Monday 29 August 2016

Ivory Honors Nominees List [VOTE Pearl Okoroma as the mostbeautiful]

WhatsApp Image 2016-08-23 at 11.43.57 PM


IVORY honour award is here again, We have a lot contestant hoping to win an award, i present to you a lady i can guarantee you wont waste your vote upon, her name is PEARL OKOROMA  
All you have to do is to visit the following link and search for her name in the most beautiful category then click submit and share with your friends you can also vote as much as possible..
http://www.sirkenayo.com/ivory-honours-nominees-list-vote/


Continue Reading...

Wednesday 17 August 2016

It’s not all about ransomware – keyloggers are still alive and well!

Ransomware gets a lot of attention these days, and understandably so.
It’s the digital equivalent of a punch in the face: there’s no doubt what’s happened, and the crooks leave no stone unturned to make sure you know it.
Some ransomware not only creates some sort of HOW-TO-PAY document in every directory where there are scrambled files, but also changes your desktop wallpaper so that the payment instructions are visible all the time.
You can argue, however, that less visible malware attacks are even worse, especially if you only find out about them days or weeks after they started, and they include some sort of data-stealing payload.
Like the range of malware that SophosLabs researcher Gabor Szappanos (Szapi) was reviewing recently while working on a paper about Word-based attacks.
Szapi was looking at a particular subset of Word-borne hacks: what are known as exploit kits.
Exploit kits are pre-packaged, booby-trapped files that automatically try to take over applications such as Word or Flash as soon as you open up one of the malicious files.
The idea is to bypass any pop-up warnings that would usually appear (such as “you need to enable macros,” or “are you sure you want to install this software”) by crafting the exploit file so it causes a controllable crash in the application that just loaded it.
Szapi noticed that all of the exploit kits he’d covered in his paper (going by names like Microsoft Word Intruder, AK-1, AK-2, DL-1 and DL-2) had been used at some time to distribute data-stealing malware known as KeyBase.
His first thought was along the lines that “KeyBase ought to be dead by now, because it’s been around for a while, it’s well-known, and the author himself took it offline long ago.”

Sadly, however, the KeyBase Trojan is alive and well, even though it’s no longer openly available.
KeyBase is primarily a keylogger, meaning that it keeps track of what you type, collects up the data, and regularly uploads it to the crooks using innocent-looking HTTP requests.
When would-be cybercrooks set it up, there’s a point-and-click configuration system, so they don’t need any technical knowledge to decide what parts of your digital lifestyle to spy on:

Amongst other things, they can also keep track of what passes through the clipboard:

Monitoring the clipboard gives away plenty of information about your business, because you generally use the clipboard for items of immediate importance, such as copying-and-pasting text out of emails into documents, or vice versa.
That makes the clipboard a handy signal of interesting data about your business, such as this example data from KeyBase’s cloud-based servers:

KeyBase and other malware families like it are examples of Crimeware-as-a-Service (CaaS).
That’s where a group of technically-savvy criminals provides the servers and the control panels, renting out access to allow any number of non-technical crooks to jump right into the cybercrime scene.
Once a team of crooks has inside information on your business, such as your email passwords and a list of the people you do business with, they are well-placed to start bleeding you for money.
With ransomware, you generally know beyond doubt what has happened; you have a short list of choices of what to do next; and you have a firm price in Bitcoin staring you in the face.
But with system-sniffing malware like KeyBase to teach them how to login to your accounts, crooks can correspond with your creditors and debtors using your email address; change account numbers to divert payments; alter invoices; place bogus orders…
…and then, because they control your logins, they can cover their tracks (for example by deleting sent emails that you’ll know you didn’t write) to keep their swindle going as long as possible.
As we wrote in a recent article about a similar keylogging malware family known as HawkEye:
This is effectively […] high-tech crime available to low-tech criminals.
They [can buy] in the necessary booby-trapped documents; [buy] in the keylogger; [pay] someone to send very small quantities of spam; and then [settle] down to carry out old-fashioned, targeted deception and fraud.

What to do?

  • Patch promptly. Word exploit kits such as those mentioned above usually rely on security holes that have already been been patched.
  • Keep your security software up-to-date. A good anti-virus can block exploit kits, keyloggers and other malware in numerous different ways.
  • Beware of unsolicited attachments. This can be hard if your job is business development and the email is a Request For Quotation, but avoid opening just any old document.
  • If your email software supports it, use 2FA. That’s short for two-factor authentication, those one-time codes that come up on your phone or on a special security token. With 2FA, just stealing your email password isn’t enough on its own.
  • Have a two-person process for important transactions. Paying invoices and changing account numbers for remittances shouldn’t be too easy. Require separate approval from a supervisor, so you always get a second opinion when company payments are at stake.
Continue Reading...

Saturday 13 August 2016

How to Trace a Skype Message

You can make and receive voice, video and text messages from anywhere in the world using Skype. Any two computers or mobile devices connected to the Skype network can connect. Skype only displays the username of the person on the other end of the call, providing you with no way of determining where the call originate from. There could be many reasons why you might want to trace a call made via Skype such as harassing messages or trying to find a missing family member. By using your computer's command prompt and some online tools, you can determine a caller's IP address' physical location.

Step 1

In the Start menu or at the Start screen type "cmd" into the search box and press "Enter," which should launch the Command Prompt window. You can also find the Command Prompt utility in the Programs menu under the Accessories folder.

Step 2

Open Skype and sign in to your account. If you want to trace a recent call you should see the username in your “Recent Contacts.” Otherwise you may need find them in your contacts or search the Skype directory.

Step 3

Click on the contact that you wish to track and their profile information should appear in main window. Click on “Call” and wait for the person to answer. In order for you to trace their IP address, the contact must answer.

Step 4

After the contact answers the call type "netstat" into the Command Prompt window and press "Enter." You do not need to speak to them to complete the trace. You can also complete a trace by sending a file that takes a least a minute to transfer to the contact. The command prompt will create a series of IP addresses. In the Skype entry you will see the IP address of the contact listed under “Foreign Address.”

Step 5

Using one of many IP address-tracking websites you can trace the IP address such as What Is My IP Address, Whois.net, or IPaddress.com (links in Resources).

Tips

    Finding the IP Address will not usually give you exact physical location of the person making the phone calls or sending messages. It will give you the state, city, and ZIP code of the person, and law enforcement agencies can use the IP address to find suspects.

Continue Reading...

