Saturday, 26 July 2014


DIFFERENCE BETWEEN CORE i3, CORE i5, CORE i7

Core i3:

  •  Entry level processor.
  •  2-4 Cores
  •  4 Threads
  •  Hyper-Threading (efficient use of processor  resources)
  •  3-4 MB Cache
  •  32 nm Silicon (less heat and energy)

Core i5:

  •  Mid range processor.
  •  2-4 Cores
  •  4 Threads
  •  Turbo Mode (turn off core if not used)
  •  Hyper-Threading (efficient use of processor resources)
  •  3-8 MB Cache
  •  32-45 nm Silicon (less heat and energy)


Core i7:

  •  High end processor.
  •  4 Cores
  •  8 Threads
  •  Turbo Mode (turn off core if not used)
  •  Hyper-Threading (efficient use of processor resources)
  •  4-8 MB Cache
  •  32-45 nm Silicon (less heat and energy)

Tuesday, 14 January 2014

Most Notorious Hacker Groups Ever

              The word “hack” began as a term for an “ingenious solution to a problem.” Then, with the onset of computer programming, it evolved to mean “a feat of programming prowess.” Teenage boys, attracted to the elite power they could wield, immersed themselves in a world of Internet bulletin boards and telephone systems. The lure of the next big challenge, hacker-group rivalries, political activism and personal gain all come into play in this fascinating underground world – in which everything is painted in shades of gray.
10. Chaos Computer Club

           The Chaos Computer Club was formed on September 12, 1981 in Berlin. The group gained worldwide notoriety by hacking into the German Bildschirmtext computer network and debiting 134,000 Deutsch Marks from a Hamburg bank. They returned the money the next day, having proven their point: the system’s security was flawed.
           Some members of the club were also involved in a cyberespionage case in 1989. They hacked into corporate and government computers in the US and sold the source code to the KGB. The Chaos Computer Club also used hacking to protest French nuclear testing, to publish the fingerprints of Germany’s Minister of the Interior, Wolfgang Schäuble, and to expose a government Trojan horse spyware device.
9. Global KOS


            The goal of Global kOS (pronounced “chaos”) was exactly that: to create as much online disorder as possible on a global scale. Consisting of members with handles like AcidAngel, The Assassin and Shadow Hunter, the group was responsible for providing a slew of automated hacker tools to the online community. This meant that so-called “script-kiddies,” who don’t necessarily have any true computer programming abilities, could wreak havoc without much technical knowhow.
Created in 1996 by AcidAngel, “Up Yours!” was a denial of service tool used to bring down the websites of 40 politicians, including that of Rush Limbaugh, as well as those of MTV and the Ku Klux Klan. Other tools developed by Global kOS include the kOS Crack, for cracking passwords, and BattlePong, an IRC flooding utility.
8. The Level Seven Crew
            The Level Seven Crew is believed to have taken its name from the seventh level of hell (“the violent”) in Dante’s famous poetic allegory, “The Inferno.”
      In 1999 alone, Level Seven illegally infiltrated over 60 computer systems, including those of NASA, The First American National Bank, and Sheraton Hotels. They also broke into the website of the US Embassy in China and defaced it with racist slogans to protest the United States’ accidental bombing of the Chinese Embassy in Belgrade. And they were apparently the first group to hack into a .ma (Moroccan) domain. Most of their exploits tended towards “hacktivism,” a form of online activism, rather than being motivated by personal gain. The group disbanded in 2000.
7. GlobalHell

           The hacker group globalHell has been compared to a gang of thugs; but instead of battling it out on the streets, they took their fight into cyberspace. The group is said to have attacked and destroyed data on 115 websites, caused millions of dollars in damages, and trafficked stolen information.

Ironically, globalHell was co-founded by a known Houston street gang member named Patrick Gregory, who turned to computers as a “way out” of gang life. However, he ended up transferring his gang-related activity to the web, where he helped coordinate a 60-member syndicate.

