Friday 18 December 2015

Now it is Easier to Take Screenshots in Android 6.0 Marshmallow


If you want a screenshot on your Android phone, the standard way to do so is by pressing the power and volume down button together. Google is however making it easier to take screenshots with introduction of a new feature for Android 6.0 Marshmallow users that only for quickly screenshots and instant sharing.
This new feature in Android 6.0 Marshmallow makes the process a little less confusing for those of you that do not own a device made by Google with the most basic vanilla Android experience.

How to Take Screenshots in Android 6.0 Marshmallow

An update to the Google app will add the feature for users who are currently running Android 6.0 Marshmallow and above. The quick screen sharing feature,part of the contextual Google Now on Tap feature, was first reported by Droid Life. It adds that the new share button appears when Now on Tap feature is activated, and it appears on the bottom left corner of the screen. The button grabs a screenshot without including the battery status, network details, Wi-Fi, and other icons in the notification bar, keeping it blank instead. It also gives a plentiful of services where users can share the screenshot to. Droid Life points out that the screenshot taken with the new feature doesn’t automatically save the image in phone storage. To recall, the Now on Tap feature works by long pressing the home button within any app – Google then scans the screen and produces cards with contextual information based on the text or links.
The Google app update has started rolling out slowly via Google Play, and can be expected to hit devices running Android 6.0 Marshmallow or higher soon.
Google last week started rolling out the Android 6.0.1 Marshmallow update for its Nexus range. The Android 6.0.1 Marshmallow is the first major upgrade to arrive since Android 6.0 Marshmallow released earlier this year. Additionally, Google also released Android 6.0.1 Marshmallow factory images for the Nexus range. The update added support for the new set of emojis and could be used on Google’s Keyboard app that ships with the Nexus devices. The Android 6.0.1 Marshmallow update specifically adds new emoji characters with full support for Unicode 7.0 and 8.0 emojis.

Thursday 17 December 2015

Chinese hacker Steals $170,000 by hacking airline website and offering ticket booking


Chinese hacker defrauds hundreds of passengers by cancelling the flights and sending them re-booking offers

A 19-year-old man in Dalian, China has been arrested by the police after he was caught hacking into an airline’s website, stealing booking information from 1.6 million ticket orders, and ripping off hundreds of travelers. Using the information, the teen went on to make hundreds of fraudulent transactions that pocketed him 1.1 million Yuan ($170,000 / €156,000).
The teenager, identified as Zhang from Heilongjiang, north-east China hacked the website of a yet unnamed Chinese airline company by exploiting vulnerabilities in its B2B system. He illegally downloaded 1.6 million passengers booking details such as names, flight details, ID card numbers, email addresses, and mobile phone numbers.
He also used his access to the website to cancel some current bookings, and later, using the stolen information, he sent out groups texts, telling them that the “the plane is out of order and the flight is cancelled”. They needed to pay extra fees if they wanted to rebook. This is how the hacker made his money, by offering a re-booking link that pocketed him re-booking fees.
It took the airline three weeks to notice the data breach. The airline lost more than 80,000 yuan ($12,365 USD) from people demanding a refund.
The hack lasted from July 31 to August 20, and by August 22, the airline announced the breach after several fraud complaints from customers, and also on the same day alerted Guangzhou police.
“The suspect coded the hacking software himself,” a police officer said.
According to People’s Daily Online, authorities eventually tracked down Zhang and arrested him in Dalian, a city in North China, on November 11. A police officer said the hack was a result of a loophole in the airline’s computer system and was not highly sophisticated.

Wednesday 16 December 2015

How To Increase Internet Speed In Windows

increase internet speed in windows

H
ow is your internet speed ? Are you suffering a low bandwidth or low browsing speed, then this article will help you to increase internet speed in Windows by 20-30%.