Friday 12 August 2016

Here is How to Find Out Who Has Been Accessing My Email Account

In the exciting age of digital technology, unfortunately, Internet users have become more vulnerable to phishing and hacking. Some of us have even experienced our email accounts being hacked. The obvious signs of this include emails appearing as though they have been read when you haven't read them yet or being locked out of your email account. If you think that your email account has been hacked, take sufficient precautions, such as changing your password. Next, you can attempt to find out who has been using your email account via their Internet protocol, or IP, address.


Step 1

Determine if someone has hacked into your email account. Check whether spam emails have been sent or forwarded via your email account, if any messages have been deleted or if unread emails have been read.

Step 2

Change your password -- preferably to a stronger password that is not a real word -- as soon as you suspect that your account has been hacked.

Step 3

Contact/call the company that provides your Internet access. The company's tech support will be able to help you track down the IP address using your email. If your email has in fact been hacked, you can also request that your Internet provider launch an investigation.

Step 4

Check the IP addresses of the activity on your email account on your own. If you use Google's Gmail, you can do this in one click. Open your Gmail account and go the bottom-right corner of the inbox. Under "Last account activity," click "Details." Here, a list of the most recent IP addresses that have accessed your email will show up.

Warning

    Even if you are able to locate the IP address that is gaining unauthorized access to your email account on your own, professional hackers will cover their tracks by hiding behind a proxy server. Also, an IP address does not give you the physical address of the email hacker; it only tells you the location of the ISP providing the connection to the hacker. Your Internet provider may be able to learn more during an official investigation.

Continue Reading...

Thursday 11 August 2016

Where Do You Find the IP Address on the HP Pavilion With Windows Vista?

An Internet Protocol (IP) is a unique address assigned to any communication device that is connected over a network. Just like physical home addresses, an IP provides an exclusive identity to your computer for different systems to communicate with one another. Moreover, IP addresses are used to troubleshoot common connectivity problems among applications, video games and servers. To find the IP address from your HP Pavilion computer, execute a series of efficient steps using your Vista-based operating system.

Step 1

Go to the Windows "Start" menu. Type "Cmd" without the quotes, and then press "Enter" to launch the Windows Command Prompt. Alternatively, click the "Start" menu followed by "All Programs," then choose the "Accessories" folder and launch the "Command Prompt" entry.
Step 2

Type "Ipconfig" and press "Enter." Take note of the four sets of numbers provided within the "IPv4 Address" field. Type "Exit" and press "Enter" to end the Command Prompt session.
Step 3

Use an online service as an alternate method to find your computer's IP address. Websites such as Whatismyip.com and Ipaddresslocation.org (see "Resources") offer a simplistic way of disclosing your computer's address.
Step 4

Note or write down the four number sets located at the top of the screen. These represent your computer's IP address. An example of this would be 10.20.30.40.
 
Continue Reading...

Here is How to Find the Portal Number for My Computer

The portal number (also known as port number or IP address) of the computer is a unique series of characters that represent your computer's "home" on the Internet. Other machines have to use this series of characters to access your machine. There are two different portal numbers that you should know--your "internal" address (the address that other computers on your home network use) and your "external" address.

Step 1 
Open the "Start" menu, click on "Run," type in "cmd," and press "Enter."
Step 2
Type in "ipconfig" and press "Enter."
Step 3


Look at the line titled "IPv4 Address." This is your computer's internal portal number.
Step 4
Navigate to the What is My IP Address? website (see Resources). This number is your computer's external portal address.
Continue Reading...

Tuesday 9 August 2016

See The first ever reprogrammable quantum computer built by researchers

First Reprogrammable Quantum Computer To Bring In New Age Of Technology

According to a new study, researchers at the Joint Quantum Institute (JQI) at the University of Maryland have created the first programmable and reprogrammable quantum computer. This new study is expected to help the scientists to run numerous complex simulations and can generate quick resolutions to complicated calculations in comparison to conventional computers.
The newly developed quantum computer is only made from five atoms, and is one of the significant steps leading towards developing new devices.
“We tried to make a quantum processor of five qubits with trapped ions that is reconfigurable, and by that I mean that you can literally program algorithms into it,” Shantanu Debnath, an optical engineer, a quantum physicist at University of Maryland and the lead author of the Nature paper, from the US University told WIRED.
Debnath calls it a fundamental building block en route for large scale devices.
The academics were able to implement the quantum algorithms using laser pulses, which can be turned on and off. “It’s really the flexibility that we are aiming towards and we have done,” he said.
Debnath explains: “We demonstrated this by implementing four different algorithms and we are running more right now. In trapped ions, or any other computing platform, this had not been done before”.
The device is made up of five pieces of quantum information – known as qubits. Traditionally bits can only ever be in the state of 0 or 1, but a qubit can be a supposition of both. Quantum computing holds the logic of “superpositions” which divides it from traditional computers. This means that atoms, for example, can swirl in two opposite directions at the same time.
That kind of superposition makes quantum computing fundamentally different from traditional computers. Classical computers represent data as 1’s and 0’s, binary digits known as “bits” and represented by flicking switch-like transistors either on or off. On the other hand, quantum computers, use qubits that are in superpositions, which means that they are simultaneously on and off. This enables a qubit to basically perform two calculations at the same time.
While many groups in the past have developed small quantum computing devices, most of these have only been hard-wired to solve a single problem, and any reprogramming requires complex physics. However, this new device is diverse and easily programmable.
The researchers were able to use algorithms to perform a mathematical calculation in a single step, which a conventional computer would take several steps to complete the same tasks.
“The team implements three quantum algorithms using their systems, demonstrating the power of their control techniques,” Andrew Daley, from the University of Strathclyde physics department, told WIRED. “It’s really nice to see this being done with trapped ions, and provides an exciting platform for future developments,” said the independent researcher.
Researchers are now working on the next step which is to shrink the system to make it more compressed. “The next step is to miniaturise the system; to come up with a compact version,” Debnath explains. “This means improving the ion trap, improving the way you deliver the lasers and all your controls into the system. Also, to scale it up and have more qubits in the processor.”
The research has been published in Nature.
Source: WIRED

Continue Reading...

