Showing posts with label Web Technology. Show all posts

10 Tech Billionaires Who Won’t Leave Their Entire Money For Kids

This is a list of entrepreneurs who won’t let their children inherit their entire property. They would rather donate most of their hard earned money for noble causes for the sake of the well-being of the society and environment.
While most of us would be under the impression that children of the famous billionaires of the world would inherit a huge fortune to themselves, here’s the list of a famous people and couple people who have donated most of their money for the charitable causes.
These men and women have not only made it big by their sheer hard work and dedication but also contributed in making this world a better place.

1. Bill Gates:


Bill Gates is known for philanthropy. His past donations are a proof of how much is he in serving humanity than leaving behind billions for their children. Currently, Bill Gates is the master of around 85 billion dollars but he thinks that it is not a good idea to leave behind so much money for their children. From his past donations, it’s almost evident that Bill Gates is going to donate more money to his foundation called ‘Bill and Melinda Gates foundation’.
Gates said: “I definitely think leaving kids massive amounts of money is not a favor to them.”

2. Facebook Founder Mark  Zuckerberg:


Just like Bill and Melinda Gates foundation, Zuckerberg is also planning to open an initiative called Chan-Zuckerberg initiative. This initiative was announced after the birth of their daughter in December last year. Through this foundation, they want to serve humanity by promoting equality, accessibility to educational resources to unprivileged children, curing disease etc. Mark Zuckerberg‘s net worth is around 47 billion Dollars.

3. AOL co-founder Steve Case:


Case began case foundation in 1997 by Steve Case the founder of AOL. Case initiative is not just focused on donations rather it’s focused more on how to make philanthropy more effective using technology. Like Zuckerberg, he has also signed the giving pledge and he is more interested in  startups outside the Silicon valley through an investment firm called the revolution.

4. Salesforce CEO Marc Benioff:

Through his recently launched campaign called SF Gives, Benioff was able to raise $10 million for San Francisco-based nonprofit programs in just 60 days. Apart from raising funds for philanthropy, he has also asked other corporations to follow his 1/1/1 model, which says that a company should donate 1% of its equity, 1% of its employees’ time, and 1% of its resources to philanthropic efforts.

5. Qualcomm co-founder Irwin Jacobs:


Irvin Jacobs is more into donating money for educational purposes. Jacobs has donated around $500 million to charitable causes that include the Cornell Tech Roosevelt Island campus, MIT fellowships, and the San Diego Symphony. Like Mark Zuckerberg and Steve Case, he has also signed the giving pledge promising to give away at least half of the billions he made with Qualcomm.

6. EBay founder Pierre Omidyar:

Omidyar and his wife Pam signed the giving pledge in 2010. 12 years after eBay went public. They have already donated more than a billion dollars towards philanthropy since eBay became pubic.
“In 2001, I publicly stated that we intend to give away the vast majority of our wealth during our lifetime, our view is fairly simple. We have more money than our family will ever need. There’s no need. to hold onto it when it can be put to use today, to help solve some of the world’s most intractable problems.”
– The couple say in the Pledge letter.
They are most widely known for their humanity work against Human trafficking.

7. Intel co-founder Gordon Moore:


Gordon Moore famous for Moore foundation has already donated half of his wealth towards his foundation. Besides donations, he has also given away more than $1 billion to the charitable causes. His cause towards philanthropy is also as unique as of Omidyar. His foundation works more towards environmental conservation, health measures etc. He has given billions of Dollars in charity and He also signed Giving pledge along with his wife in 2012. After signing the pledge, they said:
“We are pleased to be a part of the Giving Pledge not only because we are able to commit these funds, but because we believe they can lead to real learning and measurable change.”

8 .Tesla CEO Elon Musk:


Elon Musk has already created history by venturing into the field of space technology and electric cars. Even after having five children, he’s already donated much of his $12.9 billion fortune to renewable energy, science and engineering education, and pediatric health. Elon Musk is a big donor towards technologies which are going to benefit humanity like renewable energy sources, science, and engineering etc. He receives only $1 a year for his work with Tesla.

9. Spanx CEO Sara Blakely:


Sara is the first woman to sign the Giving Pledge in 2013. Her Pledge letter read:
“I am committed to the belief that we would all be in a much better place if half the human race (women) were empowered to prosper, invent, be educated, start their own businesses, run for office – essentially be given the chance to soar!” 

