Showing posts with label Security News. Show all posts

What Is HTTP/2 And How It Works



HTTP/2 or HTTP Version 2 is the second major version of HTTP network protocol. It is based on SPDY/2 to improve web performance to a very great extent. HTTP/2 is developed by the Hypertext Transfer Protocol working group of the Internet Engineering Task Force.
HTTP 1.1 was a major move from HTTP 1.0 as it allowed persisted connections(more than one request/response on the same HTTP connection), improved caching, new status code, Enhanced compression support, OPTION method for Cross Origin Resource Sharing in web application and much more.
HTTP/1.1 has served the Web well for more than fifteen years, but its age is starting to show. Loading a Web page is more resource intensive than ever, and loading all of those assets efficiently is difficult, because HTTP practically only allows one outstanding request per TCP connection.
Because of which, many TCP connections are created to issue parallel requests. And since there isn’t any limit on this; too many connections are used most of the times which leads to TCP congestion and unfair resource usage by browsers. It also means lots of duplicate data being transferred “on the wire”.
If too many requests are made, it hurts performance. This has led the industry to a place where it’s considered Best Practice to do things like spriting, data: inlining, domain sharding and concatenation. These hacks are indications of underlying problems in the protocol itself, and cause a number of problems on their own when used.
HTTP/2, on the other hand, enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection. It also introduces unsolicited push of representations from servers to clients. This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax. HTTP’s existing semantics remains unchanged.
At a high level, HTTP/2:
  • is binary, instead of textual
  • is fully multiplexed, instead of ordered and blocking
  • can therefore, use one connection for parallelism
  • uses header compression to reduce overhead
  • allows servers to “push” responses proactively into client caches
Read more about HTTP/2 here.


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Tor or VPN? What’s Best And Which One Should I Use?

TOR vs VPN, a futile discussion that has been into existence since the last five to ten years. You should enlighten yourself with the fact, the two of them were created to serve the same purpose of accomplishing anonymity on the internet.
The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them are meant to satisfy our belly, and the burger + fries combination does a commendable job enhancing our taste.
Talking about our anonymity saviours, they can be understood as two modes of transportation, like an aeroplane and a bus, VPN is like an aeroplane which is faster but costlier. And TOR, like the bus, is slower but cheap, can pick you up right outside your house, but that’s not the case with the aeroplane. TOR and VPN are meant to provide anonymity to you and help you hide your data and location from any “middle-man” existing in the network you’re connected to.
Now, before proceeding further, you need to read the following articles to get a better understanding about the working of TOR and VPN, if you’re not familiar with it:

When to use Tor?

The sole aim of TOR or The Onion Router, is to provide anonymity to you. It conceals your location from any probable third party by your data with some encryption layers and bouncing your data through different relays that exist in the TOR network, that are unknown to everyone using the TOR network.
Let me enlighten you with the fact, TOR encrypts your connection not your data, so if you’re sending some ‘plaintext’ information, then the exit node where the last layer of encryption is decrypted, the vulnerability exists that someone might access your unprotected data. So, it is advised that you use HTTPS connections to safeguard your data while it is on its way to the destination server.
And try not to send any confidential information like your email, phone or other personal details without any encryption, as it might serve as the means to identify you, no matter how many relays you’ve jumped through.
TOR is used in where high level of anonymity is required by the user such as in situations where you might want to act as a “Whistleblower” like Edward Snowden, who exposed NSA’s unethical acts, or if you’re under surveillance by the court of law, or if you don’t want someone to know who you are and what are you doing, or if you’re facing death threats or being stalked on the internet.
Well, TOR can’t be regarded as a full proof solution for the quest of anonymity, but the various relays present in the TOR network add to the difficulty faced by someone to trace your activity on the network, even NSA finds it difficult to identify someone on the TOR network.
Though it serves the purpose of hiding your identity, but costs your connection speed, that you’ll have to sacrifice if you want to use the TOR network. The movie buffs, and the torrenting guys will find TOR not much compelling as the high latency of the connection created while the data jumps through the relays, reduces the connection speed by a considerable amount.
It will be a wise act to use TOR only for loading static pages, which are well served on the high latency network, you’ll not be able to buffer youtube videos or download HD movies, for that need you’ll have to use VPN.

When to use VPN?

