Disqus for Cyber Fort

Showing posts with label internet security. Show all posts
Showing posts with label internet security. Show all posts

Wednesday, 10 August 2016

Facebook Offers Loan Scheme Upto 1 Lakh

Be The First To Comment

Good News for Facebook Users. Now Individuals can get loan Upto 1 Lakh on the basis of Facebook Account within 10 minutes.   

Pune based company named Early Salary is a Fin Tech company in Pune, offering urgent, unsecured, quick cash personal loans at low interest rates to those who are broke on month end.You have to only submit the simple documents & simple enquirers regarding your details. 

How to Proceed for Loan Scheme & What documents you must have.


1. You Should Must Have Facebook Account

The 1st  condition for company is you must have a Facebook account for signup process in early salary app. This is most important requirements for company. to proceed the loan scheme.

2. You Should Must Have Smartphone

The 2nd condition of company is you must have Smartphone for Registration Process. Download and Install the application through play store.
3. Your Salary Must Have Upto Rs 20,000/-  

The 3rd condition of company is your monthly salary must have upto Rs 20,000. This information you have to clear at the time of loan approval.

4. Loan Amt. Starts at Rs 10,000/- Upto Rs 1 Lakh at 2.5 % interest rate.

This company provides these loan amt. only for 7 days - 30 days at per 2.5% interest rate per months

5. Documents Required - Your Salary Bank Account Statement of 3 Months.
                                               
                                                  - Your Pan Details will be Required. 


Best Regards . . . Please don't Forget to Share this information to whom needed for Money.

Read More

Wednesday, 16 April 2014

Most Desirable Job in the World Is…Here

Be The First To Comment
job search here
For a new study ranking the best jobs of 2014, jobs website CareerCast.com did some number-crunching and found — perhaps not surprisingly — that crunching numbers is a pretty good gig.
With a median income of$101,360 and a 23% projected job growth rate by 2022, mathematician topped the site’s roundup of the most desirable jobs. CareerCast points to the “exponentially growing popularity of mathematics” in everything from healthcare and technology to sports and politics
“Mathematicians are employed in every sector of the economy… from Wall Street brokerages to energy exploration companies to IT R&D labs to university classrooms,” CareerCast publisher Tony Lee tellsBusinessInsider.
Companies and government agencies rely more heavily on analytics to make all sorts of decisions today, so employers need people who can generate and parse this data, CareerCast says in its overview. “Mathematical analyses of trends are used to gauge many activities, ranging from internet-user tendencies to airport traffic control.”
Companies looking for all these math whizzes are going to have a tough time, though: As a nation, our math skills stink. A survey of 5,000 Americans between the ages of 16 and 65 last year found that our mathematical abilities are better than those of people in just two other countries — Italy and Spain — and behind the other 18 surveyed by the Organization for Economic Cooperation and Development. “Explanations for the relatively weak performance of the United States include failings in initial schooling, lack of improvement in educational attainment over time, and poor skills in some subpopulations,” the OECD said in a report examining the U.S.’s poor academic showing.
Unfortunately, our kids aren’t any better at math than we are. In fact, when the Program for International Student Assessment evaluated the math skills of teenagers from 65 countries, it found that math scores dropped among U.S. teens. Their math abilities trail not only those of kids from countries like Japan and South Korea, but also Ireland and Poland, whose scores rose about the U.S. in the most recent test.
That’s too bad, because half of CareerCast’s top 10 jobs are in the so-called STEM fields: science, technology, engineering and mathematics. After “tenured university professor” at number two, the next two jobs are statistician and actuary (last year’s top job in CareerCast’s ranking), with median incomes of $75,560 and $93,680, respectively.
Read More

How to Open Adf.ly Blocked Links in India

Be The First To Comment

You know what is Adf.ly. It is a URL Shortener service which pays for every visit your URL gets. It became so popular in only few days and everyone in the world started to use it to earn some decent bucks. But unfortunately it is blocked in India and some other countries. If you are living in india, you may be familiar with this problem because nowadays most of the outgoing download links are from adf.ly. Anyway it is not at all a problem now. I figured out something which allows you to open the links.
If you want to go to adf.y, then you are blocked (let it be adf.ly/xxxx)
Just ad v2 in front of adf.ly (v2.adf.ly/xxxx)
Now go to v2.adf.ly and continue your service.
Update: If adding v2 is not working then try adding httpS:// instead of http://. 
Your Old Link – http://adf.ly/xxxx
Your New Link – https://adf.ly/xxxx
Note: When bypassing the links from above sites, Remove https:// and replace it with http://..