Global Hell not only carried out an online version of extortion; they also went as far as attacking and defacing the United States Army’s website, vandalizing it with the message, “globalHell will not die.” Twenty-year-old Wisconsin-based co-founder Chad Davis was arrested in 1999, sentenced to six months in prison, and ordered to pay $8,054. In an amusing twist, he has since gone on to become an independent security consultant.
6. TeaMp0isoN
            A 16-year-old hacker who goes by the online name TriCk started TeaMp0isoN in 2010. The group was responsible for hacking into Facebook, NATO, and the English Defense League. They also hacked into an email account and retrieved personal data about former British Prime Minister Tony Blair. And when Research In Motion, the company responsible for developing the BlackBerry smartphone, planned to help police during the 2011 England riots, TeaMp0isoN defaced the official BlackBerry blog, writing, “We are all for the rioters that are engaging in attacks on the police and government.”

The group also hacked the British Anti-terrorism Hotline to protest the extradition of suspects to the US. The group claims to be politically motivated, aiming to expose international governments hiding their wrongdoings.
5. Network Crack Program Hacker Group
          The Network Crack Program Hacker Group (NCPH) was formed in 1994, in Zigong, China. In 2006, the group was thought to consist of around 10 members, with four key players at the helm. It’s actually said that the group’s leader, Wicked Rose (real name Tan Dailin), works for the Chinese Army. The current size of the group is unknown.

Initially, NCPH got their kicks hacking into a large proportion of Chinese hacker association websites. Yet their attacks soon evolved. In 2006, Wicked Rose’s GinWui rootkit was employed in attacks on the US Department of Defense. And later that year, Internet security consultancy iDefense linked the group with a number of notable online attacks.

The group is also well known for the remote-network-control and network-infiltration programs they have available for download. What’s more, according Wicked Rose, NCPH is paid for their work by a mysterious sponsor. It is believed that the group’s benefactor is the People’s Liberation Army.
4. LulzSec 

One of LulzSec’s mottos is “Laughing at your security since 2011.” The group enjoys exposing security weaknesses and flaws, and their targets have included Fox.com, an X-Factor database (they released the contact information for 73,000 contestants), Sony, the CIA, and the FBI. They are said to have caused billions of dollars in damages.

In March 2012, top members of LulzSec were arrested, after their leader, code-named Sabu, turned them over to the FBI to face charges of conspiracy. A mere three months later, the group reemerged, hacking into a dating website for singles in the military. They dumped 170,937 email accounts, claiming that Lulzsec had been “reborn.”
3. Masters of Deception 
          New York hacker group Masters of Deception was formed in 1989, as a bitter rival to Texas-based hackers Legion of Doom. The groups’ one-upmanship soon evolved into all out war, with racial and class overtones adding extra tension.

To prove their hacking prowess, Masters of Deception members allegedly carried out what has been dubbed “one of the most extensive thefts of computer information ever reported.” According to reports, they broke into tough-to-crack servers and stole confidential information, which they later sold. Secret Service members carried out major raids and succeeded in indicting five top hackers in the group. They were charged with “computer tampering, computer and wire fraud, illegal wiretapping, and conspiracy.” All five pleaded guilty.
2. Milw0rm
               On June 3, 1998, a group of hacktivists known as Milw0rm targeted the computers of India’s primary nuclear facility, the Bhabha Atomic Research Center. The group operated from the UK, the US, Russia and New Zealand, and they broke through the center’s firewalls. They lifted five megabytes of classified files about India’s last five nuclear tests, erased data from two servers, and posted anti-nuclear messages on the center’s website. The implications of the hack were huge and caused major upheaval as other institutions heightened their security.

One month later, Milw0rm hacked into a web hosting company named EasySpace, and within an hour they had posted their anti-nuclear message on 300 websites, including those of the FIFA World Cup, Drew Barrymore, Wimbledon, and the Saudi Royal Family.
1. Anonymous


Anonymous is a huge, amorphous group of hackers that has gained considerable momentum over the past couple of years. On January 19, 2012, more than 5,635 people (some unknowingly) joined a distributed denial-of-service attack against supporters of the Stop Online Piracy Act. The sites they disabled included the FBI website, as well as those of the Justice Department, the Motion Picture Association of America, and Universal Music Group.

