Tuesday, 17 November 2015

You Can Now Remotely Turn Off Any Android Smartphone/Tablet By Sending SMS

This is how you can remotely turn off Android smartphones/tablets by sending a SMS

Android is the most popular and widely used operating system in the world, which offers a lot of features to its users. To make Android more user friendly, a lot of apps are being developed to run on this OS.

In this article, we will discuss about the apps that will allow you to remotely shutdown Android smartphone/tablet by sending  a single SMS that you will set in the app. This feature comes in handy if you have forgotten the phone at home and want no one to attend your calls. Similarly, there are many situations in where we want to remotely shutdown our Android smartphone.

To configure the secret code or SMS in your Android device, you just need to follow the simple guide below:

Steps To Remotely Turn Off Any Android Smartphone/Tablet By Sending SMS

It is important to note that the app works only on the rooted Android smartphone/tablet. Visit here to get complete guide to root your Android smartphone/tablet.Now download Remote Power Off zip file in your computer. Extract the zip file in your computer and navigate to Folder > System>App> Remoteturnoff.apk.Then transfer the Apk file in your Android deviceBe sure to enable Install from unknown sources in Settings > Security > Unknown sources.Install this app now in your Android smartphone/tablet by tapping the Apk that you have transferred.   First, type the current password that is null and then type the new password and confirm it again by clicking on change secret code.Grant this app superuser permission by going to superuser app.It’s done. You now just need to send the secret code as a SMS to your Android smartphone/tablet when you want to remotely shut it down.

By following the above steps, you can send a secret code and easily turn off your device without touching it, or without being near to your Android smartphone/tablet and also without using the Internet.


Continue Reading...

Monday, 16 November 2015

Tired With Slow WiFi? Your Good Old FM Is Here To Help You

wi-fm-fm-radio-wifi
Short Bytes: Facing slower WiFi speed due to network congestion and signal interference is a very common problem. However, researchers have found a way to use FM Radio signals to solve this problem.
Living in a crowded neighborhood can seriously affect your WiFi speed. For those who don’t know, you and the people living around you, have a limited wireless frequency channels that are used by the WiFi networks to move the data. So, if there are more people around you using WiFi, there are good chances that the networks will overlap and kill your speed. This is a very common problem, specially if you are living in a apartment. To solve this problem, Aleksandar Kuzmanovic, associate professor of electrical engineering and computer science at Northwestern University, is trying something new.

He describes the root cause of this problem as none of the WiFi devices have a reference point about the activities of the other WiFi devices. This lack of coordination and timing creates trouble, that results in poor WiFi performance.
To enable the devices to communicate with each other, researchers have developed the first system for WiFi devices that coordinates without any human involvement and operates over FM frequency.
Also read: Your WiFi Router Has a Superpower You Didn’t Know
Sharing the information via RDS (Radio Data System) data of FM, WiFi networks can operate with coordination. Talking to All Tech, Kuzmanovic says, “Devices are able to detect that there is this particular repeating structure and hence they are all able to independently come to the conclusion that hey, this must be the beginning of this particular RDS signal sequence that’s repeating in time.”
Thus, the RDS signals act like a clock for WiFi devices that harmonizes the operations of multiple devices. In a recent research paper, the researchers called this technique Wi-FM and outlined one possible scheduling algorithm.
Kuzmanovic expects his idea to be further used and spread by the industry giants like Google and Apple in their operating system.


source:fossybyte.com
Continue Reading...

Sunday, 15 November 2015

These Two Guys Spent 40 Years Making “World’s Only Real Jetpack”

jetpack-aviation-1

Short Bytes: JB-9 JetPack, from the company JetPack Aviation, has showed off its jet turbine powered machine. In a demonstration of its capabilities, it was flown around the Statue of Liberty and over the Hudson river.
The company JetPack Aviation calls itself the maker of world’s only real jetpack. This device is a backpack powered by a jet turbine that lifts a person into the air. On the other hand, it’s being called the real jetpack as the other jetpacks are powered by streams of water, rockets – not jets.
The jetpack is approved by the Federal Aviation Authority and US Coast Guard, and took 40 years to develop – according to the website. David Mayman, company’s CEO from Australia, flew this JB-9 jetpack around the Statue of Liberty and over the Hudson river to show-off a demo.
David Mayman has spent the last 10 years working with Nelson Tyler, a Hollywood-based inventor. They have designed prototypes of this jetpack and “spent millions of dollars and thousands of hours secretly developing the device.”
On their website, JetPack Aviation says: “We believe a JetPack should be just that — a jet turbine powered backpack that is capable of vertical takeoff and landing (VTOL), is extremely light and small and can easily be carried around by the pilot.”
The JB-9 can fly more than 100 miles per hour and can reach heights up to 10,000 feet for about 10 minutes. Watch the video below:
click here
Tell us your views in the comments below.