Windows is the most popular operating system the world using today. Its fast,secure and user friendly features make it as a good partner for every one. But did you know there are some hidden features in Windows, today we are going to discuss one of such feature. This simple trick will help you to increase internet speed in Windows pc.
First of all its not a hack. Not many are aware of the fact that Windows reserves around 20% of your internet connection’s bandwidth for the operating system and the applications installed on it. So essentially at any point of time you are not able to use 100% of your internet connection’s speed. This reserved bandwidth doesn’t matter much if you have a high speed internet connection, but for those of you who have a slow internet connection, removing the 20% bandwidth limit can significantly speed up your web browsing experience and increase download speeds.
Unfortunately the group policy editor is only available on Pro, Enterprise and Ultimate versions of Windows and it can only be accessed if you are using the computer with administrator rights. However there are several tweaks available on the internet to enable it on unsupported version of Windows, but be warned that doing so can make your computer unstable. Therefore if you are looking for an tried and tested method to increase your internet connection’s speed. then you can go ahead and remove the bandwidth limit. Doing so will instantly increase internet speed in Windows by 20%.
Removing the bandwidth reserve limit on Windows can be tricky for some Windows users, since you need to make some change in the group policy editor. But if you follow the instructions provided below carefully, you’re good to go. For those who want to increase internet speed in Windows by 20%, here’s how you can use the group policy editor in windows to do so.

Increase Internet Speed In Windows

• First of all go to ” Start Menu ” or  “ Charms Bar ” and search for ” gpedit.msc ” and open the file.
• Now you can see a new window. Their click on ” Computer Configuration ” then from the list choose ” Network “.
• From network drop down list choose ” Qos Packet Scheduler “.
• Open the file ” Limit Reservable Bandwidth “.
• Then a new window will open. In their first activate ” Enable ” radio button and then change the bandwidth limit from 20 to 0. Finally Click on Apply to save the changes


What Are Phishing Scams And 10 Tips To Avoid Them

Cyber criminals are using different mode of attacks to get your personal data, Phishing Scams are one of them. Phishing Scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank,your online social account). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., password, credit card, or other account updates). The perpetrators then use this private information to commit identity theft.
Phishing Scams are usually done through email messages, websites, and phone calls are designed to steal money. Cyber criminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cyber criminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

How To Find Phishing Email 


 Spelling and bad grammar ► Cyber criminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam.
 Beware of links in email ► If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address. Links might also lead you to download some files. These kinds of file are known to spread malicious software.
 Threats ► Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cyber criminals often use threats that your security has been compromised.
• Spoofing popular websites or companies ► Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. Cyber criminals also use web addresses that resemble the names of well-known companies but are slightly altered.

Beware Of Phishing Phone Calls Too

Cyber criminals might call you on the phone and offer to help solve your computer problems or sell you a software license. So don’t fall in these types of unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes. Once they’ve gained your trust, cyber criminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

10 Tips To Avoid Phishing Scams

Here is some tips to avoid Phishing Scams keeps you from taking the bait and becoming a victim.
1. Take an Active Role
Internet links, phone calls and emails sometimes harbor ill intent. Many phishing schemers attempt to trick you in to giving up personal information like bank account and Social Security numbers. It is important to be extra cautious when information is requested through one of these avenues. For example, if you receive a phone call from someone claiming to work for your bank, hang up the phone and call the number on the back of your debit card.
2. Install Antivirus Software
The best antivirus software programs, such as Bitdefender and Kaspersky, have antiphishing functionality that protects your identity. Install the software on all of your devices, and keep it up to date.
3. Avoid Popups
Many phishing scams involve pop-up screens that ask for information like passwords and zip codes. To prevent identity theft, avoid entering personal data in those popups.
4. Filter Your Emails
Phishing scams might involve email messages that mimic those from legitimate or trusted sources. To protect yourself, look for tell-tale signs of phishing emails, including domains that don’t match the supposed source and suspicious threats that attempt to scare you in to taking a specific action.
5. Match Receipts to Statements
Keep the receipts for every purchase you make both on and offline. Then, compare them to your bank and credit card statements when they arrive every month. If you find suspicious charges, report them to your financial institution immediately.
6. Keep Personal Data Out of Correspondence
Don’t send your bank account, Social Security number or credit card information via email. If a scam artist hacks your email account, he or she enjoys unrestricted access to every email you have sent. Additionally, consider changing your email password on a regular basis and using unique passwords for every account.
7. Enter Fake Passwords
To test the legitimacy of a website, enter your username and a fake password first. If the site doesn’t flag the password as incorrect, you know you’ve landed on a fraudulent site, and the creators want to capture real passwords. Only take this step once, as some organizations lock accounts after too many failed log in attempts.
8. Practice a Friends-Only Policy
When you receive links, attachments or other media, avoid accessing them unless you recognize the sender. Since email accounts sometimes fall victim to hackers, you might ask the sender about the legitimacy of a suspicious email before you click on links or download attached files.
9. Update Your Browser
Internet browsers depend on regular updates to guard against the latest known threats. When your browser prompts you to update, don’t put it off, as this reduces internet surfing security.
10. Conduct Some Research
When an unfamiliar number shows up on your phone, run a quick Google search to determine its origin. If someone else has received a similar phone call, they might have posted about it online. The same goes for searching based on the text of a fishy email.