10. Oracle founder Larry Ellison:


Oracle founder Ellison committed to giving away 95 percent of his wealth to charitable causes, especially to his medical foundation.
His letter to the Giving Pledge read:
Warren Buffett personally asked me to write this letter because he said I would be ‘setting an example’ and ‘influencing others’ to give. I hope he’s right.”

The easy guide on how to access the Dark Web using Tor


A complete tutorial for accessing the Dark Web using Tor on Linux, Mac and Windows PCs

The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the overall web content, the remaining part is unknown to the majority of web users.
Ordinary web users are literally shocked when understand the existence of the Deep Web, a network of interconnected systems, not indexed, having a size hundreds of times higher than the current web, around 500 times.
As the name suggests, the Dark Web is an extremely large and hidden portion of the internet, and this guide will help you to access it in a very ‘simple to follow’ guide. Let us start.

Getting started

In order to access the Dark Web, you will be required to download and installed a browser called Tor. While it is compatible with both Windows and Mac OS X, we will not be recommending you to use these platforms, and for very good reasons, which is security and of course privacy. The damage being inflicted on your operating system in the form of bugs is going to be extremely detrimental, not to mention that you might become the target of government officials, so make sure that you know what you are getting yourself into. Also, it is recommended that you are running the latest version of Mozilla Firefox, since it uses up less resources of your system and also blows up less number of whistles as far as privacy is concerned.

Download the official application

It is imperative that you read this very carefully. Do not download Tor from any other download site, and we highly recommend that you take the installation file from the official website. After you have downloaded the software, you can wish to test its legitimacy with the Tor Project’s GPG signatures as per the method below.

How to identify the legitimacy of a Tor browser download

You have to be careful every step of the way so here are the necessary steps that you should take in order to check if the software is legitimate or not.
Save the GPG signatures to the same directory as the Tor download and using these tools you can use the following process. Keep in mind that this is going to be for both the Mac and Linux platforms. Make sure that you have GPG Tools for Mac installed and GnuPG for Linux installed. Now, follow the steps given below (keep in mind that you will see the term ‘Download-Location’ at various locations of the guide. Replace this with the actual location of your download to avoid unnecessary obstacles standing in your way).
1. Import the public key of the Tor project (type in the same manner):
2. gpg –keyserver x-hkp://pool.sks-keyservers.net –recv-keys 0x4E2C6E8793298290
3. Verify on Linux using the following command: gpg –verify ~/DownloadLocation/tor-browser-linux*.tar.xz{.asc*,}
4. Verify on Mac using the following command: gpg –verify ~/DownloadLocation/TorBrowser-VERSION-osx*_en-US.dmg{.asc*,}
The results should look something like the image below:

For Windows, it is going to be a little trickier so be sure to follow the steps without missing anything
1. Get GPG for Windows. The files can be obtained from here
2. Fire up windows command prompt, or cmd (opening as Administrator is recommended)
3. Import the Tor Project signature: “C:\Program Files\Gnu\GnuPg\gpg.exe” –keyserver x-hkp://pool.sks-keyservers.net –recv-keys 0x4E2C6E8793298290
4. To verify the signature using GPG for Windows: “C:\Program Files\Gnu\GnuPg\gpg.exe” –verify C:\DownloadLocation\torbrowser-install-VERSION_en-US.exe.asc
C:\DownloadLocation\torbrowser-install-VERSION_en-US.exe
5. Keep in mind that all this process has to be carried out through cmd, or command prompt.

How to successfully install Tor on various operating systems

Here is how you will successfully be able to install the Tor browser on various platforms. Let us begin.

Linux (Debian based systems)

You will have the option of installing the Official Tor Repository and downloading it directly. This will save time and verification will be done automatically for you.
Debian: nano /etc/apt/sources.list
Insert: deb http://deb.torproject.org/torproject.org jessie main deb-src http://deb.torproject.org/torproject.org jessie main
Next, do the following:
Ctrl+O
apt-get update
apt-get install tor

Ubuntu

nano /etc/apt/sources.list
Insert: deb http://deb.torproject.org/torproject.org trusty main deb-src http://deb.torproject.org/torproject.org trusty main
Ctrl+O
apt-get update
apt-get install tor

Mac

1. Download and install Macports from here
2. Next, open a terminal and type the following command: sudo port install tor

Windows

Installing the Tor Browser to access the Dark Web on Windows is the simplest process possible. Just install the program like you would any other program.