IBM’s Watson Artificial Intelligence discovered a rare illness in a woman suffering from leukaemia

Japanese Doctors Use AI To Detect Rare Leukaemia

IBM's Watson Artificial Intelligence discovered a rare illness in a woman suffering from leukaemia

Artificial Intelligence (AI), which is looked upon as a threat to humans, as they are rumoured to take place of humans in factories, industries, etc. in the coming years turned saviour for a patient suffering from leukaemia. Yes, you heard it right!
A team of Japanese doctors turned to IBM’s AI system, Watson for help after the treatment for an 60-year-old woman suffering from leukaemia proved unsuccessful. The AI was successfully able to find out that she actually suffered from a different, rare form of leukaemia, as the disease had gone undetected using conventional methods by the doctors.
Arinobu Tojo, a member of the medical team, told Efe news on Friday that the University of Tokyo’s Institute of Medical Science has successfully used the new method of diagnosis, which includes a computer programme capable of studying a huge volume of medical data.
Watson, which has been jointly developed by the US’ IBM and other firms, looked at the woman’s genetic information and compared it to 20 million clinical oncology studies. It later determined that the patient had an exceedingly rare form of leukaemia and recommended a different treatment which was successful.
Originally, the woman had been diagnosed with, and treated for, acute myeloid leukaemia; however, she failed to respond to the traditional treatment methods, which confounded doctors.
The conventional method of diagnosis for different types of leukaemia is based on an evaluation by a team of medical specialists after studying the genetic information of patients as well as the clinical studies available; an enormous task owing to the huge amount of data to be gone through.
Satoru Miyano, a Professor at the University of Tokyo’s Institute of Medical Science, points out that this is proof enough of the ability that AI likely has in the coming years, “to change the world.”
This is the nation’s first case of an AI saving someone’s life, emphasizing that this is “the most practical application in the field of medical and health care for artificial intelligence,” added Seiji Yamada, of the National Institute of Informatics and chairman of the Japanese Society for Artificial Intelligence.
What was remarkable was that the AI was able to diagnose the condition in just 10 minutes. Whether we would be able to see AI as a regular feature in the hospital in the coming years only time will tell.
Continue Reading...

Facebook testing public Wi-Fi in India

Express Wi-Fi : Facebook’s attempt to bring millions of Indians to Internet and create a rival to Google

Facebook is reported testing it free Wi-Fi service called Express Wi-Fi in remote areas in India. Express Wi-Fi is Facebook’s latest ‘noble’ attempt to bring millions of Indians to Internet and more specifically to Facebook.
Facebook had earlier tried to circumvent the net neutrality laws by introducing a service called ‘Free Basics’ with a aim of providing free Internet (read Facebook) to Indian. Free Basics created a huge public outcry both in India and aboard forcing the Government of India to ban it.
Now with Express Wi-Fi, Facebook is again attempting to bring millions of Indians to its social networking under the garb of providing free Internet. However, unlike Free Basics that violated principles of net neutrality and left us with a sour taste, Express Wi-Fi may succeed if it is really kept transparent and free.
 
Facebook has teamed up with ISPs and entrepreneurs by providing software that will help them provide Internet service in the rural areas that can then be accessed via public Wi-Fi hotsposts.
Express Wi-Fi already had a trial with Indian state owned BSNL with about 125 rural Wi-Fi hotspots.
However, Facebook faces a stiff competition from Google which already has made a headway into India by starting to offer free Wi-Fi to Indian railway stations. At the last count, two million Indians were using Google’s free Wi-Fi service at 23 rail stations. Google aims to connect about 10 million Indians to this service by this year-end. The company also has plans to increase this number to 400 stations in the country.
If it is not about forcing Facebook down the Indians throat, Express Wi-Fi great news for India.
Continue Reading...

This is how to retrieve lost space after installing Windows 10 Anniversary Update

Finally, the Windows 10 Anniversary Update was released on August 2, 2o16. The Windows 10 Anniversary Update was rolled out to the users via Windows Update and the Media Creation Toolkit. The new update includes a number of UI improvements to the Start menu, notification center, taskbar, and overall dark theme. Windows has also added a new Ink feature, changes to Cortana, extension support for Edge browser and many more.
While all the new features and improvements look fine, did you know when you update it might end up losing anywhere between 5GB and 20GB of storage space, based on how big your existing Windows installation currently is. That’s right!
 

When you upgrade your Windows 10 to Anniversary Update (version 1607), Windows 10 automatically creates a backup of your previous build of Windows 10 to a folder called Windows.old so that users can uninstall Windows 10 Anniversary Update and revert to the previous build if required. However, it also downloads needed data to set up the new version, while also leaving behind some temporary files that were used during the process.
 
 
So, be very sure before you follow the steps to recover lost space after installing the Windows 10 Anniversary Update. It is also important to note that you won’t be able to downgrade back to your existing Windows version, if you remove these files. In other words, the only way to downgrade will be to clean-install whatever version of Windows you are running.
How to regain disk space after installing Windows 10 Anniversary Update

First, open “This PC” and right-click the C: drive to open the “Properties” screen.
By following this path, you will reach the window that allows you to delete files that are utilizing your space:

Disk Cleanup > Clean up system files (admin rights needed) > Previous Windows installations
This “Previous Windows installations” section in several cases has more than just a few gigabytes of data, so verify this option and hit the “OK” button. Based on the size, it may take a while to complete. However, once it is completed, you will be able to regain all this space. The cleanup should also get rid of your Windows.old folder from your C: drive, along with the option to downgrade to a previous Windows version.



Source: Softpedia
Continue Reading...

Monday 8 August 2016

This man hacked Tinder’s ”swipe right” feature to send invites to 200,000 women



Love Hack : Man hacks Tinder App’s ‘swipe right’ feature to send introductions to 200,000 women

Hacking is mostly done to either find bugs in a code or to make money if you are a cyber criminal. But this man from California developed a hack for love. Sebastian Stadil hacked Tinder to help him automatically ask thousands of women out on dates through the matchmaking App.
If you are on Tinder, you will know that the popular dating App requires both parties “swipe right” on profiles they like, before they are allowed to exchange messages. But Sebastian Stadil developed a string of code to automatically swipe right and send a few messages of introduction to as many women as possible. His hack was so successful that he was able to send intros to more than 200,000 women. Out of the 200,000 women, Stadil was able to date 200 women during a four-month period last year.
Sadly, even after dating 200 women, Stadil says he has not found true love. In fact, the Silicon Valley software engineer did land a few second and third dates due to his hack but nothing seemed to work out by his own admission. “I guess I’m perhaps a little bit too picky for my own good,” Stadil told CTV News Channel on Thursday.
 