pls comment u get any queries . . . .
Read More

Thursday, 3 April 2014

BARC to recruit 11 Scientific Assistant/B (Civil) 2014

Be The First To Comment
Bhabha Atomic Research Centre, Visakhapatnam, Andhra Pradesh has invited applications for recruitment to the post of Scientific Assistant/B (Civil). Candidates eligible for the post have to apply online on or before April 15, 2014.
Details of post:
Name of the post: Scientific Assistant/B (Civil)
Total number of posts: 11
Eligibility:
Candidate should have Diploma or Licentiate in Civil Engineering with minimum 60% marks.
Age limit:
Candidate's age should be between 18 years to 30 years. Age relaxation is applicable as per Govt. rules.
Pay Scale: 29,365 per month
Selection process: Selection will be on the basis of performance in Interview.
How to apply:
  1. Eligible candidates may apply Online only from the official website of BARC - www.barcrecruit.gov.in
  2. No other means /mode of applications will be accepted.
  3. After final submission of online application form, candidates must print-out the generated application and retain safely for later use, during Interview.
  4. Candidates should not send the application anywhere.
Important dates:
Opening date for online application form: March 22, 2014
Closing date for online application form: April 15, 2014
For further information, candidates can visit:  http://www.barc.gov.in/

Read More

Monday, 17 March 2014

Google Public DNS Server Traffic Hijacked

Be The First To Comment
The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The latest bad news is that the World's largest and most widely used Google's free public DNS (Domain name system) resolvers raised security red flags yesterday.
DNS is the master address list for the Internet, which translates IP addresses into human readable form and vice versa. According to Internet monitoring firm BGPmon, Google's DNS server 8.8.8.8/32 was hijacked yesterday for 22 minutes.

The Google's DNS server handles around 150 billion queries a day and during the 22 minutes of hijacking, millions of Internet users, including Financial institutions, Governments were redirected to BT’s (British multinational telecommunications services company) Latin America division in Venezuela and Brazil.Hackers exploited a well-known vulnerability in the so-called Border Gateway Protocol (BGP), which is used to exchange data between large service providers, and hijacking could allow the attackers to simply re-route the traffic to a router they controlled. 
BGP attack is the man-in-the-middle attack at large scale and harder to detect, as the traffic still reaches its legitimate destination and which was first demonstrated in 2008 by two security researchers - Tony Kapela and Alex Pilosov.

It's not the first time when Google Public DNS service has been hijacked. In 2010, DNS server traffic was hijacked and redirected to Romania and Austria.

Read More

Tuesday, 4 March 2014

Change Your IP in Less Then 1 Minute

1 Comment


1. Click on “Start” in the bottom left hand corner of screen
2. Click on “Run”
3. Type in “command” and hit OK
 You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”
5. Type “exit” and leave the prompt
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”
You should now be on a screen with something titled “Local Area Connection”, or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on “Local Area Connection” and click “properties”
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.
10. Click on “Use the following IP address” under the “General” tab.
11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).
12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.
13. Hit the “Ok” button here.
14. Hit the “Ok” button again.
You should now be back to the “Local Area Connection” screen.
15. Right-click back on “Local Area Connection” and go to properties again.

16. Go back to the “TCP/IP” settings.
17. This time, select “Obtain an IP address automatically” tongue.gif
18. Hit “Ok”
19. Hit “Ok” again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.

NOTE:- This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

more info- Ezivera 
Read More

Thursday, 27 February 2014

“Outernet”a project to provide free wi-fi to entire world from space

1 Comment

Washington:  A US company is planning to build an 'Outernet - a global network of cube satellites broadcasting Internet data to all the people on the planet - for free.

The idea is to offer free Internet access to all people, regardless of location, bypassing filtering or other means of censorship, according to the New York based non-profit organisation, Media Development Investment Fund (MDIF).

MDIF proposes that hundreds of cube satellites be built and launched to create a constellation of sorts in the sky, allowing anyone with a phone or computer to access Internet data sent to the satellites by several hundred ground stations.


The organisation claims that 40 per cent of the people in the world today are still not able to connect to the Internet - and it's not just because of restrictive governments such as North Korea - it's also due to the high cost of bringing service to remote areas, 'phys.org' reported.


An Outernet would allow people from Siberia to parts of the western US to remote islands or villages in Africa to receive the same news as those in New York or Tokyo.

The Outernet would be one-way - data would flow from feeders to the satellites which would broadcast to all below.

MDIF plans to add the ability to transmit from anywhere as well as soon as funds become available.

MDIF has acknowledged that building such a network would not be cheap. Such satellites typically run $100,000 to $300,000 to build and launch.


How Does It Works ?

Outernet consists of a constellation of hundreds of low-cost, miniature satellites in Low Earth Orbit. Each satellite receives data streams from a network of ground stations and transmits that data in a continuous loop until new content is received. In order to serve the widest possible audience, the entire constellation utilizes globally-accepted, standards-based protocols, such as DVB, Digital Radio Mondiale, and UDP-based WiFi multicasting.