As you’ve the read the above links, and very well know that in a VPN connection an encrypted tunnel is created that allows an uninterrupted flow of your data from your device to the VPN server, which acts as your representative to the public internet.
VPN is capable of providing high speeds, can successfully meet the needs of our movies buffs and YouTubers. But in this thing also, only your connection is encrypted and not your data, so I advise you to use SSL protocol while sending some confidential data, as the VPN server has access to all the traffic you’ve initiated, but popular VPN services claim that they don’t store any logs. Well, that claim might be legitimate until any government agency asks them about your existence on their network.
A VPN network can be used in low-risk situations like if you’re not accused of some crime that you may or may not have committed, or if you want to hide yourself from various tracking tools on the internet and simply browse the internet or download torrents. They are also used to extend a company’s private network facilitating the employees to work from a remote location and still have access to the company’s resources.
VPN network can also be used to bypass geographical boundaries so as to gain access to blocked services or use the internet in places where the federal organisations have implemented network restrictions for the network users.

Final Note:

Both TOR and VPN have their pros and cons, but they are no enemies. Instead they were created to serve the same purpose, to provide anonymity to online users, but have been misunderstood as rivals. I can’t suggest you to choose one of them as each one outperforms the other on some aspects, and we can’t declare a winner in the TOR Vs VPN battle.
The need of the hour is to use both of them as per your need and proceed with serving your intentions. It is wise not to converse on their credibility and only contributes to the topic of a nugatory discussion. So, stay anonymous, stay safe.


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

How An SQL Injection Attack Works


Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works.
SQL injection attacks are one of the most common forms of cyber attacks. These attacks are very effective and about 32% of all Web applications are vulnerable to SQL injections.
SQL is a technique of code injection that is used to attack data-driven applications. Here, malicious SQL statements are inserted into any entry field for execution.
If you are not using the best practices, the notorious attackers can target your website to deploy SQL injection attacks and play with the sensitive data.
About 27% of all the web attacks are SQL injection attacks and the average cost of minor SQL injection attack is about $196,000.
We are sharing an infographic prepared by Barricade detailing different aspects of an SQL injection attack.
Take a look to know more on how an SQL injection attack works:


Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

How DDoS Attack Works?

DDoS attack is one of the favorite tools used by hackers to disrupt an online service. Here, we are going to tell you more about the attack using an easy-to-understand infographic.
Most of us are aware of the fact that DDoS attack- Distributed Denial of Service- is one of the most common attacks faced- and the recent times have seen a tremendous growth in such attacks. Recently, the New York Magazine’s website was down due to an alleged DDoS attack for more than 12 hours. For those who are new to this term, in simple works, a DDoS attack is an attempt to make an online service/website unavailable by flooding it with tons of traffic from different sources.
DDoS attack is one of the favorite tools used by hacktivists and other online groups to fulfill their motives by hiding behind a storm of HTTP request. The attacker makes a network of infected systems (botnets) by spreading malicious emails and software. After being infected, these systems could be controlled remotely and thus used to deploy a DDoS attack.
The infographic shared below is created by Ireland-based security firmBarricade and it gives a visual picture of a DDoS attack and other factors related to it. The good guys at Barricade have used various industry data to show that DDoS attacks affect more than 45% of organizations.
With an exponential growth in the internet usage, cyber vandalism and hacktivism have become more prominent and organizations face such DDoS attacks regularly. The security firm notes that launching a DDoS attack costs just $150, while its impacts could be quite expensive.
The infographic shows that China and India, followed by the U.S, are the biggest nurseries of DDoS attacks.
Take a look at this visual depiction of a DDoS attack and protect yourself and your site better:

Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Who’ll Be The Winner: Human Intelligence Vs. Artificial Intelligence

The emergence of highly advanced technologies allowing generic  selection and fabrication of complex traits, including the selection of logical reasoning abilities, suggests that Human Intelligence will co -evolve with Artificial Intelligence.
While the belief in the abundance of availability and ease of fabrication of ARTIFICIAL INTELLIGENCE (AI) is  rather exaggerated, there is yet a streak of hope as there will expectedly be a speedy evolution of HUMAN INTELLIGENCE (HI) as well.
On one hand, while it is estimated that by the year 2050, AI would gain human ability and super-human ability by 2080, other facts like the cost to sequence a human genome $1,000 and the existence of highly advanced technologies allowing generic  selection and fabrication of complex traits. This includes the selection of logical reasoning ability, which leaves us in anticipation of the colossal potential of human ability.
Although by 2015, cognitive engineering is expected to produce individuals with an IQ of over 1,000, this only enlightens the fact that future smarter people and smarter machines shall be interwoven in a complex cycle of mutual interdependence.
History has been the witness of a handful of such geniuses with extraordinary cognitive abilities like Alan Turing- who broke the German Enigma Code and conceptualized the notion of “ mechanized thoughts”. The other exceptional example being Von Neumann, who laid practical realization of  first electronics, computers through his revolutionary von Neumann Architecture