Where To Report Phishing Scams

 You can report a phishing scam attempt to the company that is being spoofed.
 You can also send reports to the Federal Trade Commission (FTC).
 Depending on where you live, some local authorities also accept phishing scam reports.
 Finally, you can send details to the Anti-Phishing Working Group, which is building a database of common scams to which people can refer.
Hopes this article help you to know about Phishing scams, mode of attack, tips to avoid them and where to report them. Share it and help others to protect their personal data.


Now Facebook Will Notify If Your Account Is Being Hacked By An Attacker Working On Behalf Of A Nation-State
Facebook Will Notify If Your Account Is Being Hacked
F
acebook added a new kind of feature that will help you to secure your accounts from hacking. Now Facebook will notify, if your account has been hacked by an attacker who is working on behalf of nation-state.

A blog post has been shared by Facebook on Oct. 17, saying the protection of its users accounts is more important than anything else, which is why it continuously monitors malevolent activities and provides a multitude of options to safeguard user accounts. The company is sending the notification to affected users as it claims these attacks are more dangerous and advanced as compared to others.
“Please Secure Your Accounts Now. Jay, we believe your Facebook account and other online accounts may be the target of attacks from state-sponsored actors,” reads the sample desktop notification users will receive if their accounts have been compromised.
So  if you get that Facebook notification, you should take it seriously. Notification does not indicate that Facebook’s own system has been compromised. Rather, the warning may suggest that users’ computer or smartphone houses malware that cybercriminals are using to gain illegal access into their accounts.The company recommends rebuilding or replacing any system that may have been infected by malware, as well as turning on login approvals.
Facebook added it does not disclose how they attribute particular attacks to hackers to safeguard the integrity of its processes and methods. However, it does claim it only intends to use the notifications in circumstances where the proof strongly backs its conclusion.
Additionally, turning on login approvals is a good practice to help keep other individuals from logging into other users’ accounts. Whenever accounts are accessed via new browsers or devices, Facebook will send codes to users’ phones.Facebook hopes the notification will help security-minded individuals who want to protect their data, according to Stamos. In addition, it promises it will constantly enhance its capability to detect and prevent attacks against its users.

Tuesday 15 December 2015

how to hide a secret message behind an image


Mark Zuckerberg Quit His Job At Facebook Because Of This Bug


Mark Zuckerburg Quit His Job At Facebook
Facebook CEO Mark Zuckerberg Quit his job at Facebook. Yes you heard it right. You can check it .Click here to see the Facebook post of  Mark Zuckerberg about quiting his job.
Don’t be surprised or shocked, because what you just saw was only an illusion. This is actually a minor bug in the popular social media website that allows anyone to manipulate the life event of any user who has his work status posted on Facebook. The bug, uncovered by the independent hacker Sachin Thakuri, is not a technical flaw.

How Mark Zuckerberg Quit His Job

All Thakuri did is took the original URL of Mark Zuckerberg life event:
See, Mark did left his job at Facebook. No!! Not literally though. So what Sachin Thakuri did was changed the above link by removing the ustart=1 parameter and  the work status of Mark Zuckerberg changed.Here is the changed url:
Clicking on the above manipulated URL displays the same life event page of Mark Zuckerberg but with the text: Left Job at Facebook instead displaying Started Working at Facebook. This bug is applicable to every user on Facebook who has his work status published on Facebook.
Although this is not a serious privacy or security bug, but it could be used maliciously by bad actors in order to trick victims into believing that someone have quit their job. Thakuri reported this bug to the Facebook security team, but the bug has not been fixed as of yet. So, we can expect from the company to fix this issue as soon as possible.

