depoly” and click download icon

Step 3: In Depol tab click and change the Distribution to Kali Linux

Step 4: Now Change the VNC settings according to your mobile screen.

Step 5: Once done click Install(Start GNU/Linux installation).

Note: This might take few minutes to be completed.

- Advertisement -

Tips: Recommended to do it on a Wi-Fi.

Step 6:  After installing Kali Linux now click Reconfiguration button. After that hit Start.

Step 7: Now download and install Android-Vnc-Viewer and enter the details. Once every goes smooth then you can start using Kali Linux.

If you have any problem on the above steps you can follow the video given below. Here is a video showing you an easy way to install Kali onto you Android device.

Continue Reading...

Monday, 10 August 2015

Man Makes and Shares 3D Printed Gun, Defies Ban

3-D printers could be the next major revolution in manufacturing after Assembly Line. With creating amazing stuff like jewelry and housewares to even a 3D printed car, 3-D printing is already taking the manufacturing world by storm. But, there are some controversies surrounding the 3-D printers and this time it involves a 3D printed gun.
It is not just the cool stuff that you can create through the 3-D printer, but also items like guns. (Not everyone thinks guns are cool). Peter Alaric has created a .40 caliber dart pistol with his own 3-D printer and has shared the .STL files for everyone to create one for their self. The gun is also cloaked from metal detectors. The printer took about 8 hours to make the gun.
According to claims by its maker Peter Alaric DeSimone, this 3D printed gun is as legal as it can get. He emphasizes that his gun is not a firearm, but an airgun, so it clears the norms under current Arm Regulations.
Peter explains that developing a gun is merely a retortion against the ITAR (International Traffic in Arms Regulation) updates. Also unimpressed with the current US President intervening the constitutional rights of the citizens, Alaric wrote on his website
“If Mr. Obama had not attempted to stifle free speech in this way, I probably would have simply worked on another, more innocuous project. But as it is, I felt compelled to act. This gesture of protest further proves the obvious futility of attempting to regulate speech and ban simple mechanical objects; both of which are very un-American ideas.
Here’s a video by DeSimone showing how the 3D printed gun is made and its working and why did he chose to make one.
Making 3D printed gun at home has sparked a debate nationwide. Though it is just created as protestation to Mr. Obama’s policies, it still is a weapon and can be improvised and used by the anyone with malicious intents.
Protests for a good cause are beneficial for the society, but Guns, no way. This 3D printed gun could cast down 3-D printing, creating a negative social image of such a wonderful technology.
Continue Reading...

Winter Is Coming: Scientists Predict Mini Ice Age In Next 15 Years

How “cool” it would be if we could live and survive through an ice age! Though, not that relentless and bitter cold, but somewhat bearable. For those who are still confused regarding the prospect of living in an ice age, listen to this: ‘Earth had been through such conditions before too. It was called Maunder minimum and it happened 370 years before.’
Arecent study of the Sun’s solar cycle suggests that we might be on our way to a mini ice age in the next 15 to 20 years. The research by Prof Valentina Zharkova presents a new model for our Sun’s cycle, which accurately predicts the irregularities within the Sun’s 11-year heartbeat. The model is based on the Dynamo Effect in the two layers of the Sun. This is the same Dynamo Effect that explains the origin of Earth’s magnetic field.
Solar activity varies over a cycle through time and each cycle is different from the other. Solar cycles have long been a topic of study and research since none of the previously existing models could explain the fluctuations in the cycles. Earlier models were based on the theory of a single dynamo forming at the core of the Sun. However, in the new model, the research team added another dynamo which was closer to the surface and got pretty accurate results.
The researchers matched their results with the previous known and recorded solar activities from 1976-2008. Average sunspot numbers that are considered to be a remarkable feature of a solar activity also matched the new model.
As the model defines two dynamo systems working inside the Sun, so they are predicting two resulting magnetic fields that would mirror each other in the opposite hemispheres of the Sun. However, there would be a destructive interference.
So going by the accuracy of the model, Zharkova and her team has predicted that the Sun’s activity in the cycle from 2030-2040 would be little sluggish. It will be a time of Solar minima and if the waves are completely out of phase then conditions of a mini ice age will be offset on Earth.
Continue Reading...