While some fear that with the advancement in AI in the future, the ordinary human may lose the ability to comprehend advancement in technologies,  there lies a counter theory to this being that ordinary human beings of future will accept MI without deep understanding of it just like we use high technology smart-phones now without any prior knowledge about its knowledge or architecture.

History stands as the witness of how great scientists back in 20th Century feared about the ignorance of the future generation about Quantum Theory in Physics. While in Today’s world a good fraction of people  not only has successfully understood the theorems, but also found brilliant applications of the same.
With advancements in technologies, human minds shall be uploaded with AI to create the beginning of “ shared thoughts “ – which shall lead to the dawn of new horizon of AI.
Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

What Is SSL Encryption and Why Is It Important?

The Internet is not a safe place and one thing everyone knows is that you’ve got to be careful when it comes to protecting your private information. There are many people out there who want to obtain your information and use it for their own personal gains. This means you have to be extremely careful as you seek to avoid this.
If you’re trying to play it safe while surfing the internet, you need to make sure you’re using a website you can trust. You can verify this by making sure the sites you visit use SSL protocol.

How SSL Protocol Works

SSL was developed by Netscape as a means to make the internet a little bit safer. SSL stands for “Secure Sockets Layer.” It’s a protocol that was developed which allows you to transmit private documents and data on the internet. SSL keeps your data encrypted by using a cryptographic system made up of two separate keys. The first key is public and the second key, which belongs to the user receiving the data, is private.
SSL is used by websites which commonly collect information like log-in data, private data such as your social security information and credit card information.

How Do You Know If a Website Uses SSL Encryption?Websites which need a SSL connection will start with “HTTPS” as opposed to “HTTP.” The acronym “HTTPS” stands for “Hyper Text Transfer Protocol Secure” which means that if implemented correctly, your data is safe to be transmitted. This means you should get into the habit of looking for the “HTTPS” in the web address of whatever site you’re using if you plan on transferring private data through the site’s server.


Sites using SSL will need to register for a digital certificate. This digital certificate allows a website to transfer private data on the internet by using a public key infrastructure, commonly referred to as simply PKI. This digital certificate is also known as a public key certificate.
It’s worth it to take a few extra minutes and do some research on the sites you use. A site with a good reputation will have great reviews and little if any instances of a security breach.

What This Means to You

Now that you know a little bit about SSL and how it works, you should have a better idea of how you can protect yourself in the digital world. The internet isn’t always a safe place but there is plenty you can do to protect your information. And knowledge equals power when it comes to maintaining your privacy.
You now know what to look for and it’s up to you to make sure that the websites that you use are reputable and trustworthy. The internet creates victims every single day but you don’t have to be one of them. Remember to always look for the “HTTPS” when making a purchase or transferring private data. The power is in your hands, so keep your eye on the address bar in your web browser and always follow your gut, if something doesn’t seem right, leave it and play it safe.

Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

10 Top Most Eerie/Interesting Things On the Deep Web


Top 10 things that you can find while surfing on the Deep Web

The web that one can access with his/her average browser is only around 10-15% of the internet. The remaining of the web is known as the ”Deep Web”. Below is a compilation of some of the most interesting/eerie things on the deep web. Interesting for those who are interested in these kind of things while eerie for a normal user who has never seen such things happening online.
The deep web can be accessed through TOR browser among other select browsers. Also, click here if you need some other links to the deep web.

1. Drugs

The most popular thing about the deep web is that you can get every drug made right from premium quality marijuana to pills and acid, which are very cautiously packed and delivered. Until recently, ‘The Silk Road’ was the most credible source for some fine bud or anything else before it was shut down.

2. Government Secrets

The deep web offers every conspiracy theory for those people who love to think that everything is a conspiracy theory. There are also many government secrets out there, of which some were taken down by the FBI.

3. Human Experimentation

This is where some of the people conduct experiments of all kinds on real live human subjects, who are mostly people that do not have a home and are picked up from the streets. This is the most screwed up and a horrifying place.

4. Hitmen

Killing someone may not be cheap, but from the looks of it, these guys actually mean business.