Microsoft Tool Where You Can Upload Image and Calculate Its Emotions


Microsoft recently released an online tool dubbed as Project Oxford, where you can upload your image and can calculate its emotional index.

Microsoft Tool “Project Oxford” -What is it?

Microsoft tool, Project Oxford is Microsoft’s collection of machine-learning application programming interfaces (APIs). It contains several tools, such as Speech API’s, Face Detection API’s, Emotion Recognition API’s etc. Now all are in beta testing period.
In all tools Emotion API is the most trendy one. In Emotion API tool detect emotions based on facial expressions in images. The Emotion API takes an image as an input, and returns the confidence across a set of emotions for each face in the image, as well as bounding box for the face, using the Face API. The emotions detected are anger, contempt, disgust, fear, happiness, neutral, sadness, and surprise. These emotions are understood to be cross-culturally and universally communicated with particular facial expressions.

how to create folder inside folder in just one click

Monday 14 December 2015


HTC Dream to Marshmallow
HTC Dream to Marshmallow

Power Paper – A Paper to Store Electricity Coming Soon


Researchers at Linkoping University’s Laboratory of Organic Electronics, Sweden, have developed “Power Paper”, a new type of material with an outstanding ability to store electricity. The material consists of nanocellulose and a conductive polymer.
Power paper is a material having one sheet, 15 centimetres in diameter and a few tenths of a millimeter thick and it is able to be recharged many hundreds of time, and in mere seconds. It is also lightweight, requires no toxic chemicals or heavy metals to create, and may offer a renewable and prolific way to provide energy to all manner of devices. Power Paper are capable of storing 1 F of electricity, which is similar to the supercapacitors currently on the market.

How Power Paper Look Like

Power Paper
The material, power paper, looks and feels like a slightly plasticky paper.The structural foundation of the material is nanocellulose, which is cellulose fibres which, using high-pressure water, are broken down into fibres as thin as 20 nm in diametre.With the cellulose fibres in a solution of water, an electrically charged polymer, also in a water solution, is added. The polymer then forms a thin coating around the fibres.
The new cellulose-polymer material has set a new world record in simultaneous conductivity for ions and electrons, which explains its exceptional capacity for energy storage. It also opens the door to continued development toward even higher capacity. Unlike the batteries and capacitors currently on the market, power paper is produced from simple materials – renewable cellulose and an easily available polymer. It is light in weight, it requires no dangerous chemicals or heavy metals and it is waterproof.
The new power paper is just like regular pulp, which has to be dehydrated when making paper. The challenge is to develop an industrial-scale process for this.

YouTube Red launched: 6 things to know



After months of speculation, Google has announced YouTube Red, a paid service based on the company’s free video-sharing platform, and music streaming app YouTube Music. Here are 6 things you should know about the two new versions of YouTube...

1. The launch of YouTube Red does not mean the end of YouTube as we know it. The free version of YouTube will still be available as a free, ad-supported product.

2. The features.. 
YouTube Red will allow users to watch ad-free videos, download videos to mobile devices, and play videos in the background while using other mobile apps. Additionally, It will include exclusive shows and movies from the big names on YouTube, such as PewDiePie, Lilly Singh and The Fine Brothers.
3. At what price? 
YouTube Red has been priced at $10 per month in the US, while the pricing for foreign market has not been announced yet.
4. When will it launch? 
The paid YouTube service will be available in the US starting 28 October, with plans to roll it out worldwide in 2016.
5. How will it affect the users? 
With Google letting users skip ads for a fee, those who do not subscribe to YouTube Red may not get to watch original YouTube shows by popular content creators. 
This may happen when YouTube Red is launched in India, as the chief business offer of YouTube Robert Kyncl said that the creators of 99% of the content watched on YouTube have agreed to make their videos available on the paid platform.
6. YouTube Music 
Google has also launched a new app called YouTube Music that is free to watch with ads. It will function much like a streaming platform, with organized channels that provide videos of each artist.

