Saturday, October 1, 2016

This Man Calmly Destroys iPhones And MacBooks On Display In Apple Store

There seems to be some other Apple customer that is not too happy with the overall company and is breaking products in the Apple Store. Yes, sounds pretty weird, so, today in this post we will show you the video proof where you can see an individual trashing iPhones and Apple’s devices in Apple Store.

Here is the video that was posted on YouTube showing that how this madman destroying all the iPhones and even also trying to escape the security guards:-

It is true that many times users often do not leave the customer service happily, and here is something happens with this madman when he didn’t get any satisfactory customer support from the Apple’s customer care.
It was last Thursday that a man entered an Apple store in Dijon, France, and for no apparent reason the man began to destroy the various devices and little later it was exposed that the madman was using a metal sphere. The man who should have about 30 years, has not yet been identified.
The vast majority of the affected products were the iPhones, but the madman also destroyed a MacBook that was in the exhibition booth with a blow of punch.
According to the reports, the man who came on Thursday at an Apple store is an unhappy customer of the Cupertino company. The moment was recorded by several people and when he was asked by the peoples who were present at that moment, the madman replied that the tech giant Apple had violated the right of European consumers, hence, he was destroying the devices.
Here is what this mad stated “Apple is a company that ‘violated’ European Consumers’ rights. They refused to reimburse me, I Told Them: ‘Give me my money back.’ They said no. So you know what’s happening? This is happening!”.
It is also known that the man was detained by the security and later he was handed over to the police to make the assessment of the case. It is estimated that the damage from reaching thousands of euros. However, the police still not confirmed the exact reason or what have led the individual to do so.

Thursday, September 29, 2016

These 10 Coding Challenges Can Help You Train Your Brain

Programming is essential for every industry these days. It is a complex but relatively new human 
activity. Learning Programming is not like learning human languages but is much closer to mathematics. Coding in any languages is to solve a problem that the computer can help you with. Such problems can be very simple as well as very complex. Tackling complex skills like coding may help strengthen your brains. For many, the ability to simplify complex issues is similar to a brain workout. According to research, brain exercises help improve brain function and can fight dementia. One way to keep the brain young is learning a new skill.
Coding is more about creativity and ability to come up with new ideas. There are many different platforms for anyone to learn coding in many different programming languages. Learning to code using books is the most common way but these days you can also find many interactive platforms. Using such platforms will help you learn new things as most of them are powered by thousands of coders and programmers.

Sphere Online Judge SPOJ

Sphere Online Judge (SPOJ) is another very active community where you can find thousands of coding challenges. The challenges here in SPOJ range from simple coding problems to hard algorithmic challenges. SPOJ lets you code in almost all programming language and provides you with feedback on your solution, which may for some challenges contain additional hints.

2. HackerEarth
HackerEarth Programming challenges and Developer jobs
HackerEarth provides a SaaS application to do automated assessment of technical and logical skills of candidates. It also helps companies to source smart talent by serving as a developer aggregation and selection platform.

3. CoderByte
Coderbyte Programming Game Challenges Competitions
Coderbyte launched in 2012, also a Kickstarter funded project and is aimed at complete beginners and intermediate coders alike. This is a self-maintained community of programmers who like to tackle programming problems in their spare time.

4. TopCoder

In [topcoder] you get to earn real money, and it’s powered by a million of coders, so there is a lot of challenging stuff to encounter. For some beginner programmers, it might find be challenging. You can participate in both daily, and weekly coding challenges; which are extremely difficult, and require great thinking skills to complete.

5. Project Euler
About Project Euler.resized

Project Euler is one of the most popular coding challenge websites in the world. There are several hundred thousand users already and is more than a decade old.You can learn more about Project Euler on Wikipedia, Reddit, Stack Overflow and Google Code.

6. Daily Programmer
For learning refreshing or just for fun

This is Reddit’s Daily Programmer community. Best subreddit for those who want to learn more about programming and problem solving.