Other Anonymous activities include protesting UK extradition policies, tracking down cyber-criminals (such as “Internet predator” Chris Forcand), and taking down child porn sites hidden in the depths of the worldwide web. Anonymous has threatened Mexican drug cartel group “Los Zetas,” attacked the Pentagon, threatened to take down Facebook, and waged war on Scientology. The group’s motto is “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

Friday, 10 January 2014

10 Former Hackers Who’ve Gone on to Build Succesful Careers

10. Kevin Poulsen

      Wired.com’s news editor, Kevin Poulsen started out by putting his tech talents to an altogether different use. As a teenager, Poulsen was a prolific hacker with a number of high-level security breaches to his name. The FBI eventually caught on to his exploits, though, and in November 1989 he was accused of a string of offenses including conspiracy and fraud. Still, rather than waving the white flag, Poulsen opted to go on the run. It was during this time that his most famous hack occurred. On June 1, 1990, Poulsen used his phone line hacking expertise to ensure that he was the “lucky 102nd caller” in a competition to win a Porsche held by LA radio station KIIS FM. However, the authorities caught up with him the following year, and he spent just over five years in jail after pleading guilty to computer fraud. Back then this was the lengthiest U.S. term ever handed down for any such offense.

Upon his release, Poulsen decided to embark on a different career path as a journalist. He has gone on to receive a number of awards for his work and has broken several high-profile news stories, including the arrest of Army intelligence analyst Bradley Manning for releasing classified documents to WikiLeaks.

9. John Draper

               Proving that a techy alias is not a prerequisite, legendary hacker John Draper is also popularly known as Captain Crunch. The nickname stems from one of Draper’s earliest hacking exploits, where he effectively gained control of Bell System (subsequently AT&T) phone lines by means of the tone produced by a whistle given away in boxes of Cap’n Crunch cereal at the time. The authorities and phone company were not enamored with Draper’s “experiments,” though, and in May 1972 he was arrested for toll fraud and went on to receive five years’ probation. A second arrest for telephone fraud followed in 1974, and here Draper earned a prison sentence, serving five months in California’s Lompoc penitentiary.

             Nevertheless, prior to his arrests Draper had made a couple of very useful contacts in the shape of Apple co-founders Steve Jobs and Steve Wozniak. Moreover, while in jail Draper coded a large part of EasyWriter – which was the earliest word processing software for the Apple II computer – and was hired by the then nascent Apple soon after his release. EasyWriter was then ported to the IBM PC in a highly profitable agreement that allowed Draper to purchase a property in Hawaii plus a Mercedes. Yet despite having held several job roles and developed various pieces of software since then, Draper has also led something of a drifter’s life.


8. Robert Morris

            How the worm has turned. Robert Morris gained a Ph.D. in Applied Sciences from Harvard University in 1999 and became a professor at MIT that same year. He is also the man who, in 1988, developed what is widely recognized as the earliest internet computer worm. Morris created the worm while he was a Cornell University postgraduate student, purportedly to “gauge the size of the internet.” However, the worm took advantage of a number of security vulnerabilities in host computers and also replicated itself, ultimately resulting in damage estimated at a cost of up to $10 million – although this figure has been disputed. In 1989 Morris was convicted under the Computer Fraud and Abuse Act, receiving a ruling of three years’ probation plus a $10,050 fine. Since then, he has co-founded a couple of start-ups, including Viaweb, which Yahoo bought for $48 million in 1998. And, as mentioned, he also established a successful career in academia, gaining his tenure at MIT in 2006.

7. Owen Thor Walker

            As we’ve already seen, a techie alias is by no means mandatory for success in the world of hacking – but neither does it hurt to have a middle name of legendary proportions. As a teenager in New Zealand, Owen Thor Walker used his self-taught computer skills to help a network of cyber criminals steal from online bank accounts and gain access to more than a million computers, bringing about losses in excess of $20 million. He was detained in late 2007 and charged with several counts of cyber crime – with extradition by the FBI a prospect at one stage. Walker pleaded guilty to the charges in 2008, and while he was forced to pay the equivalent of over $8,000 in damages, he was spared a potential jail sentence after the judge said that a conviction might thwart a promising future on the right side of the law. Later that year, Walker was taken on as a security consultant by New Zealand telecoms firm TelstraClear (now part of Vodafone New Zealand). A spokesman for the company sought to play down the significance of Walker’s past, suggesting that his appointment was “not the equivalent of hiring a bank robber to advise on bank security.”