5. Weapons

colorized-machine-gun-photography-hd-wallpaper-1920x1080-2759
If you want to get a gun, then this is probably where the people in Europe would get one.

6. Match Fixing

Just with a click of a button, you can now do all kinds of match fixing and illegal betting down here.

7. Thieves/Burglars

This one is very unusual, where a guy on this site claims to steal anything that you want him to steal. He even sends a photo after he successfully getting your product to prove that he actually has it. In addition, he even has a list of items that have been put up for sale, which people ordered but never actually claimed.

8. Hacking

There are a large number of sites where you have guys who are up for anything. They can find people to hack anything for you, be it is your ex’s account or a top secret government website.

9. Porn

You will definitely find all kinds of creepy fantasies on the deep web that you are looking for. Also, there’s a guy who broadcasts a live hidden webcam show of his own sister, so if you’re into that kind of stuff.

10. Credit Cards

This is the place for people who wants loads of money to spend. You will find people who are ready to steal information of credit card for the right amount.

Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com

Top 5 Technical Innovations In The War Against Terrorism


Technology in the War against Terrorism

More than conventional war and deadly battles among nations our time is more concerned with terrorist attacks and the wide ranging casualties and mass panic caused by them. Naturally for most part of the world fighting terrorism is an immediacy and priority that no longer can be taken lightly. In the past 2 decades or so the world has seen a variety of most sophisticated and lethal terrorist attacks taking thousands of lives and dismantling normal livelihood for many people. With the rise of terrorism as a bigger force, technical sophistication in weaponry and maneuvers for counter w terrorism efforts is in great demand. Here, we have picked top 5 technical innovations in the war against terrorism.
Real time surveillance through aerial drones
drone
Unmanned aerial vehicles (UAV) or drones are widely being used by security agencies worldwide and in the recent years they became more important for surveillance in areas prone to terrorist activities. Security drones offer real time surveillance images of a vast area with scrupulous details. With real time sharing of surveillance images traffic and police it becomes much easier for the traffic petrol and counter terrorism forces to track and nab any potential threat.
article-2221872-15A1B477000005DC-451_634x384
Backscatter X-Ray
tsa-x-ray-backscatter-machine-800x455

Backscatter X-Ray scans are more like normal X-Ray scans but they just scan penetrating slightly past the skin surface. In detecting all types of dangerous organic and inorganic materials hidden by the carrier can be easily detected by this technology. Normally metal detectors fail to scan dangerous elements that are organic in nature and this scanning technology helps to prevent such situation with additional scan in security intensive zones. In the post September 11 scenario every major US airports embraced this security scanning technology to protect itself from any potential security threats for its crew and passengers on board. It’s a handy tool to fight the war against Terrorism.
lovely3

Corner shot gun:

war against terrorism

This gun was first developed by Israeli security forces as part of their regular research on counter terrorism measures. We all know Israeli forces have to involve in anti insurgent activities on a regular basis across the whole troubled zone of Palestine. This typically maneuverable gun was developed for fighters in Special Forces who have to undergo difficult situation in nabbing terrorists and rescuing hostages. The gun is more like a semi automatic pistol with a camera but the only difference that makes it special is its ability to bend round the corner. This facilitates shooting without making the shooter exposed to the enemy. Many police forces and counter terrorist agencies are increasingly showing interest in this ammunition to fight an effective war against terrorism.
Biometric technology



1228383_634547670001201250-1

The most important thing in combating any terrorist offensive begins with the identification of the threatening individuals that stealthily can work out an offensive plan. In the wake of the new counter terrorism measures and technologies getting information and scanning for potential threats in any individual became extremely important. Bio-metric information provides a detailed set of data concerning the behavioral and physical characteristics of the person. Bio-metric information of a person has little chance of being falsified or illegally maneuvered as this information are part of the person himself and security agencies in no time can verify the identity of an individual in question.

StingRay – stealthy device to catch cell phone signals

111014_1538_StingRayTec1

StingRay is a new surveillance device that makes capturing cell phone signals a lot easier than before. This highly sophisticated stealthy spy device just can do magic when security agencies want to identify the location of a person based on his cell phone signal. It can track cell phone signals in a variety of environments including homes, vehicles, insulated buildings or anywhere. The device works as fake cell towers and through phone data and activities such as messages, calls or emails tracks down the device location.
Stay tuned for more updates: Visit http://www.amadahmad.blogspot.com