According to MDIF, Hundreds of cube satellites to be built and launched to create a constellation of sorts in the sky, which allow anyone to connect with the Internet through Mobile or Computer. Still today 40%  of the people in the world are there who are not able to connect to the Internet, due to several reasons includes restrictive government rules, high cost of bringing service to remote areas. An Outernet would allow people from Siberia to parts of the western US to remote islands or villages in Africa to receive the same news as those in New York or Tokyo. The Outernet would be one-way – data would flow from feeders to the satellites which would broadcast to all below. MDIF also waiting for the funds, after that it will be able to transmit from anywhere. According to MDIF, such type of networks cost $100,000 to $300,000 to build and launch, well it’s not a cheap amount. Currently the organization plans to have prototype satellites ready in June with initial deployment happening mid-2015. 

Read More

Thursday, 20 February 2014

Which Browser Is Better for Privacy And for Security Purpose

Be The First To Comment

Dear Lifehacker, 
With Firefox getting ads and Chrome extensions spying on me, is there really one browser that's better than the others when it comes to privacy? Does it matter if I use something like Opera or Safari instead? Is my browser watching what I'm doing and reporting back? P
That's a great question, and the answer isn't as clear cut as you might think. Different browsers handle user data in different ways, and when you toss add-ons and extensions into the mix, the picture changes even more. Let's take a look at some of the most popular browsers from a privacy angle, and see who has your back when it comes to tracking—or not tracking—what you do online. 

Chrome, and Google's Position on Browser Privacy

Google Chrome, being the dominant web browser in most of the world, has taken a few hits lately in the privacy department. Between adware-filled extensions and microphone-listening exploits, It might look like Chrome has privacy problems. However, both of those issues are third parties using a combination of built-in features and user trust to spy on them—it has nothing to do with the browser itself. We'll get to how third parties play into things a little bit later, but first, let’s talk about Chrome on its own.

Firefox, and the Mozilla Foundation


Firefox has long been touted as the best browser for privacy. It's open source, managed by the non-profit Mozilla Foundation (of which, it should be noted, Google is an investor), and is at the core of most privacy-focused browsers (like the previously mentioned Tor Browser Bundle). Even on the mobile side, Firefox for Android is open source and its code available to anyone who wants it. By most accounts, Mozilla is completely above board with what Firefox does, and the Foundation doesn't trade in user data, so there's no reason for them to harvest it.

What About Opera, Safari, and Internet Explorer?

So if you don't use Firefox or Chrome, where does that leave you? We asked the EFF, but none of their experts had any knowledge when it came to browsers that weren't Chrome or Firefox. They did, however, note that privacy advocates generally prefer open source browsers like over closed-source, proprietary ones like Apple's Safari and Microsoft's Internet Explorer. The EFF praised both however for pioneering their own privacy features, like Safari's 3rd party cookie blocking and IE's Tracking Protection Lists. Still, the fact that you can't see under the hood and that neither have developer APIs makes them tough to analyze. 

The Bottom Line: No, Your Browser Doesn’t Make a Huge Difference

So where does that leave us? Well, your browser is probably sending some information back to the company that created it, but that information is explicitly used to support the features you have turned on. As long as you trust the developer behind your favorite browser, this isn't an issue. Bonus: there's nothing dangerous or invasive about using Chrome sync or Firefox sync.


Read More

Sunday, 16 February 2014

Chrome, Firefox face threat of mischievous cyber attacks

Be The First To Comment

New Delhi: Multiple vulnerabilities have been detected in popular web browsers Google Chrome and Mozilla Firefox and cyber security sleuths have advised Internet users in the Indian cyberspace to guard against arbitrary activities on their systems.
In view of these suspicious virus-based activities, Internet users have been asked to upgrade their personal versions of these two most used web browsers on their work stations.

“Multiple vulnerabilities have been reported in Mozilla Firefox, Thunderbird and SeaMonkey which could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and causes denial of service condition on the affected system,” the Computer Emergency Response Team of India (CERT-IN) said in its latest advisory to online users in the country.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet arena.

“The two web browsers are an important tool for Internet surfing among Indian online consumers. The anomalies have been detected recently and it would be advised that users upgrade their existing versions sooner than later. These activities are mischief on part of hackers or they are harmful viruses,” a cyber security expert told PTI.
The agency, in its advisory, said the vulnerability is caused “due to improper restrict access to ‘about:home’ buttons by script on other pages in Mozilla Firefox”.

“A user-assisted remote attacker could exploit this vulnerability using a crafted website or webpage. Successful exploitation of this vulnerability could allow user-assisted remote attacker to cause a denial of service condition,” the CERT-In said.
Similar issues have been reported in the popular browser offered by Google.

“Multiple vulnerabilities have been reported in Google Chrome which could be exploited by a remote attacker to cause denial of service condition or execute arbitrary code on the target system,” the agency said.