6. Christopher Tarnovsky

           Christopher Tarnovsky started out on the path to hacking infamy in 1996 by repairing pirated satellite TV access cards. He quickly established a reputation and was approached by a Canadian pirate, who paid him $20,000 to repair cards that were being put out of action by the electronic countermeasures (ECMs) deployed by the cards’ manufacturers. Whenever new ECM codes were sent out, Tarnovsky could often circumvent them within minutes. “It was like a chess game for me,” he said in a 2008 interview.

                Interestingly, it didn’t take long before Tarnovsky was being approached by card manufacturer NDS to work for them. He accepted the offer and was tasked with identifying vulnerabilities in the NDS software while also working incognito among pirates to gain inside information on their latest hacking tactics. However, in 2007 NDS fired Tarnovsky, and the following year both he and NDS found themselves accused of piracy in a lawsuit brought by U.S. pay-television provider DISH Network. The lawsuit was ultimately unsuccessful, though, and in 2012 Tarnovsky was installed as vice president of semiconductor security services for computer security firm IOActive.


5. George Hotz

           Also known as Geohot, U.S. hacker George Hotz came to prominence in 2007 as the first individual to unlock the iPhone, which meant that it could be used with network providers other than AT&T. Since then, Hotz has released a number of iterations of jailbreaking software for iOS devices, but it was his hacking of the PlayStation 3 that really invited trouble. In January 2011 Sony took legal action against Hotz for offenses including computer fraud and copyright infringement. Unperturbed, the following month Hotz released a rap video on his YouTube channel in which he waxed lyrical about his lawsuit. Remarkably, as early as April 2011 the two parties arrived at an out-of-court settlement, with the stipulation that Hotz cannot participate in any future hacking of Sony products. In May that same year Hotz was hired by Facebook, yet while he worked with the company until January 2012, his responsibility there was not revealed.


4. Jeff Moss

                 In 2009 Jeff Moss became part of the Obama administration’s Homeland Security Advisory Council (HSAC), yet his early hacking adventures were more concerned with overturning security measures than maintaining them. “Hacking is sort of a skill set – it’s neutral. You can be a criminal hacker or you can be a noncriminal hacker,” Moss said in a 2011 interview. And to begin with he used that skill set to override copyright protection on games and hack into phone networks to get free calls. Now, though, Moss is a prime example of a “white hat” hacker; that is, someone who uses their hacking expertise ethically to check the robustness of computer security systems – with the approval of the organization being tested. As well as performing his white hat work, Moss is the founder of hacking conference DEF CON and information security conference Black Hat, the latter of which he sold in 2005 for what was said to be $13.9 million. What’s more, while his appointment to the HSAC might have seemed strange to some, others were not so surprised. Threat analyst and journalist Adrian Lamo commented on the selection, saying, “The reality is he’s as corporate as hiring someone out of Microsoft.”
 

3. Peter Hajas

        Peter Hajas came to prominence as the lead developer of MobileNotifier, an open-source notification system for jailbroken iOS devices that was designed to replace Apple’s own alert messaging system. Released in its earliest incarnation in October 2010, MobileNotifier had been downloaded 230,000 times by May the following year; such was the level of discontent with Apple’s notification system at the time. But the software’s success obviously brought Hajas to Apple’s attention, and in May 2011 he posted a blog on his website announcing that he was taking time out from MobileNotifier to pursue other opportunities. A tweet also appeared in which Hajas said that he was going to gain employment in California with a “fruit” company, and it was soon confirmed that he had been hired by Apple to develop iOS apps and frameworks.
 