7. Codility
Refactor yourself. Train your programming skills Codility

In Codility, you get several pre-customized and pre-thought challenges that you can submit in many programming languages. They’re all sorted by their appropriate difficulty, and there is like 40-50 challenges to go through.

8. Hacker Rank
Programming problems and Competitions HackerRank

You can find challenges related to artificial intelligence in HackerRank. HackerRank is backed by companies like Y Combinator, SVAngel and much more.

9. Code Forces

In this amazing website, you can create your own groups, attend code gym, and see the leaderboard of coders.There are also coding cups organized that can help you to get noticed by the right people.

10. Kaggle
Kaggle The Home of Data Science

Kaggle is built more for the professional programmers since the competitions page seems to indicate clearly that Kaggle is all about paid competitions, you can also find jobs board available, as well as programming tutorials to help you get updated and focused.

Saturday, September 10, 2016

What skills do I need to learn to become a computer hacker?

If you don't have that passion for computers, you will never be a hacker. You can be a programmer, a computer scientist, world-famous in the IT field ... but not a hacker.

If you do have that passion, then it's possible ... but never easy. The following steps are for being a hacker on the software side ... these steps will be different for other endeavors.

Image result for hacker

* Learn about operating systems. Learn about operating systems you don't like. Learn about operating systems you would prefer to never use. Don't just concentrate on the fun stuff.
* Learn to program. Remember, programming is not language dependent. Don't worry about languages or programming style--yeah, you have to start with one programming language, but if you can learn to program in C, you can program in damn near anything. But avoid BASIC, if at all possible.
* Learn operations. Learn how networks work, how the processor works, jow memory works. You don't have to be a hardware guru (though if that's where your passion lies, go for it), but you do have to have at least some understanding of how the hardware works.
* Most important--NEVER STOP LEARNING! You will never learn everything about computer programming, not if you lived to be 1000 years old. You can learn from the crusty old Unix master who hasn't left his office in five years (because he doesn't have to), and you can learn from the shiny new wet-behind-the-ears intern who just hired on last week. The day you figure you have nothing left to learn, put down your keyboard and walk away, because your brain just stopped functioning.
The short answer is, all the skills required to do the task you want to do. For example, web application hacking? You will want to learn about the following topics:
  • Database architectures (i.e. different types of database engines)
  • SQL syntax (differences between MSSQL and MySQL, etc)
  • HTTP protocol (incl. how to send raw requests)
  • SSL/TLS issues and misconfigurations
  • Intercepting proxies (like Burp Suite and Owasp Zap)
  • Web application attacks (SQL Injection, RCE, RFI, LFI, XSS, CSRF, XST, etc. To learn about these attacks, check out the OWASP Testing Guide, it's free.)
  • How files and file permissions work on Windows and Linux
  • Being able to read and understand either ASP, ASP.NET, PHP or Java for source review purposes. (Can also be used to help developers create fixes to issues you've discovered. This skill is also required for e.g. code injection 0days you discover.)
  • Knowledge about web application scanners, their weaknesses and strengths, etc. (This skill is pretty easy to obtain, but is gained over time the more you use different scanners and learn which ones are generally the best for your projects. FYI actively scanning a web application without permission is generally illegal.)
  • Web services architecture
  • Web services vulnerabilities
Note: The list above is not exhaustive but does include the majority of information you will need to be able to hack a web application.

