Posts

Showing posts from January, 2018
Image
Facebook on Tuesday raised the ante for messaging apps photo quality with the announcement of 4K support for Messenger. "We're making significant investments in how people communicate visually on Messenger," wrote Facebook Messenger product managers Sean Kelly and Hagen Green in an online post. Starting Tuesday, "people can send and receive photos in Messenger at 4K resolution -- or up to 4,096 x 4,096 pixels per image -- the highest quality many smartphones support." Although the need for speed in a messaging app and the size of 4K photo files would seem to work at odds with each other, that apparently is not the case with the Messenger upgrade. "Your photos will also be sent just as quickly as before, even at this new, higher resolution," Kelly and Green maintained. Click on image to zoom in on difference in resolution. Speed is important. Viewers will start to abandon content if it takes more than two seconds to start up, resear
Image
The 5G standards target billions of new devices that will connect to operators' networks over the next decade and beyond. Each device type serves a use case that can be high-volume with low throughput requirements, or low-volume but high-value from a customer's point of view. The list of use cases keeps growing as new types of devices are added to the network, and as existing devices find new use cases with embedded mobile connectivity. For instance, a GoPro-type of wearable camera helps sports fanatics capture their exciting experiences and broadcast them live worldwide through a mobile broadband connection. With cameras becoming equipped with the ability to record ultra high-definition videos, mobile broadband connectivity will need an upgrade to support the throughput and quality-of-service requirements of UHD video streamed from a consumer device in rugged or remote environments where mobile signals may be weak. A 5G network will enable such a use case

US Fingers North Korea for WannaCry Epidemic

The United States on Tuesday accused North Korea of responsibility for a global ransomware attack that locked down more than 300,000 computers in 150 countries earlier this year. The U.S. now has enough evidence to support its assertion that Pyongyang was behind the WannaCry attack in May, Homeland Security Advisor Tom Bossert told reporters at a White House press briefing. Bossert made the same accusation in an op-ed published Monday in  The Wall Street Journal . If the United States has new evidence linking North Korea to WannaCry, however, it hasn't released any of it to the public, which could pose problems. "Accurate attribution for cyberattacks is almost always a difficult task, and it's doubly so when the evidence leading to the conclusion can't be shared," noted Tim Erlin, vice president of product management and strategy at  Tripwire . "If we're going to have national security organizations delivering these types of conclusions on att

desi juggad

Image

password sniffer

Image
Wireshark Tutorial: Network & Passwords Sniffer Computers communicate using networks. These networks could be on a local area network LAN or exposed to the internet.  Network Sniffers are programs that capture low-level package data that is transmitted over a network.  An attacker can analyze this information to discover valuable information such as user ids and passwords. In this article, we will introduce you to common network sniffing techniques and tools used to sniff networks. We will also look at countermeasures that you can put in place to protect sensitive information been transmitted over a network. Topics covered in this tutorial What is network sniffing? Active and passive sniffing Hacking Activity: Sniff Network What is Media Access Control (MAC) Flooding What is network sniffing? Computers communicate by broadcasting messages on a network using IP addresses. Once a message has been sent on a network, the recipient computer with the matching IP

Arp poisoning

Image
Learn ARP Poisoning with Examples In this tutorial we will Learn - What is IP & Mac Address What is Address Resolution Protocol (ARP) Poisoning? Hacking Activity: Configure Static ARP in Windows What is IP and MAC Addresses IP Address is the acronym for Internet Protocol address.  An internet protocol address is used to uniquely identify a computer or device such as printers, storage disks on a computer network. There are currently two versions of IP addresses. IPv4 uses 32-bit numbers. Due to the massive growth of the internet, IPv6 has been developed, and it uses 128-bit numbers. IPv4 addresses are formatted in four groups of numbers separated by dots. The minimum number is 0, and the maximum number is 255. An example of an IPv4 address looks like this; 127.0.0.1 IPv6 addresses are formatted in groups of six numbers separated by full colons. The group numbers are written as 4 hexadecimal digits. An example of an IPv6 address looks like this; 2001:0db8:8

Cryptography

Image
Cryptography Tutorial: Cryptanalysis, RC4, CrypTool Information plays a vital role in the running of business, organizations, military operations, etc.  Information in the wrong hands can lead to loss of business or catastrophic results. To secure communication, a business can use cryptology to cipher information . Cryptology involves transforming information into the Nonhuman readable format and vice versa. In this article, we will introduce you to the world of cryptology and how you can secure information from falling into the wrong hands. Topics covered in this tutorial What is cryptography? What is cryptanalysis? What is cryptology? Encryption Algorithms Hacking Activity: Hack Now! What is Cryptography? Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa. Let’s illustrate this with the aid of an example. Suppose you want to send the message “I