N8Technologyhub

Saturday, 26 December 2015

How To Open Banned Websites WIth Proxy Sites ?


Open Banned Websites WIth Proxy Sites

There are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open banned sites.

How To Open Banned Site ?

1. Open www.incloak.com in your browser.
You can also use any proxy site from list below
2. After that enter the URL of the site which you want to open like below.
Open Banned Websites WIth Proxy Sites
3. Now click the Hide Me button and enjoy.

12 Simple Steps To Become A Hacker

By VIkram Kumar
Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

Thursday, 24 December 2015

Tech2Talk: How has the year 2015 been for technology in India?

Tech2Talk: How has the year 2015 been for technology in India?
Representational Image: Reuters

We’ve finally reached the end of the year. Over the course of the past 12 months, a lot has transpired in the tech world. Looking back, there have been several announcements and developments that have been significant. When we sat down to discuss the year gone by, each one of us had tons of points to make from across verticals of interest. Here is our list of the most prominent events that took place in 2015.
Naina Khedekar
Net Neutrality debate
One of the hottest ongoing debates in the tech sphere that kept internet free-thinkers and activists busy through the second half of the year was net neutrality in India. ‘Save the Internet’ website was set up to rebuke threats like Airtel’s zero platform and Facebook’s Internet.org that it tenaciously tried to bring back to India repackaged as Free Basics. Facebook is now trying to create a movement of sort and coax people into supporting its ‘free Internet’. There is no free lunch and many people (read me) believe Facebook is simply trying to bring its shrewd business strategy under the pretext of connecting billions of people, and Internet will never be the way we’ve known it.
xiaomi_makeinindia
Make in India
PM Narendra Modi’s ‘Make in India’ initiative has garnered immense interest ever since it was announced, especially in the mobile phone sector. Throughout the year, we saw several Chinese as well as some Indian phone vendors jump onto the ‘Make in India’ bandwagon. The list includes Asus, Micromax, Gionee, Vivo, Oppo and more. There have been investments pouring in to start assembling mobile phones here. Yes, it’s assembling as we still don’t possess the facilities to start complete manufacturing.  However, there needs to be a start in some form, and this will give a headstart to interactions from component players and suppliers in India.
Karrishma Modhy
Driverless cars
Who would have thought that this would eventually be a reality! This year, Google, Apple and other automotive companies announced plans for driverless cars. Even though, it will take a while for these driverless cars to work effortlessly, these vehicles are said to bring about a great deal of changes. Not only is it said to save thousands of lives every year, carbon emissions will be reduced along with traffic! In 2012 Google founder Sergey Brin stated that the Google Self-Driving car will be available for the public in 2017, and in 2014 this schedule was updated by project director Chris Urmson to indicate a possible release from 2017 to 2020!
The Oculus Rift headset (AFP)
The Oculus Rift headset (AFP)
Virtual reality
Virtual reality is said to ‘change the world’ in 2016. A technology, where we can strap on hardware onto our heads with earphones, and havea much more immersive experience than mere two dimensional viewing. The aim is to bring this tech into our homes and make it a part of gaming, entertainment, healthcare, communications, and might revolutionise how we perceive things. 2015 witnessed the official release of many VR headsets such as Samsung’s GearVR, HTC’s Vive, and a lot of us have got a taste of Oculus Rift’s headset although an official launch is still awaited. Let’s see what’s in store for 2016!
Pranjal Kshirsagar
Internet of Things and Big Data Analytics
Internet of Things(IoT) moved out of labs and test cases to go mainstream this year. Google acquired Nest, the smart thermostat maker, in January 2014 to fuel its connected homes aspirations. This year, we saw the Nest 3rd generation get released. Taxi services such as Uber and Ola cabs have reaffirmed the importance of Big Data. These services use Big Data Analytics to predict the geographical nature of demand for a cab. It might be perceived as the silver bullet to solve all decision-making woes, but analytics needs to be applied to specific situations to generate insights. Otherwise, it’s just a needle in the haystack.nest2Mergers and Acquisitions in tech
The tech industry really shined in terms of M&A deals in 2015 – the biggest year in deals since 2000, find market reports. With changing dynamics in the technology landscape due to influx of SMAC (Social, Mobile, Analytics and Cloud), even prominent companies such as Apple, IBM and Microsoft looked to lap up the smaller, more agile players to develop domain expertise. Industry reports peg the year-to-date M&A deal values at $449 billion in the US alone. The deal of the year, however, still remains the slightly complex $67 billion Dell-EMC saga – that will see closure sometime in the second or third quarter of 2016.
Sheldon Pinto
Mobile Payments