 
Asked about the reason to create the code for auto intros on Tinder, the 31-year-old says he devised the program after an amicable breakup, in an attempt to keep up with his ex’s romantic exploits on Tinder.
“When I was comparing the success that she had with the success I had, I felt I needed to get some sort of competitive advantage,” Stadil said.
Stadil’s hack is simple, using his programming skills he put together a code that would automatically swipe right on Tinder. He also programmed the app to contact potential matches on OKCupid. “It kind of automates a lot of the repetitive process of reaching out to people online,” he said.
Before embarking on his ambitious dating spree, Stadil tested his code like a true pro by testing it using different profile photos, pre-written opening messages and automated responses.
Stadil says he found 12,000 “matches” with women willing to talk to him on the site, and spent $6,000 on coffee dates. He went on 150 first dates, 50 second dates and 17 third dates.
After tasting success with his hack, Stadil has now dropped the idea of spamming Tinder in search of “the chosen one.” Instead, he says he’s gone back to dating through “traditional sources.”
This man hacked Tinder's ''swipe right" feature to send invites to 200,000 women
Continue Reading...

New iPhone 7 Plus leak shows blue colour variant with dual camera and no headphone jack

iPhone 7 Plus video is leaked

 

Like every year, this September will see the launch of iPhone 7 by Apple. Ever since the first news about iPhone 7 surfaced, lots of rumours, leaks and genuine news has been doing rounds on the Internet. But for the first time, a YouTube Channel  UnBox Therapy seems to somehow have got hands on the upcoming iPhone 7 and made a video comparing it with the iPhone 6 Plus.
The only confirmation that the leaked video shows is that iPhone 7 will not have the standard 3.5mm audio headphone jack. But there are a lot of things included in this phone which you will know in the leaked video at the end of this post.

Comparing iPhone 7 Plus with its predecessor, iphone6 Plus

iPhone-7-Plus-2

The new iPhone 7 Plus Blue colour looks pretty cool

iPhone-7-Plus-Blue

iPhone 7 Plus looks slimmer to iPhone 6 Plus

iPhone-7-Plus-3

No white antenna lines

iPhone-7-Plus-1

Another angle

iPhone-7-Plus-side-view

Finally the leaked iPhone 7 Plus video :

If you are waiting for Apple’s iPhone 7 launch, this is the best piece of evidence about how the new iPhone 7 will really look.
Regardless of what it looks like or what it is called, Apple is expected to debut a new iPhone at some point in September. A recent rumor pegs preorders for the device commencing on Sept. 9 shortly after a launch event, with shipments beginning later in September.
Continue Reading...

Sunday 7 August 2016

Apple paid $50 billion to iOS app developers in July

Why it pays to an iOS App developer! Apple’s App developers earned over $50 Billion In July

 

We have time and again written about how going ethical with coding is not only helpful to the society but also financially rewarding. We have already reported how it pays to be an ethical hacker. Now it turns out that if you are an iPhone app developer, you could end up being a millionaire. No, we are not lying, iOS app developers earned $50 billion in just one month!
Apple CEO Tim Cook took to Twitter on Wednesday to announce that App Store had earned more than $50 billion for developers in what has been a “record-breaker” July 2016 for the Silicon Valley giant.


He tweeted that Apple had generated the highest-ever monthly billings, as well as paid out the most money to developers in July compared to any other month since the birth of the App Store in 2008. However, the 55-year-old CEO chose to remain tight-lipped about the details pertaining to the revenue generated.
 
 
The popularity of Pokemon GO has been speculated to be the reason behind Apple’s “record-breaker” month. The game, which was launched on iOS and Android, last month in the U.S. and a number of other countries throughout the month has taken over the world and has shattered several records. The game, which has been downloaded an estimated 100 million times, is said to bring in $10 million in daily revenue in the iOS and Google Play app stores. Apple has already earned its rewards even if the Pokemon GO craze dies, say some reports.
In January this year, Apple announced in January that customers spent at least $1.1 billion on apps including in-app purchases. For every $1 that the customers spend in the App Store, Apple earns about 30 cents.
Cook said that the next 12 months will see revenue from Apple’s services category, (the App Store, iCloud, iTunes Store, and AppleCare), reach the “size of a Fortune 100 company.”
Continue Reading...

Anti-piracy group wants all Operating Systems to block pirated downloads

Apple, Google, and Microsoft should block pirated torrent downloads in their operating system says anti-piracy think tank


An anti-piracy think tank wants Apple, Google and Microsoft to block pirated content natively on their operating systems to deter piracy. According to a new report published by Black Market Watch and the Global Initiative against Transnational Organized Crime, the think tank wants Windows 10, iOS, Mac OS X and Android operating system to have a voluntary or mandatory blocking of pirated content on the operating system level.
The think tank’s idea is not new. Last year when Windows 10 was being tested for a beta launch by Microsoft, rumours were rife that the final Windows 10 OS would be equipped with a built-in piracy kill switch. However, luckily for torrent lovers, that did not happen.
The rumours originated from a single line in Microsoft’s Service Agreement which allows the company to download software updates and configuration changes that may prevent people from “playing counterfeit games.” The Microsoft ToS technically allows it to block people from playing pirated games across Windows 10 and other services, but the Redmond based company has not implemented its ToS until now.
 
However, this week the issue was highlighted again in a report published by Black Market Watch and the Global Initiative against Transnational Organized Crime, which made several recommendations on how online piracy could be tackled in Sweden.
The think tank feels that banning pirated content at the OS level could deter active pirated downloads and cut piracy by more than half.
“Other players that possess the potential ability to limit piracy are the companies that own the major operating systems which control computers and mobile devices such as Apple, Google and Microsoft,” one of the main conclusions reads.
“The producers of operating systems should be encouraged, or regulated, for example, to block downloads of copyright infringing material,” the report adds.
Though the report is only a reference guide, it does however foretell a scary scenario where the operating system will decide what a user should and should not download.
Source: TorrentFreak
Continue Reading...