Friday, September 9, 2016

Turing’s 2018 phone to have three Snapdragon 830s, 18GB RAM, 1.2TB storage

Turing announces Monolith Chaconne with 3 Snapdragon 830s, 4K display, 18GB of RAM, and much more

Turing’s new smartphone to have 18GB of RAM, 1.2TB storage and three Snapdragon 830s

Turing Robotics Industries (TRI) with some more craziness after introducing the Turing Phone Cadenza last week. The company has just announced the Turing Monolith Chaconne, a smartphone with specs even stranger than its name, through an email newsletter.
The above announcement by TRI come two months after the firm finally managed to ship the pilot Turing Phone, a crowdfunded Android handset, to early backers, after much delay and some revisions.
Coming to Turing Monolith Chaconne, let’s have a look at its specifications at a glance:
• 3 Qualcomm Snapdragon 830 processor, 6.4-inch 4K display with 2160×3840 pixel resolution
• 18GB of LPDDR4X RAM (or 3 x 6GB memory chips)
• 1.2TB of storage (3 x 256GB memory, 512GB via microSD card)
• 60MP quad rear camera with Triplet Lens/T1.2 and iMAX 6K
• 20MP dual front camera
• Swordfish OS with deep learning (AI) features based on Sailfish OSS
• 120 Wh battery based on 3,600mAh Graphene Super-capacitor + 2,400mAh Li-Ion + Hydrogen Fuel Cell wordfish Sailfish OS
• WiGig support, Marshall audio, A.L.A.N
• Advanced AI Voice-Authenticated Power On/Off
• Four Nano-SIM support
• Graphene Oxide composite bodywork with Liquid Metal 2.0 Structural Frame, Lightweight Metal Outer Frame, High Temperature Alloy Components
• 4G + VoLTE, 3G, GSM
• Augmented Reality: Parallel Tracking & Mapping API
Steve Chao, CEO of TRI, in an email newsletter explains how it is going to connect the three Snapdragon 830 SoCs in the smartphone:
“TRI plans on connecting multiple CPUs via WiGig by implementing an ad-hoc driver to the 60GHz channel via on-board USB3.0. This complicated computing process stores a transient matrix in SSD of CPU(1), then it recomputes and shares the transient matrix with the other SSD of CPU(2) simultaneously. This results in the CPUs sharing their computing power in parallel. Such proprietary technology enables TRI to achieve never-seen-before computing power on a mobile device. So what exactly is this technology intended for? The answer is – Computational Intelligence (CI).”
The Turing Monolith Chaconne is expected to release in 2018. Whether or not will the company be able to launch this device next year and keep its promise, only time will tell. TRI also says that it will make its presence felt in Salo, Finland and start building prototypes for the Turing Phone Cadenza in a manufacturing facility right where Nokia and Microsoft used to produce their mobile phone prototypes.

Here are the 5 reasons why some Google employees live in parking lots

Image result for google employees living in parking lot

Google Inc. is the world’s largest search engine site that specializes in Internet-related services and products. Constantly ranked as the best company to work for, Google employees are among the highest-paid in the world.
“The benefits and care of employees is obviously world class, and compensation is almost unmatchable. But the company attracts some of the best talent and best people to work with in the world, which is the most important bit.” – Google Program Manager (San Francisco, CA).
To stay at the top, the company requires their employees to put in extra hours. As a result, you would reportedly find employees spending long hours at Google quite common. It turns that out some employees almost never leave the campus and start living in the parking lot!
There’s even a Quora thread about it. Here’s a look at 5 reasons Google employees prefer to live in parking lots and how easy it is…
Check out 5 reasons why some Google employees choose to live in parking lots

High rents

As the rent in South Bay area was too high, Ben Discoe decided to live at the Google campus, as he already had a house payment and alimony to pay. Hence, he stayed at the Google campus for a period of 13 months – October 2011 to November 2012. It turned out that living in a parking lot was more suitable.
When he started living on the campus, the security team at Google used to keep a watch on him. However, they left him alone once they were convinced that he was just an eccentric Googler.