Sunday 13 December 2015

Facebook Tries To Become YouTube


Facebook vs YouTube
For a decade now, YouTube had been a go to website for any kind of video searches. The site has provided an excellent platform for the individuals and also the media corporations to showcase their product to the world. It is a source of livelihood for many people who have created their own successful YouTube channel. But now YouTube faces competition.
F
acebook is now luring media giants like NBA and Fox Sports, and others, with a revenue split from the total share of the profit that Facebook earns from their videos. Well, this is not out of generosity. Facebook has a viewership of about 4 billion videos daily and it yearns to see more, with an ultimate aim to topple YouTube from the throne.

Facebook has decided to split the revenue 45-55, where the social media giant gets 45% and the rest goes to the video creators. This is the same revenue split as the YouTube, but the company asserts it provides an advantage to the media corporations with its massive reach. Plus, it will display the videos itself without the users having to search for it. Moreover, the algorithm that Facebook has decided to use would be targeting the users as per their interests while showing more videos in the Suggested Videos Feed, much like the News Feed.
Facebook has been offering videos for a long time now, but using the pre-roll ads now would be where it is going to earn a lot more. The social network has had many changes to its business model in the past couple of years to make it a multi-billion dollar company and still rising. The company has been under a lot of criticism lately due to the way it endorses its products and the reach it provides to the small  businesses that depend on it.
Facebook does look serious this time with its new venture with the big brands to entice more users to stay on their page. It will take few months till the company’s plan surfaces, whereas it will totally depend on the public to make it a success.
Until then YouTube comfortably stays at the top of the searches when it comes to digital videos.

WordPress.com Replaces PHP with JavaScript


WordPress.com has replaced PHP with web technologies and a RESTful back-end API for the administration console.
Writing about why WordPress.com decided to move from PHP to JavaScriptMatt Mullenweg, Founder and CEO of Automattic Inc., the company behind wordpress.com, said that the foundations of the platform were not strong enough for what is to come, and some of WordPress’ strengths were also drawbacks. The main component affected by this overhaul is the administrative interface which saw a remake in version 3.8., but gave Mullenweg the conviction that an “incremental approach wouldn’t give us the improvements we needed.” He added that “backward compatibility and working without JavaScript “ were the main culprits in having the interface the way it should be.
Automattic decided back in 2014 to create a new admin interface called Calypso built using web technologies –JavaScript, HTML, CSS, Node.js, React, Flow, WebPack, Babel – and accessing the back-end through a RESTful API. Andy Peatling, Calypso Project Lead, has written on what it meant for a PHP/MySQL company to switch to JavaScript. They had a few advanced JavaScript developers who could contribute to the project, the others being “intimidated” by Calypso. They had also used Trac for project management and had done very little code review. Starting using GitHub and its pull request system followed by commit and code review helped them see “how much easier internal collaboration could be, and how to allow for much greater feedback on individual work being done.” Although initially intimidating, code review “greatly increased the quality of our codebase and helped everyone level up their JavaScript skills.” Over a period of 20 months they went from 7 contributors to 127 and over 26,000 commits. The team has also implemented continuous integration.
The new interface is a single page application with a responsive design adapting to screens of various sizes. According to this feature comparison table, Calypso is fast with near instant page loads, instant publishing, in-page previews for multiple targets, and changes are applied in real time without reloading.
#cilabs.ml 

Saturday 12 December 2015

Top Programming Languages That Generate Most Software Security Bugs

Top Programming Languages That Generate Most Software Security Bugs
Below is the list of top 10 programming languages that generate most software security bug:
Classic ASP – with 1,686 flaws/MB (1,112 critical flaws/MB)
ColdFusion – with 262 flaws/MB (227 critical flaws/MB)
PHP – with 184 flaws/MB (47 critical flaws/MB)
Java – with 51 flaws/MB (5.2 critical flaws/MB)
.NET – with 32 flaws/MB (9.7 critical flaws/MB)
C++ – with 26 flaws/MB (8.8 critical flaws/MB)
iOS – with 23 flaws/MB (0.9 critical flaws/MB)
Android – with 11 flaws/MB (0.4 critical flaws/MB)
JavaScript – with 8 flaws/MB (0.09 critical flaws/MB

#https://www.facebook.com/CILabsTrainings/?ref=hl
#www.cilabs.ml