Talk about mobile payments and the first thought that comes to mind are services like Apple Pay, Samsung Pay and Android Pay. However, none of these have made it to India yet (due to technical challenges), but there are plenty of software options sprouting locally with services such as Paytm, FreeCharge, Citrus Pay, M-pesa and many more. So while we wait for the software giants to make their foray into India (seems to be taking a bit too long), the growth of mobile payments remains gradual at best and mostly app driven. While the IDC’s graph does show an exponential rise in numbers for Asia, the bottom-line remains that awareness needs to increase and the big guys need to step in to make mobile payments easier to use.
Image: Reuters
Image: Reuters
Drones
Drones sound like fun abroad, but out here in India, they would simply be limited to really small toys or to the ones used for “official” surveillance purposes. After Amazon tried its delivery system with drones abroad, it is hard not to imagine much better applications for drones in the future than just toys for consumers. India however seems stuck with permissions and while things may change in the near future, buying your own drone (for whatever purpose) and flying it around will still get you into trouble with the local cops. Hopefully those restrictions are lifted, but there are other issues related to privacy that fall into place that will shoot them down.
Nimish Sawant
Processors and mobile computing
In the processor space a lot happened this year on the desktop as well as on the mobile side of things. Intel finally released its 6th generation Skylake series of processors for desktop and mobile systems. Core M, Intel’s processor lineup for thin form factor (fanless systems) got a boost in the arm with multiple SKUs of the same being released. On the mobile front, we saw new launches by Qualcomm only towards the end of the year. So effectively, we’d see phones sporting these processors only next year. MediaTek Helio processors were seen on a lot of mobile phones this year with talks of it planning to release a 10-core chipset this year – which didn’t happen. This year was dominated by instances of the ‘Snapdragon 810 chipset’s heating issues’, which we have highlighted in some of our smartphone reviews. Qualcomm specially, has a lot riding on its next flagship – Snapdragon 820 SoC – as it marks the return of customised Qualcomm CPU cores. This year, Samsung’s Exynos 7000 series and Exynos 5000 series processors have been particularly impressive. Intel’s smartphone chipsets have an uphill battle in the coming year.
housing home
Are we living in a tech bubble?
Short Answer: Yes.
Long Answer: This year has clearly been one where technology products and services have gone from just being visible online to being seen on large hoardings, on TV commercials, as front-page advertisements in newspapers and so on. Startups are Sexy! But how much of this money is actually made by the startups themselves? In 2015 alone, Indian startups have received over $5 billion in investment from 490 investors. The billion dollar valuations are honestly a double edged sword.
Take Housing.com for instance. which had a literal marketing blitzkrieg in the initial half of 2015, but in August there were reports that 600 employees would be laid off. Zomato was in talks to lay off 10% of its staff. Tiny Owl laid off 112 employees and their founders were held hostage in their own offices. Flipkart and Snapdeal’s big discount days seem cool during festive seasons, but is that helping these companies generate massive profits? Take any service or app for instance, and chances are you will find its clones too. How long will such a model survive?
To quote Evan Spiegel, the founder of Snapchat, it’s not a question of ‘If’ but ‘When’ this tech bubble will burst. We are all aware of the Dot com boom and bust cycle of early 2000s. The current tech startup scene is an eerie reminder of the same. Corrections and/or consolidations are inevitable.
Nash David
Microsoft is back in style
Microsoft has turned itself into a young and agile company. With Windows 10, it transformed the way we looked at an operating system. While the industry was looking at the smartphone market and envisioned a world powered by mobile computing, Microsoft had missed the race.
Windows Phone wasn’t a formidable challenge to the operating systems out there. It was a distant third with Android and iOS capturing most market share. With Windows 10, irrespective of existing preferences, Microsoft has successfully changed the way we perceive it. It blew everyone’s imagination when it demoed the HoloLens, Continuum and the possibilities with Windows 10. Microsoft even introduced products such as the Surface Pro 4 and the Surface Book, which has an edge over competition in terms of its spec sheet. Moreover, it has gotten closer to the open source community and surprisingly also used iOS and Android devices at product demos. That was a welcome change, and we’re looking forward to see how Microsoft continues this transformational journey through the next year!
Windows-10
2G, 3G and now 4G
It’s finally happening. We’ve all cribbed through the years about how our internet connections are dependable. And how we lag way behind international averages. The developed world complains about the available speed when they’re in the 10s of megabytes. And here we are debating about call drops, choppy networks and spectrum scarcity. Over the past year, all of these debates have been centred around the lack of internet connectivity. And this year, the focus of conversations were around 4G. High speed internet is finally arriving here. Telecom operators are gearing up towards the emergence of high speed 4G services in India. It is expected to change the way we evolve.