Saturday 6 August 2016

Torrentz.eu follows KickassTorrents, shuts down

Torrentz.eu, the Mega Torrents Search Engine Shuts Down

2016 is a bad year for torrent websites and the torrents community as a whole. Just weeks after one of the most popular torrents website, KickassTorrents was shut down, another Torrents community icon, Torrentz.Eu has mysteriously shut shop.
It has been exactly sixteen days since US Department of Justice announced the arrest of Kickass Torrents’ admin in Poland and seizure of KickassTorrents domains like Kat.cr. Now, Torrentz.eu, the Internet’s biggest BitTorrent meta-search engine, has shut down, according to messages displayed its home page.
At the time of writing, the Torrentz.eu displays a message that reads “Torrentz was a free, fast and powerful meta-search engine combining results from dozens of search engines.”
Trying to run a search, or clicking any link on the site changes that message to “Torrentz will always love you. Farewell.”
Trying to run a search, or clicking any link on the site changes that message to "Torrentz will always love you. Farewell."
Its not just the most popular Torrentz.eu domain, in fact, all Torrentz domains feature the same page. This includes the Torrentz backups .ME, .CH, and .IN. The site’s HTTPS version features the same messages.
Torrentz.eu was never a torrents website but a very popular mega torrent search engine. It was so popular that we had listed it in our most popular torrents websites for 2016 and before its abrupt shutdown, Torrentz.eu had #186 Alexa rank.
The site was launched in July 2003 by an individual named Flippy. The site’s purpose was to index torrents from several large portals and aggregate all the different trackers. This allowed users to download torrent files with multiple trackers in their source, speeding up downloads and preventing dead links in case servers went down.

Continue Reading...

Friday 5 August 2016

HEIST attack : Hackers can steal your confidential data on SSL/TLS sites

HEIST Attack Can Steal Confidential Data Including Banking Credentials from HTTPS-Encrypted Traffic

 

We have been taught that the using of  HTTPS enabled website is safe from hackers hence most banks, email providers and other service providers use HTTPS encrypted websites. However, a new attack demonstrated at the Black Hat Conference proves otherwise.
Called the HEIST Attack, this new technique can attack the SSL/TLS and other secure channels purely in the browser to expose encrypted passwords, email addresses, Social Security numbers and other sensitive data.
Two Belgian security researchers, Mathy Vanhoef and Tom Van Goethem  presented their latest work at the Black Hat security conference in Las Vegas. They named as HEIST, which stands for HTTP Encrypted Information can be Stolen through TCP-Windows.
The exploit of the HTTPS cryptographic scheme dupes end-users by hiding a JavaScript file in a web ad or directly on a webpage. This can be done right on the website if the attacker owns the site, or via JS-based ads if the attacker needs to embed the attack vector on third-party sites.

The most deadly attack scenario is the second one, when the attacker sneakily embeds malicious JS inside an ad, which is shown on your banking portal or social media accounts. Once the malicious payload is executed it will try and fetch content via a hidden JavaScript call from a private page that holds sensitive information such as credit card numbers, real names, phone numbers, SSNs, etc.. This page is protected in most cases by HTTPS.
Secondly, as the content is retrieved, using a repeated probing mechanism of JavaScript calls, the attacker pinpoints the size of the data embedded on the sensitive page.
HEIST basically brute-forces the size of small portions of data that get added to a page as it loads. As such, the attack can take a while. If the page is loaded using the next-gen version of HTTP, the HTTP/2 protocol, the time needed to carry out the attack is much shorter because HTTP/2 supports native parallel requests.
HEIST can be called a side-channel attack on HTTPS because instead of breaking the SSL encryption it leaks data exchanged in HTTPS traffic leaving it open to hackers for malicious gains. As data is transferred in small TCP packets, by guessing the size of these packets, an attacker can easily read their content.
The two presented their findings[pdf]at Black Hat on Wednesday.
HEIST attack breakdown
The researchers showed how a side-channel attack could affect the way responses are sent at the TCP level, which could then grab a plaintext message. “Compression-based attacks [such as CRIME and BREACH]can now be performed purely in the browser, by any malicious website or script, without requiring network access,” the researchers said.
The researchers said that to block HEIST attacks, the user can disable support for either third-party cookies or JavaScript in the browser. However, this is not possible in today’s world as most browsers use JavaScript to perform important functions. Even banking websites use JavaScript popups for passwords and OTPs.
Continue Reading...

Hackers Trick Tesla S’s Autopilot Into Making Obstacles ‘Disappear’ And Crash

Researchers fool Tesla Model S AutoPilot System


The debate surrounding the reliability of autonomous vehicles has been going on for a long time. If that was not enough, the potential danger associated with hackers successfully influencing the underlying software of a self-driving car has cropped up.
Researchers from the University of South Carolina, Zhejiang University in China, and Qihoo 360 (a Chinese security firm) has found a potential flaw in Tesla’s AutoPilot semi-autonomous driving system. The team was able to exploit weaknesses in the system that lead researcher and USC Professor Wenyuan Xu said “highly motivated people” could use “to cause personal damage or property damage.”
The group will report its findings at the DEFCON Hacking Conference in Las Vegas, which used off-the-shelf products to carry out the hack.
 
According to Wired, “Tesla’s autopilot detects the car’s surroundings three different ways: with radar, ultrasonic sensors, and cameras. The researchers attacked all of them, and found that only their radar attacks might have the potential to cause a high-speed collision. They used two pieces of radio equipment—a $90,000 signal generator from Keysight Technologies and a VDI frequency multiplier costing several hundred dollars more—to precisely jam the radio signals that the Tesla’s radar sensor, located under its front grill, bounces off of objects to determine their position. The researchers placed the equipment on a cart in front of the Tesla to simulate another vehicle.”
“When there’s jamming, the ‘car’ disappears, and there’s no warning,” Prof. Xu says.
The ultra-sonic sensors are a lot easier to target, although at lower speeds. In order to tamper with the Model S’ self-parking and summon features, the researchers used an estimated $40 worth equipment – an Arduino computer, an ultra-sonic transducer, and a function generator. The researchers plan to demonstrate how they can fool a self-parking Tesla into completely missing an obstacle in its path.
The jamming of the Model S ultrasonic sensor, deployed in Tesla’s for discovering nearby objects for actions such as self-parking, saw sound signals sent from a DIY ultrasonic jammer based on an Arduino board. They would swamp the system to subdue the real echoes bouncing off an object to remove them from the autopilot’s vision. If they had let it, the Tesla would collide with the obstacles.
However, the Tesla’s camera systems were the most resistant to attacks. In order to blind the cameras, the researchers shined lasers and LEDs at them. Also, Xu’s team was able to kill a few pixels on the camera sensors. But AutoPilot simply blacked out and warned its driver to take the wheel when they tried to block the camera.
Based on the comments of Prof. Xu, it’s more significant to compel Tesla to add protections to AutoPilot instead of simply breaking the system.
“I don’t want to send out a signal that the sky is falling, or that you shouldn’t use autopilot. These attacks actually require some skills,” Xu told Wired. “[Tesla] need to think about adding detection mechanisms as well. If the noise is extremely high, or there’s something abnormal, the radar should warn the central data processing system and say ‘I’m not sure I’m working properly.'”
Appreciating Prof. Xu and his team’s work, Tesla told Wired in a statement that “We have reviewed these results with Wenyuan’s team and have thus far not been able to reproduce any real-world cases that pose risk to Tesla drivers.”