To save money

Brandon Oxendine, a 23-year-old for the period June 28, 2013 to September 22, 2013 lived in a Google parking lot. He bought a station wagon, decorated it with two mattresses and put up curtains on the windows.
According to Oxendine’s blog, 20s for him is the time to save some money and reach financial freedom. Hence, he chose to live in the parking lot. “If I do plan on traveling the world, I’ll need to be comfortable with unconventional living situations, and this is certainly a good place to start,” he says.
Another Google employee, whose name was not cited in the Quora thread, stayed like a camper in the tent on campus. He saved up enough in 2-3 years to buy himself a house.

On a challenge

Matthew J Weaver started living in a Google parking lot on a challenge and says “it was excellent for my career.” According to Fox News report, although Google does not have a policy of permitting employees to sleep in campus, the security team “even kept a lookout on Weaver’s mobile home when he was away.”
When weather conditions were suitable, he would even hold parties in his RV on Thursdays wrote Weaver. However, he says that it was a little tough for him to provide explanation to women he was dating as to why he lived in a parking lot.

Could not find accommodation

One Googler could not find a place to stay who had shifted to the London office from the Mountain View headquarters.
He decided to stay at the office till a permanent residence could be organized. However, he slept under his desk for a duration of one week, instead of staying in the parking lot.

Not too difficult to stay

Living in a Google parking lot, or somewhere else for that matter, turns out is not really difficult.
Those employees who stayed at the campus for extended periods said that they showered at the gym and ate their meals at the office (Google provides free meals for all employees). Even laundry is not a problem, as employees can do their laundry on campus. Also, anytime you feel the need to use the restroom, “just walk the short distance to the nearest Google building and badge in,” writes Discoe.

How to Hack Windows/Mac OS X Login Password (When Locked)

A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer (but, logged-in) and works on both Windows as well as Mac OS X systems.

In his blog post published today, security expert Rob Fuller demonstrated and explained how to exploit a USB SoC-based device to turn it into a credential-sniffer that works even on a locked computer or laptop.

Fuller modified the firmware code of USB dongle in such a way that when it is plugged into an Ethernet adapter, the plug-and-play USB device installs and acts itself as the network gateway, DNS server, and Web Proxy Auto-discovery Protocol (WPAD) server for the victim's machine.
The attack is possible because most PCs automatically install Plug-and-Play USB devices, meaning "even if a system is locked out, the device [dongle] still gets installed," Fuller explains in his blog post.
"Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list."

How does the Attack Work?

You might be wondering: Why your computer automatically share Windows credentials with any connected device?

That is because of the default behavior of Microsoft Window’s name resolution services, which can be abused to steal authentication credentials.
The modified plug-and-play USB Ethernet adapter includes a piece of software, i.e. Responder, which spoofs the network to intercept hashed credentials and then stored them in an SQLite database.

The hashed credentials collected by the network exploitation tool can later be easily brute-forced to get clear text passwords.

Apparently, to conduct this attack, attackers would require physical access to a target computer, so that they can plug in the evil USB Ethernet adapter. However, Fuller says the average time required for a successful attack is just 13 seconds.

You can watch the video demonstration below that shows Fuller's attack in action.

Fuller successfully tested his attack against Windows 98 SE, Windows 2000 SP4, Windows XP SP3, Windows 7 SP1, Windows 10 Enterprise and Home (but not Windows 8), as well as OS X El Capitan and OS X Mavericks. He’s also planning to test it against several Linux distros.

Fuller tested the attack with two USB Ethernet dongles: the USB Armory and the Hak5 Turtle. For more detailed explanation, you can head on to his blog post.

Two Hackers who hacked US Spy Chief, Arrested by FBI

US authorities have arrested two North Carolina men on charges that they were part of the notorious hacking group "Crackas With Attitude."
Crackas with Attitude is the group of hackers who allegedly was behind a series of audacious and embarrassing hacks that targeted personal email accounts of senior officials at the CIA, FBI, the White House, Homeland Security Department, and other US federal agencies.