source:fossybyte.com
Continue Reading...

Thursday, 12 November 2015

Meet the world’s lightest metal which is 99.99% air

Researchers have created a metal for Boeing which is 99.99% air and light enough to balance on top of a dandelion.

A few years ago, researchers created the world’s lightest metal for Boeing, and now the airline has shown it off for the first time in this new video. Called microlattice, the material is 100 times lighter than styrofoam but is as rigid as metal, which means that it has some pretty exciting applications.

Microlattice was inspired by the structure of our bones, which are very rigid on the outside but mostly hollow on the inside, which means they can’t be easily crushed, but are lightweight enough for us to carry around all day. The new Boeing metal mimics this, and despite its rigid exterior, it has a 3D open-cellular polymer structure, which means its structure is 99.99 percent air.

The lattice in the metal is made up of interconnected hollow metal tubes – constructed from nickel, in the case of the prototype. Each of these tubes has a wall thickness of just 100 nanometres, which is 1,000 times thinner than human hair.

These open cells in the structure give microlattice huge compression potential, which means it can absorb a whole lot of energy.

Here is the video explaining the phenomenon behind it:

In the video above, Sophia Yang, a research scientist at HRL Laboratories (a joint Boeing venture), explains that the microlattice could be used in something like the egg drop challenge, to protect an egg being dropped from 25 storeys with very little material required. By comparison, you’d need to wrap an egg in around a metre (or just over three feet) of bubble wrap to keep it safe when dropped the same distance.

That means that it could help Boeing build aeroplanes that are significantly lighter – but just as tough – as today’s models. “In the future the material could help Boeing save a lot of weight make aeroplanes more fuel efficient,” Yang explains.

HRL laboratories also does research and development from General Motors, asCore77 reports, so we may see the material pop up in automobiles in the future too.

Continue Reading...

The quest for eternal life makes a Russian scientist inject himself with 3.5-million-year-old bacteria

Russian scientist injects himself with 3.5-million-year-old bacteria to get immortality

People can go to any heights in the quest to have an eternal life. A Russian scientist, Anatoli Brouchkov, who injected himself with 3.5-million-year-old bacteria has said how it has helped him work longer and avoid the flu for the last two years. He has made a very strange claim connecting ancient bacteria to immortality.

Anatoli Brouchkov is the head of the Geocryology Department at Moscow State University. His job involved the study of soil, frozen rock, and underground masses, which became a very distinct area of study later.

The discovery of Bacillus F that managed to survive for millions of years, the scientists later decided to test it on mice and fruit flies in order to see what effects it would have on them. While it allowed older mice to reproduce after they had gone past their prime, it also showed regenerative properties in plants.

In the hope of uncovering the key to finding eternal life, Brouchkov put himself forward as a guinea pig for the controversial experiment and injected himself with Bacillus F.

“I started to work longer, I’ve never had a flu for the last two years,” he told The Siberian Times.

“It wasn’t quite a scientific experiment, so I cannot professionally describe the effects,” he added.

“But it was quite clear for me that I did not catch flu for two years.”

“Perhaps there were some side-effects, but there should be some special medical equipment to spot them. Of course, such experiments need to be conducted in clinic, with the special equipment and statistics.”

“Then we could say clearly about all the effects.”

While there is still no solid proof that this bacteria holds the key to everlasting youth, or even a new flu vaccine, Brouchkov’s methods are undoubtedly controversial wherein the quest for eternal life is becoming an increasingly trendy pursuit among scientists.

During a dig at Mammoth Mountain in the Sakha Republic, a region in Northeast Russia in 2009, the scientists had found the Bacillus F bacteria. It’s home to the Yakuts, a Turkic people who have unintentionally been consuming Bacillus F for generations.