Source: Wired
Continue Reading...

Handy Apps that will make your Travels Easier

 

Travel Hack : Make your travels easier with these five handy Apps

Whether you are a keen traveller, or someone who takes the occasional trip, the actual travel part can sometimes be the most dreaded part of the experience. Thankfully, the phrase ‘there’s an app for that. . ‘ is not only an advertising gimmick, but a reality that not only benefits digitally savvy travellers, but anyone else planning or making a trip. See below for our list of 5 handy apps that will make your travels easier:
  1. Tripit

The best way to describe Tripit is that it is like having your own personal travel agent in your pocket. The application is available for free on both Android and iOS app stores and organises your trip using travel information from your confirmation emails. Everything from flights, hotels, rental cars, and even bookings for events are converted into a handy single itinerary for your entire trip. Users simply forward their confirmation emails to the app and it does the rest. Travel plans can also be shared easily so the app is also ideal for co-ordinating group travel as well.
  1. Citymapper

Knowing where you’re going and when is important, but so is knowing how to get about when you get to your destination. This is where the brilliant Citymapper comes in; the app is a comprehensive alternative to Google Maps and is an easy to use travel tool. Citymapper provides details of over 30 cities worldwide including such information as real time departure times, disruptions, cycle routes and Uber integration.
  1. Mobile Games

Not only is the app store is full of games in every category, from role-playing to brain training, most sites offer mobile versions of their popular app games. By downloading the games of your choice before travelling you’ll be able to have a back-up entertainment plan to keep you occupied during delays or periods of waiting.
For those who enjoy the risker side of gaming there a whole load of online casino and bingo sites such as www.bingosites.uk that offer mobile games, just always remember to pack your charging cable!
  1. Duolingo

The wonders of technology have transformed most aspects of modern travel and the language barrier has not escaped attention. Duolingo is one such attempt and the language app is already used by over 70 million people worldwide. The app is free, user friendly, and its computer game-like levels and rewards are an easy way to pick up basic vocabulary and grammar for any trips abroad.
  1. Time Out

Time Out is a great app that makes it easy to find events and things to do wherever you are in the world. The app is a directory of everything from bars and restaurants to attractions and concerts, some of which can also be booked through the Time Out app.
The five handy app suggestions above a good armoury to have on your smartphone to make travelling easier, and its all thanks to the technology that our trips can now be that little bit easier!
Continue Reading...

Tuesday 2 August 2016

How to use Whatsapp on your computer

WhatsApp has been very successful worldwide with its social networking suites, and that is the reason why Facebook bought it in the largest business deal. It has the facility of mirroring the conversations and messages from your mobile device to your PC with WhatsApp Web.

WhatsApp Web is simply an extension of your phone: the web browser mirrors conversations and messages from your mobile device - this means all of your messages are still live on your phone. The WhatsApp user's handset must still be connected to the Internet for the browser application to function.

Simple steps needed to run WhatsApp Web on your PC Browser are as follows:-

1. Download and install latest version of WhatsApp on your device or update your WhatsApp app.

2. Open WhatsApp application on your device and tap on the three vertical dots on the upper right corner (options). Tap on the WhatsApp Web option from there.

3. Now open WhatsApp Web (https://web.WhatsApp.com/) in your PC browser.

4. Android QR Code scanner will activate in your device with WhatsApp app. And your Pc browser will show a QR code sign.

5. Now scan the QR sign on the PC with your android phone by adjusting the frame provided so as to contain the QR code in the PC browser.


6. The scan will detect the QR code and Bling! You can see in the PC browser, all your messages and conversations from your device. Now WhatsApp is on your PC now, ready to use.

Continue Reading...

How to create fake files, videos, audio and more on your Windows on any size

We have been posting a lot of useful and prankful tricks with your system. And this is one the best cause you could use it fool your friends or you could use it in much better ways with your own imaginations or you could just write a program to create a numerous number of files on others computer.

Also Read: How to create fake files, videos, audio and more on your Windows on any size
First go to start and search for "cmd"
Now right click and choose "Run as Administrator".
Now Type the following command  "fsutil file createnew C:\techiax.mp4 1073741824" without quotes

Here fsutil is the command used for file management, volume management and more.
file createnew is default command to create a new file
Also Read: Receive Gmail notifications on your desktop
C;\ is the location to store the file which is C drive.
techiax.mp4 is the name of the file with video extension. You could also create doc files like techiax.doc or audio files like techiax.mp3 or you could use any file format you know of including android apps and other operating systems.
1073741824 is the number of bytes in 1GB. So this would create the file of 1GB. You could define any size of your choice in bytes.

Try it with different views of your own imaginations and share with us your results in comments.

Continue Reading...

Hackers capture a PC user wanking, demand $10,000 ransom for not leaking the video

http://techworm.vijayprabhu.netdna-cdn.com/wp-content/uploads/2016/07/hacker-keyboard-2-970x0.jpg?44fa43

Ransomware infected computer captures the owner wanking, hackers demand $10,000 ransom for not leaking the post

Note : This post is NSFW hence reader discretion is required before you proceed to read the article.