This is What Google’s Self-driving Car Looks Like From the Inside

Google had created a buzz entering into the domains of self-driving carconcept few years back. Now out for the test run, Google’s self-driving cars with the striking resemblance to a cute puppy, are adorning the streets of California.
Google’s autonomous cars have become well known with the flurry of images and news online. As part of the Paint The Town Project On Saturday, at the Community School of Music and Arts in Mount View, California, Google put on a display the prototype of its self-driving car. For the first time, the interiors of the car were shown to the public and the images that we see are the courtesy of the people present at the venue.
Google’s self-driving car looks delightfully spacious, so just forget leg cramps. The prototype shown is, however, without the removable steering wheel. The big red button visible in the picture is where the wheel will fit. In further additions, an accelerator, and a brake pedal would be put in place if the person wants to take over the wheels in Google’s self-driving car.
Check out the video by Google defining its autonomous car:

The Google’s self-driving car reaches up to 25 mph giving you a king like ride while you sleep your way to the office. Google has already tested the autonomous driving technology on the Lexus SUV and Toyota Prius, equipping them with their tech.
Google assures that this is just a prototype and the display was to give an insight to the public about the company’s vision of their self-driving car. The cars running on the streets in Mount View have been voted safe and fit for commercial use. Google has vowed to hand over to its customers an even better version of this autonomous vehicle in 2020.
Image credit: WP
Continue Reading...

USBkill – Code That Turns USB Drives Into PC Killing Weapon

Here’s a news that will cheer up all the activists, criminals, activists and whistle blowers. Now they have got a new tool called USBkill to save themselves by shutting down the computer before the sensitive information will be examined.
USBkill turns your USB into a kill switch once activated. It’s a program – a computer code that will disable the computer if there’s any activity at the USB port. This weapon could be kept in the USB drives and attached to the computers with sensitive information.

Hephaestos, the programmer who wrote the USBkill script, says that USBkill is an anti-forensic USB. He says that it will be of utmost important in case the police busts your bunker, or steals your laptop. USB waits for some change at USB ports and then suddenly kills your computer. He writes:
The police will use a mouse jiggler to keep the screensaver and sleep mode from activating. If this happens you would like your computer to shut down immediately. Additionally, you may use a cord to attach a USB key to your wrist. Then insert the key into your computer and start USBkill. If they then steal your computer, the USB will be removed and the computer shuts down immediately.
If the police catches you, you would want your PC to shut down immediately. He advises the users to tie the USB drive to your wrist and instantly start the USBkill by removing the USB when cops knock down your door.
He adds that users must use full disk encryption, otherwise law enforcement agencies will have their party anyway.
It’s an unfinished work and will be improved by Hephaestos. But, it does work effectively.
Continue Reading...

This code can hack nearly 90 percent of credit card readers in circulation

Shocking : A cyber security firm found 90% of credit card readers currently use the same password from 1990 till date.
This is a facepalm moment for the credit card issues and retailers. Nearly all credit card readers in United States are still using the default password which can be easily hacked into by cyber criminals.
The passcode, set by default on credit card machines since 1990, has been exposed for so long there’s no sense in trying to hide it. It’s either 166816 or Z66816, depending on the machine.

Using either of the two passwords, an attacker can gain complete control of a store’s credit card readers, potentially allowing them to hack into the machines and steal customers’ payment data. No wonder big retailers like Target and Home Depot keep on losing our credit card data to hackers.

Researchers at Trustwave, a cybersecurity firm were quite flummoxed to find that retailers still use decades old passwords for credit card readers. Trustwave executive, Charles Henderson explained that armed with these passwords, hackers can gain administrative access to the card readers and infect them with malware that steals credit card data. Henderson presented his findings at last week’s RSA cybersecurity conference in San Francisco at a presentation called “That Point of Sale is a PoS.”

Device makers sell machines to special distributors. These vendors sell them to retailers. But no one thinks it’s their job to update the master code, Henderson told CNNMoney.
“No one is changing the password when they set this up for the first time; everybody thinks the security of their point-of-sale is someone else’s responsibility,” Henderson said. “We’re making it pretty easy for criminals.”

To arrive at the conclusion, Trustwave researchers studied the credit card terminals at more than 120 retailers nationwide. Henderson stated that these terminals included major clothing and electronics stores, as well as local retail chains however he did not name specific retailers.
According to Trustwave majority of the machines in operation in the US are manufactured by Verifone but they found the same issue to be present in all major terminal makers.
A spokesman for Verifone said that a password alone isn’t enough to infect machines with malware. The company said, until now, it “has not witnessed any attacks on the security of its terminals based on default passwords.” As an afterthought the spokesperson added that Verifone said retailers are “strongly advised to change the default password.”

The fault however lies with the retailers as they should be securing their own machines. Consider one case Henderson investigated recently. A nasty keystroke-logging spy software ended up on the computer a store uses to process credit card transactions. It turns out employees had rigged it to play a pirated version of Guitar Hero, and accidentally downloaded the malware.
“It shows you the level of access that a lot of people have to the point-of-sale environment,” he said. “Frankly, it’s not as locked down as it should be.”
Continue Reading...

Advertising

Advertise Here

Blogroll

About