“After successful experiments on mice and fruit flies, I thought it would be interesting to try the inactivated bacterial culture,” Brouchkov explained.

“Besides, the permafrost is thawing, and I guess these bacteria get into the environment, into the water, so the local population, the Yakut people, in fact, for a long time are getting these cells with water, and even seem to live longer than some other nations. So there was no danger for me,” says Brouchkov.

Well, only time will tell if the never ending human quest for eternal life can be solved with Brouchkov’s miracle bacteria. For now, he can continue to Iive flu free knowing that he is/was host to a very old microorganism.

Continue Reading...

Is Learning To Code Hard ?

Is learning to code hard?

The answer would be yes,  its very hard, many people are willing to learn coding but the problem is they don’t know from where they need to start and they need to start coding.

Also Read: Is coding the most important language in the World

The real problem is people think that coding is going to be hard to learn. Well what we are willing to say is, if your willing to learn coding then you need to choose any one of the basic coding languages and Google coding tutorials on that particular language.

- Advertisement -

Also Read: Top website to learn coding 

If you practice regularly then its going to be really easy and interesting with lots of fun! Here is a short video for inspiration.

Continue Reading...

Tuesday, 10 November 2015

This 9-Year-Old Boy Is An Accomplished Hacker And CEO Of A Company

reuben
Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of his own company Prudent Games and recently attended the Ground Zero Summit as a ‘special ambassador.’
His name is Reuben Paul and he’s just 9 years old. This third grader is already an accomplished hacker, cybersecurity expert and an app developer. What’s more is the fact that he’s the CEO of his company Prudent Games. Last year at the Ground Zero Summit, Paul delivered his keynote on Children’s Day. This year, he was the youngest attendee at one of the biggest hacker conferences in the world.
He’s attending the conference being held at the Ashok Hotel in New Delhi as a ‘special ambassador’ to encourage the kids to learn more about cybersecurity. Quoting his hero Spiderman, Reuben says, “With great hacking skills you get power, and with great power comes great responsibility.”
“With all the data breaches, cyberbullying and other kinds of attacks happening on the Internet, it’s important for us to teach kids and educate them on the dangers so they can protect themselves.”














g0Summit-Reuben-Paul-Keynote-Address-620x412
Speaking at the conference, chief guest Home Minister Rajnath Singh called the Worldwide Web the fifth dimension of security and maintaining it should be our top priority.
Reuben spoke at the conference and mentioned Cyber KungFu, telling about his experiences as the youngest Do KungFu 2nd degree black belt.
His company Prudent Games makes games that combine fun with educational content. “Reuben was selected for the Gifted and Talented programme (run by the Texas education system) and had to make a game. The others made boardgames and such like, but Reuben who is passionate about video games, decided to come up with one,” says his mother Sangeetha, an IT professional herself.
Prudent Games also made an app that shows children how to come up with secure passwords. His another app tells the basics of Bruteforce attacks used to crack passwords.
His father mentions that when he was just five, he used words like firewall and he was totally surprised. “At age five I introduced him to Scratch, and then by six we were looking at real world programing and security concepts,” Mano Paul said.
Apart from hacking and app development, Reuben spends time with his friends and takes gymnastics, swimming, and Kung Fu lessons.
With inputs from iDigitalTimes

source: fossybyte.com 

Continue Reading...

Thursday, 5 November 2015

Quantum Internet is Coming, Quantum Teleportation Sets New Record

Short Bytes: The scientists have teleported photons across a distance of 63 miles (102 kilometres), four times the previously held record. This Quantum Teleportation research could lead to a “quantum Internet” that could build the base for the next-gen encryption.

Anew distance record has been established, relaying the quantum data through fibres by breaking the previous record for quantum teleportation. This act of transferring data to a different reminds me instantly of Star Trek where objects were teleported without moving it through space.

Researchers at the National Institute of Standards and Technology (NIST) involved the transportation of quantum of information contained in one photon to another photon over a 102 km distance to an NIST laboratory in Colorado.

Data carrying photons were considered unsuitable for long distance communication as during a standard trip over a distance in an optical fiber, 99 percent of photons never complete the trip. But, this time, a single photon carrying quantum data completed such long distance with the help of newer detectors.