2. Chris Putnam

            Back in 2005, when Myspace was still something that people seriously used, Chris Putnam created a worm that worked its way through Facebook, making some people’s profiles look like Myspace pages. As hilariously topical as the prank may or may not have been at the time, it also caused certain contact details to be wiped, and sure enough Facebook identified Putnam as the man behind the worm. However, rather than bringing a legal case against Putnam, Facebook presented him with the opportunity of an interview instead. On his way to the interview, due to be held with Facebook co-founder Dustin Moskovitz, Putnam remained wary of his prospective employers’ true motives, commenting, “I got in the elevator, it went up to the 2nd floor where I was to meet Dustin, and the doors opened with Dustin – not cops – standing right in front of me. This was an enormous relief.” Putnam ended up working at Facebook for four years, and his face has even been immortalised as one of the emoticons available on Facebook chat.


1. Kevin Mitnick

           Just before his arrest in February 1995, Kevin Mitnick was firmly at the top of the USA’s computer criminal wanted list. Under a plea bargain that saw him admit charges including computer fraud and unlawfully intercepting wire communications, Mitnick served five years’ jail time, with eight months of that term spent in isolation. Why the solitary confinement? Mitnick says it was down to security officials persuading a judge that he was capable of sparking “a nuclear war by whistling into a payphone.” Either way, after his release Mitnick went on to set up information security firm Mitnick Security Consulting, and in 2012 he became Chief Hacking Officer at KnowBe4, a company that provides “next-generation security awareness training.” When hacking, Mitnick specialized in social engineering – the process of targeting a company’s employees to steer them into releasing classified information. As he told a conference in London in 2013, “The attacker only has to find one person in the business to make a bad decision and then they have a foot in the door.”

Sunday, 29 December 2013

E-Books from Wikipedia

How to create E-Books from Wikipedia
                 Now you can create your own e-book from Wikipedia very easily. for this Wikipedia provides a tool to create e-book your own choice that is called Wikipedia e-book creator.
Just follow these simple steps
Step-1
             Search any topic on Wikipedia.
Step-2
              Expand 'Print/Export' list on the left side of the Wikipedia ,then click on create a book.
Step-3
             Click on start book creator.
Step-4
              You can add pages to your books by clicking on 'Add this page to your book. You can search several topics an add in to that book.
Step-5
               Click on 'show books'  then 'mange your book' will appear there and you can give title and subtitle there ,also you can create chapter and you can manage your book here.
Step-6
              You can download your book by clicking on 'Download' ,you can also save this book on Wikipedia by creating an user account at Wikipedia.




.

Monday, 23 December 2013

Transfer your Google Data to your Beloved ones even after your Death

Do you know, you can share your Google data even after your death? Yes, now it is possible with an exciting feature provided by Google.

                    Log in to your Gmail account. Go to your account settings. At the end of the page, in the account management there will be an option “Learn more and go to setup”. Click on that. Then on the next page click on setup. Then at the option “Notify contacts and share data” click on “Add trusted contact”. In this you can add up to 10 contacts. It asks you either enter the email address or the name of the persons with whom you would like to share your data.  Enter the email or name of the person who you think can be trusted to share data with.

                      Click on next. Then it asks you what you would like to share. It gives you the following options:
                   Contacts, Drive, Hangouts, Mail, Picasa Web Albums, Reader, YouTube. You can also select all of them. On the same page it asks you to enter the mobile number. A verification code will be sent to that number after your account becomes inactive. That code will be required to access your data after your account becomes inactive. So, enter the mobile number of the person whose name or email id you provided earlier.
                    
                     Then, it will ask you to add a message along with the subject. This message will be sent to the person whom you would like to share your data. This message will be sent after your account becomes inactive. After adding the message click on save.

                 Then you can select the time you would like your account to be inactive after your last signing out.You have to select an option out of 3 months, 6 months, 9 months, 12 months, 15 months and 18  months. By default it is set to 3 months. It will ask you to provide a contact number on which an alert will be sent before performing any action on your account. It will also give an option that whether you would like your account to be deleted after becoming inactive. You can specify that also. Then finally click on enable.
Once you enabled it don’t forget to access it for the time duration you entered your account to be inactive within, if not accessed.
Enable it as early as possible if you wish to share your data with someone after your death.

Infolinks Ads