One fine summer day, Matt opened an email. Little did he know that the contents of the email could give him a shock of his life. The contents of the email sent by hackers contained a clipping of Matt wanking in front of his computer. The email further read that if he agreed to pay a ransom of $10,000, the hackers would not release the video clip to public. However, if he failed to pay them the ransom, they warned that they would release the video on his Facebook timeline and mail it to his all friends.
It so happened that unknown to Matt, his PC was infected by a ransomware. The ransomware was secretly filming Matt’s intimate activities when he was in seventh heaven doing what he was doing, and relaying it back to the ransomware creators server somewhere in Africa.
“There I was in all my glory,” he told triple j’s Veronica & Lewis. “There was an email saying they were going to release footage to all my Facebook friends and people I worked with if I don’t pay them money.”
“Initially I laughed,” says Matt thinking that the hackers from Africa may hardly know his friends in Australia. He immediately shot of a mail to the hackers daring them to release the footage.
But all his false bravado was wattered down when the hackers sent a second mail with a screenshot of his Facebook friends, and personal details from his website. He realised the threat was very very serious. They asked for $10,000. He began negotiating.
The hackers, who wrote every second email in French, wanted Matt to send the money to Mali in west Africa. He negotiated with them to bring down from $10,000 to $3,000.
But then he suddenly changed his mind. He posted this message on Facebook:

Ransomware infected computer captures the owner wanking, hackers demand $10,000 ransom for not leaking the post
“I put up a Facebook post and let everyone know I was hacked,” he said. “I let them know they got me in a private moment and they threatened to release a video unless I paid them money. I let everyone know if they get a link to be careful if they click on it, but if they do watch the video, then enjoy.”
“It’s not something to be ashamed of,” Matt added. “It wasn’t an easy post to put up.”
Going public with his private moments was a brave thing Matt did instead of succumbing to the hackers. However, he should have taken a cue from Mark Zuckerberg and done this to his webcam while enjoying his private moments.
Mark Zuckerberg covers his MacBook's camera and audio jack with pieces of tape
Continue Reading...

20 really tough questions that Google asks during Job Interview

Can you answer these 20 difficult questions asked in Google interviews?

Getting a job in Google is a dream come true for millions of engineers. Google has been ranked by job-community website, Glassdoor as ‘best workplaces’ year after year. Many job aspirants aspire to get a job in Google but getting one seems to be the toughest assignment according to Glassdoor.
We already know that Google takes on board only the best talent available in the world over and therefore it is well known for asking difficult and tricky interview questions. If you are an engineer and want to try your luck at Google, this post is for you. Here we’ve compiled a list of some of the most difficult questions asked during job interviews at Google for a variety of job profiles.
Remember only a handful of job candidates actually made it according to Glassdoor. Even if you are not trying to get into Google, it would be good to take up the challenge of solving these really tough questions.
  1. Question for a Software Engineer : Implement a binary tree and explain it’s function.

  2. Question for an Associate Product Manager : What is the marginal cost of a gigabyte in Gmail?

  3. Question for a Software Engineer : Create a cost model that allows Google to make purchasing decisions on to compare the cost of purchasing more RAM memory for their servers vs. buying more disk space.

  4. Question for a Software Engineer : Write an iterator over multiple collections.

  5. Question for a Software Engineer : How do you check if a URL is bad really fast in Google server. (The point is for the user not to notice the lag in the checking)

  6. Question for a Senior Software Engineer : Develop a solution to convex hull and state its complexity.

  7. Question for a Senior Software Engineer : How many golf balls can fit in a school bus?

  8. Question for an Engineer : If you were given the land prices in the Bay Area, what would you pick, the mean or the median? Why?

  9. Question for a Product Manager : What happens from the point when you type in a URL in your browser to the point the page gets displayed?

  10. Question for a Product Manager : If you host a celebrity website which displays ads and suddenly notice a drop in traffic to your site/clicks on ads, how do you root cause the issue?

  11. Question for an AdSense Account Manager : What is the next billion dollar idea for Google?

  12. Question for a Programmer : How would you implement an MS Paint clone? (What objects and methods would you need, how would they draw on the canvas, and what UI elements would be necessary?)

  13. Question for a Patent Docketing Specialist : You have 7 balls. One weighs more than the others (not significantly) (You have a scale, like the scales of justice. Describe how to find the weighted ball only using the scale twice.)

  14. Question for a Product Manager :  If you have a vacant field and add one flower and the number of flowers doubles every day and at the end of 45 days, the field is full, on what day is the field half full?

  15. Question for a Rich Media Campaign Manager : How many people do you think are using their cell phone in the entire world at this very moment?

  16. Question for Mobile Product Manager : Do you know what “Peak Oil” is? Yes? good. You are the product manager of Peak Oil for Google. What do you do?

  17. Question for a Software Engineer : Design a system or algorithm to catalog all of the worlds books?

  18. Question for AdWords Representative : How many buses are there in Hyderabad?

  19. Question for Senior Software Engineer : Write a probability formula to tell how many bits will be changed when 1 is added to a 32 bit binary number.

  20. Question for Industry Leader : How do you think Media Agencies make money?

     

    Are they really tough?

    source:Techworm

Continue Reading...

Monday 1 August 2016

In UAE Using VPN could get you in prison & a fine upto $545000

You can face fines of up to $545,000, if you get caught using a VPN in the UAE

Sheikh Khalifa bin Zayed Al Nahyan, President of the United Arab Emirates (UAE), has passed new federal laws covering IT crimes, among which is the mere use of a VPN (Virtual Private Network). This means that if you are using a VPN to access blocked sites in the UAE to secure web traffic from prying eyes, it could land you in jail. The fines can be as little as $136,000 and as high as $545,000 and even prison is an option.
The UAE previously had a law covering the use of VPNs as part of an internet crime, but the UK-based VPN and privacy advocate Private Internet Access said that this change is enabled to go after anyone and everyone who uses VPNs to access blocked services, which is basically the fraudulent use of an IP address.
VPNs give users the option to connect to private networks all over the world and hide their exact locations using proxy servers and connections. These services make it very easy for those users to circumvent filters put in place by governments and ISPs in regards to their physical location. Currently, a majority of the population in UAE is using this VPN service to mainly access popular applications or services that are inaccessible from the Gulf countries. These services include WhatsApp, Snapchat, etc. These mainly include communications based apps that use Voice over IP (VoIP) technology. VPNs are also often used in combination with the Tor anonymity network to access websites hidden on the Dark Web etc.
 