“Only about 1 percent of photons make it all the way through 100 km of fiber,” NIST’s Marty Stevens says. “We never could have done this experiment without these new detectors, which can measure this incredibly weak signal.”

Continue Reading...

Teen Who Sold His App to Yahoo for $30 Million, Leaves Company to Study More

Short Bytes: Nick D’Aloisio has left Yahoo to concentrate on his computer science and philosophy studies at Oxford. Just two years ago, he sold his news-aggregation app called Summly to Yahoo for $30 million. Since then, he was working as a part-time product manager at Yahoo.

Yesterday, we told you about Michael Sayman, one of the youngest employees at Facebook and how he wrote a #1 iOS app and got hired by Facebook. In this article, we are telling you about another teenager who sold his news-aggregation app to Yahoo for $30 million two years ago. Now, Nick D’Aloisio, the founder of this app called Summly, has left Yahoo, according to TechCrunch.

Nick D’Aloisio took this step to focus more on his computer science and philosophy course at Oxford. Earlier this year, it was reported that he was dividing his time as a part-time product manager at Yahoo and Oxford University’s philosophy classes.

Nick sold his app for $30 million to the tech-giant when he was just 17. Yahoo worked upon his app to build Yahoo’s News Digest app that won an Apple Design Award last June.

“Nick has taken time to focus on his studies; he continues to be involved with Yahoo,” said a Yahoo spokesperson when asked about D’Aloisio. They are still in talks, but things aren’t the same as they were before.

According to the sources of TechCrunch, it’s possible that D’Aloisio is more interested in working in his own startup. Along the similar lines, last year he said in an interview: “I’ve no idea where I’ll be in five years. I could be at Yahoo … I could be at university … I could be doing another company. But wherever I am, I want to innovate and create companies or ideas that I’m super-passionate about.”

What do you think about this step taken by Nick D’Aloisio? Tell us in the comments below.

Continue Reading...

Hackers can access your PC with this 10 second Fitbit hack

Fitbit health trackers can be hacked in 10 seconds and allow hackers to access your PC

The health care gadgets market is growing phenomenally and Fitbit health tracker leads the band. In fact they are the most popular devices among people who like to track their steps and exercise. However, the very fitness band that you use to track your health can be used to gain access into your PC with a malware and wreak havoc.

Fortinet researcher, Axelle Apvrille discovered vulnerability in Fitbit device that opens it up simple malware attacks. More importantly, the malicious code that can be sent to a Fitbit device without the user’s knowledge can then infect a computer used to sync data collected by the wearable.

According to Apvrille, Fitbit can be easily hacked over Bluetooth and needs just 10 seconds to be delivered. A hacker only has to be in the proximity of the target (Bluetooth range) to send the code and then wait for the target to connect his or her Fitbit to a PC. According to Apvrille, the malicious code can survive even if Fitbit is restarted after it is transmitted to Fitbit.

Once that’s done, the second phase of the attack commences, as the malicious code can infect the computer with a backdoor, trojan or any other malicious program.

“An attacker sends an infected packet to a fitness tracker nearby at Bluetooth distance then the rest of the attack occurs by itself, without any special need for the attacker being near,” Apvrille said. “[When] the victim wishes to synchronize his or her fitness data with Fitbit servers to update their profile … the fitness tracker responds to the query, but in addition to the standard message, the response is tainted with the infected code.”

He continued, “From there, it can deliver a specific malicious payload on the laptop, that is, start a backdoor, or have the machine crash [and]can propagate the infection to other trackers (Fitbits).”

The ease of delivery – the attack can be completed in under 10 seconds – means that hackers can easily gain access to a computer via the Fitbit device, potentially wrecking havoc.

Apvrille informed Fitbit about the exploit in March 2015. It does not appear that Fitbit has patched the vulnerability however, Apvrille said he had found no indications of the bug being exploited in the wild.

Apvrille will offer a proof-of-concept demonstration video at the Hack.Lu conference in Luxembourg.

Fitbit reached out to us with this statement :

“As the market leader in connected health and fitness, Fitbit is focused on protecting consumer privacy and keeping data safe. We believe that security issues reported today are false, and that Fitbit devices can’t be used to infect users with malware. We will continue to monitor this issue.