Andrew Otto Boggs, 22, of North Wilkesboro, N.C., who allegedly used the handle "INCURSIO," and Justin Gray Liverman, 24, of Morehead City, who known online as "D3F4ULT," were arrested on Thursday morning on charges related to their alleged roles in the computer hacking, according to a press release by Department of Justice.
A 16-year-old British teenager suspected of being part of the group was arrested in February by the FBI and British police.

Although court documents did not name the victims, the hacking group had allegedly:
  • Hacked into the AOL email of CIA director John Brennan and released personal details.
  • Hacked into the personal emails and phone accounts of the US spy chief James Clapper.
  • Broke into the AOL email of the FBI Deputy Director Mark Giuliano.
Cracka also leaked the personal details of 31,000 government agents belonging to nearly 20,000 FBI agents; 9,000 Department of Homeland Security (DHS) officers and some number of DoJ staffers.
"In some instances, members of the conspiracy uploaded private information that they obtained from victims’ personal accounts to public websites; made harassing phone calls to victims and their families; and defaced victims’ social media accounts," reads the press release.

According to the FBI officials, between October 2015 to February 2016, the hacking group used social engineering in order to trick the victims into revealing their account number, password, and other details.

Boggs and Liverman will be extradited next week to the Eastern District of Virginia, where federal prosecutors have spent months building a case against Crackas With Attitude.

Thursday, September 8, 2016

Robotics: Remote control Car at Niks Technology

A Robotics Project by Niks Technology. A remote control car having great features. Have a look! The most amazing part is.... It costs less than 250-300 INR.

This Remote control Car is made at Niks Technology, this car is having many features like it can rotate at 0 degree and many more. And Yes! It costs only 250-300 INR.

Remote controlled toys are any type of toy that can be controlled remotely.

There are four components of a remote controlled vehicle. The first component is the transmitter, which is the controller that the user has in their hand. This controller sends a signal, such as a radio wave, to the car. The receiver, such as an antenna and circuit board, sits inside of the toy and it takes the signal from the transmitter. When the receiver gets the signal, it activates motors inside the toy depending on the signal that the transmitter gives out. The motors inside of the toy are what allow the toy to be steered, to turn wheels, operate propellers, and do various other tasks. The final component of a remote controlled toy is the power source, which is usually a battery that is placed inside of the transmitter.

Wednesday, September 7, 2016

20 Things You Didn't Know About... Computer Hacking

What's the connection between Steve Wozniak, the Pope, and Henry Kissinger? That's right, it's hacking.

1  Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.
2  Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.
3  One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voilà: computer Ping-Pong!
4  By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).
5  Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.
6  Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.
7  Hacking went Hollywood in the 1983 movie WarGames, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.
8  That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.
9  In 1988 Robert T. Morris created a worm, or self-replicating program, purportedly to evaluate Internet security.
10  The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF).
11  They all come home eventually. Morris now researches computer scienceat...MIT.
12  British hacker Gary McKinnon broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.
13  McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.
14  According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.
15  It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: “I thought, ‘Gosh, this is a big problem.’”
16  Unclear on the concept: When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online.
17  Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.
18  Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.
19  This does not bode well for patients receiving wireless deep-brain stimulators.
20  The greatest kludge of all? Roger Angel of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.

Tuesday, September 6, 2016

What happens to S Tel Telecom Ltd. India? 32 GB 3G at 32 RS.

S Tel Private Limited was a GSM based cellular operator in India. It had unified access service licenses to operate in the circles of Orissa, Bihar, Himachal Pradesh, North East, Assam and Jammu & Kashmir. It was owned jointly by C Sivasankaran (51%) and Bahrain Telecommunications (49%).
On 2 February 2012 Supreme Court of India quashed all 122 spectrum licences granted during the tenure of former communications minister A Raja. Six licences of S Tel were cancelled, and Batelco sold its share of S Tel. Batelco was the first foreign operator to cease operations in India following the 2G spectrum scam. The sale was to be completed by the end of October 2012.
At its peak, S Tel had operations in 5 Category C circles – Orissa, Bihar, Himachal Pradesh, North East and Assam. The company was also in the process of launching its services in the northernmost circle of Jammu & Kashmir. These licenses enabled the company to provide Unified Mobile service, wireless broadband and innovative Value Added Services (VAS) covering a population of over 226 million across these circles. S Tel had approximately 3.6 million subscribers as of February 2012 just before the cancellation of its licenses and subsequent closure of its entire business.