 
VoIP “over-the-top” apps have long been a problem for telecoms operators worldwide, since users can just use this service to speak to their loved ones and avoid paying international calling rates etc. They can just speak to them on Skype, WhatsApp, Facebook Messenger, Viber or Snapchat. However, the law makes UAE the very first government in the world to regulate on behalf of these companies and to curb the use of these VoIP apps in order to bring business back to the local telecomm companies.
Etisalat and du are the only two companies in the world that have been granted licences by the UAE government to offer commercial VoIP services, which can be expensive. The move will stop citizens from selecting what services they wish to use. Instead of enabling citizens and residents to have choice about what services they want to use, the government is helping UAE’s telecom providers in upholding a monopoly on voice calls made in the country.
According to other reports, the UAE government was also planning to block services like WhatsApp, Snapchat, S
kype, etc. or at least their calling feature in the country, which has been criticised by the experts. However, UAE’s telecom regulator stands by the Etisalat and du, and has said that these apps should be banned mainly due to security concerns.
Using VPN in UAE could get you in prison & a fine upto $545000
Continue Reading...

Reasons why ATM PINs have 4 digit Code? Here is the reason..

The really interesting reason why ATM PINs have a 4 digit code

 

You walk into your friendly neighborhood ATM kiosk and swipe your card. You then punch in a 4 PIN code to authenticate yourself and proceed to withdraw money. You may have been doing this mechanically since the day ATM was introduced but have you given a thought why ATM PINs have a 4 digit code?  No! Then read on..
Automated Teller Machines (ATM) were first introduced in 1967 and now have emerged as a best option to disburse cash. Instead of visiting your bank and waiting in a long queue to withdraw money, you just have to swipe your ATM card, punch in your secret 4 digit PIN and take away the money you require.
But if someone was to find or steal your card, the only barrier protecting your money is your 4-digit ATM PIN. Ever wondered why most PINs have only 4 digits? Given that an ATM dishes out money wouldnt the manufacturers of ATMS have been wiser to introduce a longish PIN say six digit or eight digit one. Isn’t that why our email passwords are also expected to be 6 letters or more?
 
You see there is a bit of story behind it. ATM was invented by a wellknown Scottish inventor John Adrian Shepherd-Barron, the man who pioneered the development of the ATM machine. Barron was born in Shillong and was son to a Wimbledon ladies doubles champion, Dorothy Barron. When testing out his invention, Barron had also proposed a 6-digit PIN.
However, the first person to use his invention was his wife, Caroline. We all know that behind every successful man is a woman, and Caroline apparently rejected the idea of using a six code PIN for her husband’s invention because she could only remember the numbers up to four.
When Barron came up with the idea when he realised that he could remember his six-figure army number. But he decided to check that with his wife, Caroline.
“Over the kitchen table, she said she could only remember four figures, so because of her, four figures became the world standard,” he laughs.
Reportedly, 6 numbers stringed together were too much information for her to recall.
Although, there are many banks nowadays that offer 6 digit PINs for security purposes, shouldn’t those of us using 4 digit PINs be thanking Caroline? It gets tough to recall those 4 digits at times, imagine what 6 or more would do to us?



Source: Techworm
Continue Reading...

Smartphone Cases To Endure (Almost) Any Drop

These 5 smartphone cases can survive (almost) any drop

Dropped a newly bought smartphone? Or scared to take it anywhere due to the fear of dropping it? Not anymore. In this article, we are going to provide you several options to keep your smartphone safe from drops, dust, rain, and the extreme conditions faced by industrial workers, first responders, extreme sports enthusiasts, and even parents.
Provided below are 5 smartphones cases that have survived phones after dropped, pummelled, and tested to the maximum!
1. Ballistic Hard Core
The Ballistic HC series is designed with four protective layers. For your most demanding activities, it features an optional outer layer for use, a soft silicone shock absorbent layer, a screen protector, and a clip-on attachment. This case unlike many of the protective cases, only allows you to turn the smartphone facing inward, toward your body.
While it is thicker than many selections, it does include four separate layers of protection. To see how this case performed when pushed to the limits, check out the video of the “Uncut live footage of the new Ballistic HC Case for the iPhone 4”.


2. Tank by Case-Mate
Designed to meet or exceed the standards of the U.S. Military, the Tank is created with a rough polycarbonate exterior and a soft, cushioning silicone interior. It also features a holster clip and a retractable screen.
The case is tested to tolerate drops, shocks, vibrations, rain, sand, wind and dust, which makes it perfect for environmental workers with life-threatening working conditions.

The company reported that 67% of iPhone failures are due to cracked screens in Case-mate’s product testing video “Tank Takes a Beating.”
Well, you should be safe, if you can’t even crack your smartphone by running it over with a car (seen in the video). The Tank study reported that the case when compared to the leading brand was 2.5x more impact resistance.

3. G-Form Extreme
This XTREME iPhone 5 Case by G-Form features the company’s patented Reactive Protection Technology™, which “stiffens on impact in order to absorb over 90% of the force from an impact” raising the bar of the case to a new level.
The case offers two more layers of protection: an inner TPE insert for more shock absorption plus the unbending outer polycarbonate shell.

The open frame allows full use of the touch screen. It is shock-proof, pocket-friendly, which is made possible by low-profile RPT ™ accents. The raised edges on the front side give extra protection to the screen.
When Felix Baumgartner set the record by jumping from 128,000 feet, G-Form was motivated to raise the testing of its iPhone case to new heights. And, yes they did. The company dropped their Extreme iPhone Case from a balloon 100,000 feet in the air.
Check out the video below to see the interesting result.
4. Otterbox Defender
Otterbox has an extensive range of rugged cases for smartphones and tablets, especially the ones from the Defender series.
This case for the iPhone comes in three parts: a silicone cushioning inside, a polycarbonate outer casing, and a thick, durable clip.
The design of the case allows you to place the smartphone facing inside or outside: you can turn the screen facing outward so you can see your calls, messages, and alerts, or give the screen of the device extra protection in extreme conditions. It also includes covers for the smartphone ports and buttons.

In the video “Otterbox Defender Series 23 Floors Ultimate Drop Test” one man drops his smartphone 23 floors from his hotel room.
Watch the video to see what this device is really capable of.
5. Tough Xtreme by Case-Mate
While Case-Mate has lot of rough cases available, we take a look at this one in the Tough Xtreme series. There are cases for Samsung Galaxy S3 and the iPhone as well as the iPad Mini. The picture below is one for the T-Mobile Nokia Lumia phone.

It has a multi-layer outer casing made of DuoFlex and PolyCore, as well as it features a snap-on frame to support the sides and front. The DuoFlex is designed to provide cushioning and a hard yet comfortable grip.
This layer also protects the smartphone’s ports. The PolyCore layer is a hard inner shell, which cosily holds the device and provides long-lasting protection.



Source: hongkiat
Continue Reading...

Advertising

Advertise Here

Blogroll

About