Security on Router

Important Security Settings on your Router that you MUST CHANGE         The router is the first point of entry for hackers who try to access all your internet-connected devices.Unfortunatelly, it’s easy to surpass the protection offered by many of the top Wi-Fi routers. That’s why it’s important to take some time and […]

Firesheep

Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted cookies from websites such as Facebook and Twitter. As cookies are transmitted over networks, packet sniffing is used to discover identities on a sidebardisplayed in the browser, and allows the user to instantly take on the log-in credentials of the user by double-clicking on the victim’s name. The […]

Safe-cracking

Safe-cracking is the process of opening a safe without either the combination or key. It may also refer to a computer hacker‘s attempts to break into a secured computer system, in which case it may be shortened to “cracking” or black hat hacking.   Physical methods Different procedures may be used to crack a safe, depending on its construction.  Different […]

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity, of data stored on a hard drive, or being transferred over computer networks such as the Internet. The monitoring is often done surreptitiously and may be done by or at the behest of governments, by corporations, criminal organizations, or individuals. It may or may not be legal and […]

Brute-force attack

In cryptography, a brute-force attack, or exhaustive key search, is a cryptanalytic attack that can, in theory, be used against any encrypted data (except for data encrypted in an information-theoretically secure manner). Such an attack might be utilized when it is not possible to take advantage of other weaknesses in an encryption system (if any exist) that would make the task easier. It […]

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security […]

H*Commerce: The Business of Hacking You

H*Commerce: The Business of Hacking You is a six-part online documentary film series directed by Seth Gordon. It centers on the struggle between criminal hackers and security experts. Each segment is between five and eight minutes in length. The first was released on the Internet on May 20, 2009. “H*Commerce” stands for “hacker commerce”,  specifically “the business of making money through the illegal […]

CYBER WORLD AND CYBER SECURITY IN NEW ERA

Plans to teach children as young as 11 about careers in cyber-security have been announced. New learning materials would be offered to UK schools to publicise jobs in the sector, the Department for Business, Innovations and Skills said. A recent report said limited awareness of cyber-security as a profession had created a skills shortage. One […]

NANO TECHNOLOGY-THE NEW ERA TOWARDS BEST

Nanotechnology (sometimes shortened to “nanotech“) is the manipulation of matter on an atomic, molecular, and supramolecular scale. The earliest, widespread description of nanotechnology referred to the particular technological goal of precisely manipulating atoms and molecules for fabrication of macroscale products, also now referred to as molecular nanotechnology. A more generalized description of nanotechnology was subsequently established by the National Nanotechnology Initiative, which defines […]

Mobile phone tracking

Mobile phone tracking refers to the attaining of the current position of a mobile phone, stationary or moving. Localization may occur either via multilateration of radio signals between (several) radio towers of the network and the phone, or simply via GPS. To locate the phone using multilateration of radio signals, it must emit at least the roamingsignal to […]

Top 8 WiFi Scanners For Ms Windows

Most of the wireless routers today comes with some security feature such as security encryption (WEP/WPA), MAC address filtering, lowering transmission power, disabling DHCP & use static IP, and hiding of SSID to help keep your wireless network safe from intruders. Each wireless security mechanism helps to increase the difficulty of unauthorized users from hacking […]

Backdoor found in Samsung Galaxy Devices

Backdoor found in Samsung Galaxy Devices, allows Hackers to remotely access/modify Data     Google’s Android operating system may be open source, but the version of Android that runs on most phones, tablets, and other devices includes proprietary, closed-source components. Phone makers, including Samsung mobile its Smartphones with a modified version of Android, with some pre-installed proprietary software and […]

How Hackers can Track your Mobile phone with a cheap setup ?

How Hackers can Track your Mobile phone with a cheap setup ? Cellular phones have become a ubiquitous means of communications with over 5 billion users worldwide in 2010, of which 80% are GSM subscribers. Due to their use of the wireless medium and their mobile nature, those phones listen to broadcast communications that could reveal […]

Get Android ice cream sandwich

Get Android ice cream sandwich source code :-     Get Android ice cream sandwich source code       Google has made available the source code of its latest mobile operating system, Android 4.0, Ice Cream Sandwich. With this release, the mobile OS is now opensource for all developers which want to create their custom […]

Save Battery Life of your Android Devices

Save Battery Life of your Android Devices   Battery Performance is very important when you purchase a smartphone or a tablet. Especially in Android devices, the battery performance is very essential as Android Phones battery basically is very less. Despite the default power saving techniques on the device, we have other few important actions like terminating […]

How to Unlock android pattern lock

How to Unlock android pattern lock This has been a common problem with most android smartphones users that, someone(while playing with their cellphone) activates the lock by drawing wrong unlocking patterns, leading finally to a window asking Google account User name and password. I recently got screwed up due to cell phone unlocking, as the […]

WHAT IS ROOTING ?

We all come down to diff. words daily but we didn’t know what they stand for,or how they help us. One of the word is ROOTING Well, rooting may refer to gaining of superuser control to android subsystem. Android derives from Linux kernel and rooting an Android device gives similar access administrative permissions as on Linux or […]