S Tel Mobile Service Goes Down In Various Part of India, Customers Irked

After Cheers Mobile (Etisalat DB) Outage its now the turn of another small GSM operator – S Tel which is down in Orissa, Bihar-Jharkhand and in other circles from last  12 days.
We were getting constant complaints from STel subscribers in Orissa and Jharkhand and one of reader Sonu alerted us regarding the same.
Same as Cheers Mobile, STel has passive infrastructure sharing agreement with Reliance Communications for the 4 telecom circles, and according to our exclusive sources Rcom has disconnected the service of STel from more than 700 BTS (Mobile Tower) across 4 circles.
While contacting the customer care officials of STel (Orissa) we have been told that the network problem which the Customers are facing now is a temporary one, and we are expecting the same to get resolved soon.
We have also been told that the experts are working 24 hours to restore the network which is taking slight more time than the expected one assuring that, we are putting all possible effort to restore the network as soon as possible.
This is very surprising to see Operators like S Tel who dint even come forward to alert its customer even after more than 12 days of downtime where as in case of Cheers Mobile the very next day they altered the customers and apologized for the inconvenience.
We hope at least after reading this S Tel officials will come forward and alert the customers and public what is happening and when things would be fixed.

What Happens to 3G Spectrum in 3 Circles Alloted to S-Tel?

Amidst of all telecom related mess up, it seems everyone is so concerned about 2G spectrum – its policy, allocation, reserve price and all these. But the whole thing is so messed up, considering 2G spectrum is mainly for voice, which is in turn as bread and butter for consumers and operators.
But Govt. is not doing anything to get back the 3G spectrum from STel, one of the operators whose licenses were cancelled by court order in February 2012. During that time STel was operating in 5 circles – Himachal Pradesh, Assam, Orissa, Bihar – Jharkhand and North East and offering 2G/GSM voice and data services.
In 2008 STel got spectrum and UASL in 6 category ‘C’ circles including Jammu and Kashmir. As in February 2012 the operator’s licence was cancelled, its foreign invester BaTelco (Currently BaTelco is looking for a come back in India, via Reliance Communications’s Globalcom) sold its entire stake to Indian partner Sky City Foundation. Siva Group, headed by Sivasankaran has the majority stake in STel. STel also won 5MHz 3G spectrum on 2100 MHz band in Orissa, Himachal Pradesh and Bihar in a valid auction process in 2010; the ownership of those 3G airwave still belong to STel. The company did not roll out 3G services in none of the circles, while its website reads that STel’s network is a 3G-ready network.
At present Stel website ( is still alive and offers MNP procedure. Shiva Group’s website also notes for STel as the company’s telecom project and writes that STel owns the 3G spectrum while 2G licences were cancelled. Just after the cancellation of its licenses the company wrote to Prime Minister they will refund the spectrums if Govt. agrees to refund their money wasted for acquiring 2G and 3G spectrum with interests. STel does not seem in a position or desire to start its business again in India, as the company did not participate in any of the 2G auction process lately (Nov 2012 and March 2013).
So the solution is simple, take back the spectrum on 2100MHz from STel and refund the money they paid during 2010 3G auction along with interest, and conduct a small 3G spectrum auction for these three circles. Though I doubt anyone can invest for 3G in those category ‘C’ circles except Telenor who are still giving priority to voice markets.
But is there any movement from Govt to get back STel’s 3G spectrum? No. Nobody knows why. Keeping 3G spectrum unused, it’s no good.