Fortinet first contacted us in March to report a low-severity issue unrelated to malicious software. Since that time we’ve maintained an open channel of communication with Fortinet. We have not seen any data to indicate that it is currently possible to use a tracker to distribute malware.

We have a history of working closely with the security research community and always welcome their thoughts and feedback. The trust of our customers is paramount. We carefully design security measures for new products, monitor for new threats, and rapidly respond to identified issues. We encourage individuals to report any security concerns with Fitbit’s products or online services tosecurity@fitbit.com. More information about reporting security issues can be found online at https://www.fitbit.com/security/.

Continue Reading...

Wednesday, 4 November 2015

Self-driving Cars Must be Programmed to Kill, Study Says

Short Bytes: As we advance more and more in artificial intelligence and related technologies, we must solve some complex ethical problems. A similar dilemma is faced in the case of self-driving cars and how they should act in case of unavoidable accidents. Should they kill more people on the road to save the car occupants? Or, should they protect others on the road by sacrificing the life of occupants? 

Every big automobile company is preparing its artillery with the technology that will help them to produce autonomous vehicles. Even the companies like Google and Apple are hiring engineers and designers to make their ‘next big product’.

In the future, self-driving cars will soon dominate roads and as the tests suggest, the autonomous vehicles take extra security precautions. According to the reports, very few minor accidents that took place on the road during tests, were caused due to the mistake of other vehicles or people on the road. This brings us to a very interesting scenario that deals with an event of unavoidable accidents.

How should a car act in such scenario? Should it minimize the loss of life on the road at the cost of occupants’ life, or should it protect the car occupants at all costs?

These ethical questions need to be answered when we talk about a future with self-driving cars.

Also read: First Apple Car Coming in 2019, According to Report

“Our results provide but a first foray into the thorny issues raised by moral algorithms for autonomous vehicles,” says said UAVB and Oxford University scholar and bioethics expert Ameen Bargh who advised to change the course of the car to reduce the loss of life.

However, deontologists argue that “some values are simply categorically always true”.

“For example, murder is always wrong, and we should never do it, even if shifting the trolley will save five lives, we shouldn’t do it because we would be actively killing one,” Bargh said.

The members of UAB’s Ethics and Bioethics teams are doing a lot of work to deal with such type of questions. One way to tackle this problem is to act in such a way that it reduces the loss of life. The results of the tests are interesting and people are comfortable with the idea that self-driving cars should be programmed in such a manner that they reduce the death toll.

As we advance more and more in AI and technology, we must find answers to these ethical and philosophical questions and find the ways to arrive at a worthy solution.

Source: MIT Technology Review

Continue Reading...

Sunday, 1 November 2015

Experts Explain The Car Hack Process – How to Hack a Car

Short Bytes : The recent Fiat Chrysler car hack exposed the vulnerabilities and the extent to which insecure IoT can be dangerous. The hacking of remote devices connected via internet of things is not new, and neither is the car hack. We notified you guys how Shodan-The Hacker Search Engine scouts for the devices connected to the internet and discloses the identity information making them open to attacks. Today, we share more about car hack with the help of an informative video.

Hacking the car or parts of it was never that easy, but not very tough either. The engineers have long told about the modern cars’ susceptibility to get hacked. I was looking out for the news about car hacks and stumbled upon this year-old YouTube video that explains why you should be scared if you have the latest IoT enabled car. The cars who have a cloud server, accessible by mobile networks like Bluetooth or wi-fi, are especially prone to an incursion- what we commonly refer to as a car hack.

The car hack video is an episode of Phreaked Out in which the top security researchers of the car hacking world highlight the loopholes in the sophisticated car technology. Security researcher Mathew Solnik gives the live demonstration of himself hijacking the car’s computer system and getting a complete control over the machine.

He was able to control the car’s engine, brakes and security system wirelessly through Controller Area Network or CAN bus network. For car hack, he used some microcontroller chips, a telematic control unit, a GSM transceiver and of course, his thorough research and expertise over the subject.

Check out the car hack video and see for yourself:

Source: Motherboard

Continue Reading...

Advertising

Advertise Here

Blogroll

About