The maximum damage these vulnerabilities can cause, the advisory said, was memory corruption, unwanted downloading of files, loss of sensitive information (when Mozilla Firefox is used in Android phones) and cause of denial of various services on the Internet to the user.

The agency advised Internet users to either user proper security patches (Mozilla Firefox) or upgrade the browser version (Google Chrome).

The affected software systems include “Firefox versions prior to 27.0, Firefox extended support release (ESR) versions prior to 24.3, Thunderbird versions prior to 24.3, SeaMonkey versions prior to 2.24 and Google Chrome prior to version 32.0.1700.102".

Read More

Thursday, 13 February 2014

Top 10 Best Firefox Add-ons of 2014

Be The First To Comment
Firefox is one of the best browsers out there. If used correctly, the effect can be pretty awesome. Let's have a look below for 12 addons which can help you improve the usage of Mozilla Firefox.

1.Collusion:

allows you to see which sites are using third-party cookies to track your movements across the Web. It shows, in real time, how that data creates a spider web of interaction between companies and other trackers.

2.URL Fixer

corrects typos in URLs that you enter in the address bar. For example, if you type google.con, it will correct it to google.com (asking first, if you enable confirmation). One reviewer of this add-on says it’s a “huge time saver” — and who doesn’t need to save time?

3.PearlTrees.


Collect, organize and share everything you like with your new visual and social library. Pearltrees’ unique visual interface lets you have all your interests at hand and inspires you with other’s collections.

4.TwitBin.

It allows you to keep up with all of your Twitter conversations right from your browser sidebar. Send messages, receive messages, share links, and more

5.Memonic Web Clipper,

which lets you capture content snippets on any page and choose sections of websites to save, share and discuss with friends. Keep more than just links: Save the essential content snippets and use them on any computer or mobile. Memonic combines the advantages of bookmarks with your private online notebook

6. 365scores Notifier

lets you get all the scores, updates and other information about your favorite teams in real time.

7.Do Not Track Plus

Firefox already has a feature called Do Not Track, which allows you to tell Websites not to track your online activity

8. Cheevos for Firefox


Want to learn about Firefox and brag to your friends about your pro-level Web surfing? May’s add-on choice Cheevos for Firefox— gets you there. With this add-on you gain achievements for using Firefox, whether it’s finding hidden Easter eggs within the product, or taking advantage of the power of the browser. It makes using the web more fun

9.Tab Badge,

which gives an alert on any one of your open tabs letting you know when there’s something new on that page.

10. Fabtabs

It was a big hit with Firefox users. By taking a small screenshot of the website you are currently viewing, and calculating the most commonly used color from that screenshot, Fab Tabs tries to take the one essential color from the website and apply it to the tab to not only makes your tabs look fabulous, but to help you navigate your tabs visually.



You may downloads all the addons from here:
https://addons.mozilla.org/en-US/firefox/


Read More

J.A.R.V.I.S : Artificial Intelligence Assistant Operating System for Hackers

Be The First To Comment

A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them.

Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis.
With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project.
Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions. 
Project Task Completed: In the current version of Jarvis v1.0, it is capable of:
  • Answering questions asked by the administrator
  • Compile reports on any topic asked by the user.
  • Control lights by voice.
  • Basic interaction with the user.
  • Handling Facebook, Email and Social profiles of users
  • Using Twitter Account with voice control
  • Basic OS kernel is ready.
  • Can Scan targets for Hackers
  • Gathering Basic information about the target
All the above functionalities are completely controlled by voice. It has only been four months since they have started this project and have achieved a lot in this short period of time.

The team will announce the OS publicly soon after completion of phase 3, but for now Chiragh proudly shows off his creation on the J.A.R.V.I.S project website.

Read More

Top 7 Best Operating System For Hacking

Be The First To Comment


Hacking is not an art than can be mastered overnight, it requires dedication and off-course time. Have you ever thing why Hacking is possible because of “unaware developers and inappropriate programming techniques” . As a Ethical hacker i personally realize that You can never stop hackers to hack something, you can just make his task harder by putting some extra security. if you are really interested in Hacking, You need to be know Which Operating systems are used Hackers.

Today i want to say u that which is the best operating system for hacking a/c hackers .
1.  Kali Linux :-



Kali Linux is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on GitHub.
2. BackTrack 5r3 :-

The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, IWHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world.
3. BackBox Linux :-

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.
4. Samurai Web Testing Framework :-

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
5. NodeZero Linux :- 
Best-operating-system-used-for-Hacking1
Penetration testing and security auditing requires specialist tools.The natural path leads us to collecting them all in one handy place. However how that collection is implemented can be critical to how you deploy effective and robust testing.
All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.
6.  Knoppix STD :-
STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.



7.  CAINE :-
Best-operating-system-used-for-Hacking1
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics
CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.



Read More