PM Narendra Modi handles his own Facebook, Twitter accounts: PMO

5
1

According to information provided by Prime Minister’s Office (PMO), replying to queries for his own social media account, PM Modi himself posts and comments on his personal Facebook, Twitter and other accounts.
According to a report by Business Standard, the PMO said Modi himself that he manages his personal Twitter and Facebook accounts. But, when it comes to the PM’s official social media accounts, his office says those are managed by the PMO. However, the PMO didn’t give any reply to a question on who helps the PM send tweets in foreign languages such as Japanese, Hebrew, Mandarin, Russian and Korean.
In addition, it was pointed out that Modi and his officers use internet at speeds of 34 Mbps. This might be the reason why the PM is so quick at replying to any comments. Also, the PM has never received any mobile phone from the PMO.
This year, Facebook put out India-specific lists about the most talked about topics, places and new sticker packs. Needless to say, Indian PM Narendra Modi was the most discussed topic on Facebook followed by E-commerce boom, A.P.J Abdul Kalam and the movie Baahubali.
PM Modi has also made it to the list of most discussed politicians globally. While US President Barack Obama gets the top spot, PM Modi comes ninth in the global list. Donald trump takes the second spot, Dilma Rousseff is third and Hillary Clinton on the fourth position.

Cyber security pitfalls to watch out for in 2016

0
0
24 Dec 2015 , 16:29

Executives from every large technology corporation are making a beeline to be part of the government’s growth agenda and enable India leapfrog from the Industrial age to Information Age. Consumer durable companies and brands want to reap long term dividends by building loyalty among the world’s single largest millennial population. Central to the growth strategy of consumer facing businesses, startups and Venture Capital funding new industries is a little 3×5 inch real estate constituting Indium tin Oxide, Glass & Rare Earth metals – the mobile phone. After all, India is the hottest smartphone market.
With the growth of mobile phones, especially Android devices, we foresee a spate of new threat vectors targeting mobile devices. Easy availability of mobile hacking kits on Tor, a flurry of new banking and FinTech entrants, and the race to launch applications quickly would create the perfect storm for security practitioners.
Here are some of our top security trends on 2016.
Increased Mobile Malware: We will see mobile malware targeting banking applications to steal SMS or your one time passwords. The first wave would be known financial malware targeting Android platform and rooted devices. Meet SPITMO – an acronym for Spy Eye in the Mobile – this Trojan malware gets installed onto your phone if you download a rogue or cloned app on your Android device. SPITMO can read your SMS messages and forward them to a command center, without you suspecting anything.
Ransomware: Have you ever felt debilitated when your phone battery drains out and you are not able to use your device? Well, consider this – you have your phone in your hand, it is fully charged, but you are unable to access it because you are held at ransom by a cyber-criminal! Ransomware, as the name suggests are targeted attacks through your social media or email account where you are duped into downloading a file you would otherwise not have. The file contains custom code to take access of all your phone data and lock the device with a new password. The cyber-criminal asks for a ransom, to be paid via prepaid card or funds transfer in return of the ransomware password to unlock your phone.
Targeted attacks: We foresee specific targeted attacks against large public sector organizations and fraudsters targeting more technology organizations, healthcare companies and banks. The cost of a data breach will continue to rise in India and cyber-security may increasingly become a Board Room concern in India as well.
iOS breached: A big reason to remain an Apple fan is the security the iOS platform brings to all applications. If you are a developer then you know the stringent quality and security standards Apple subjects you to before making your application available on the iOS App store. Well, it seems the high walls of iOS security can be breached. The 2014 celebrity photo leak showed that iCloud was vulnerable to brute force attacks, i.e. there was no limit to the number of password attempts a human or bot could make. In 2016 new iOS vulnerabilities will continue to emerge. A significant vulnerability was detected this year when Apple devices could be infected while charging them connected to public computers or unknown computers.
Unsecure Wi-fi and Man in Middle Attack: You are at a public space and connect your device to the first open and free Wifi connection. If the Wifi Router settings are not appropriately set, it is easy for a third party to read all your communication data while you are on that connection. This would mean that your username and password are vulnerable during that session. Make sure you avoid doing online banking or quick online shopping on these public and Wifi that is not secure.
Credential theft and phishing through social engineering: Are you always eager to accept a LinkedIn or Facebook invite from strangers? Social engineering has gone mainstream as a way to spoof you into revealing your credentials. We foresee a large number of unsuspecting users fall prey to likable friend and network requests. Links shared via social media have a far higher likelihood to be clicked or downloaded and at risk are your credentials and data.
Newton’s third law sums it up: ‘every action has an equal and opposite reaction’, while technology is the ‘action’, cyber threats are the ‘reaction’. As technology advances, the threats that loom around it will also evolve simultaneously. Stay safe, stay protected!
The author is Trusteer Leader, IBM.