How to navigate around the Dark Web


Keep in mind that this is not Google, but the Dark Web, so it will be difficult for you in finding your way around. This is exactly the reason why a Hidden Wiki exists. There are two versions of Hidden Wiki; one is a uncensored version, which will help you to access explicit content, or things that a righteous man would certainly condemn. As for the censored version, it will display the information as you can see in the image below.

thank you for reading :)

For More Updates Stay With US: http//:amadahmd.blogspot.com

New remote access Trojan Trochilus used in cyberespionage operations



Cyberspy group uses the Trochilus RAT program By Amad Ahmad

The program was used by a group that recently targeted organizations in Myanmar

A cyber-espionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products.
The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites.
The researchers linked the compromises to a sophisticated group of attackers known as Group 27, who are known to use different malware programs in their operations, some with overlapping capabilities.
Arbor Networks has uncovered seven malware programs used by the group so far, including three remote access Trojans: PlugX, 9002, and the new Trochilus.
"These seven packaged malware offer threat actors a variety of capabilities including the means to engage in espionage and the ability to move laterally within target networks in order to achieve more strategic access," the Arbor researchers said in a blog post.
While the Myanmar attacks provided initial insights into the group's operations, additional research revealed that the hackers' activities extend beyond that country.
When Trochilus was initially found, it had "minimal or no detection from anti-malware software," the Arbor researchers said.
While the threat is not yet widespread, Arbor published sample details and other indicators of compromise so that organizations can check their networks and systems and protect themselves in the future.

                                                        For More Updates: Click Here

Java Ruled 2015 As The Most Popular Programming Language


TIOBE Index findings reveal that Java was most popular language of 2015, closely followed by C.

Java is the most popular programming language of 2015 according to the TIOBE Index. For the uninitiated, the TIOBE index is an established ranking system used to measure the popularity of programming languages. And according this Index, 2015 was Java’s year, closely followed by C.               Read Also: The Top 21 Programming Languages of 2015

Another finding revealed by the index was that in addition to being the most popular programming language, compared to last year, Java also recorded the biggest ranking change with a 5.94% growth.

C had gained popularity at the expense of Java for past three years. Java, which was most popular in the 2000s, has again come to forefront due to Android ecosystem.  Java’s popularity has surged once again after Android-based smartphones have started dominating the mobile market.
Another programming popularity tracking index, PYPL also declared Java as the most popular programming language but its data showed that Python was steadily gaining over Java with a growth of popularity of 1.1%, compared to Java’s 0.4%.




                                                        For More Updates: Click Here

602 Gbps DDoS Attack On BBC Proves That 2016 Isn’t Going To Be Any Different


D-DOS attacks are one of the biggest enemies of a website admin. The year 2015 saw an unprecedented growth in the number of DDoS attacks. Along the similar lines, Arbor Networks recorded an attack peaking up to 334 G-bps. Well, things aren’t looking good in 2016 as a hacktivist group has taken the responsibility of the D-DOS attack on BBC website that peaked up to 602 G-bps.
On New Year’s eve, the BBC website and i Player service went down due to a massive Distributed Denial of Service (DDoS) attack. The attack peaked up to 602 G-bps, according to the claims made by the New World Hacking group, who took the responsibility of the attack. In another recent attack, the Republican presidential candidate Donald Trump’s main campaign website was also targeted by the same group.
Earlier BBC announced that the service failure was due to some technical failure. Later it rephrased that the New World Hacking group took the responsibility just to “test its capabilities.”

602 G-bps – Largest DDoS Attack in History

DDoS attacks are conducted by flooding a web server with a torrent of traffic. These attacks are widely popular and often used by hackers with an aim to bring down the websites. For more, read our guide to know how DDoS attacks work.
The BBC websites including the Player on-demand service suffered at least three hours outage on Thursday due to the DDoS attack.
This group is calling itself a hacktivist group whose main target is ISIS.  One of the members of the group – calling himself as Ownz – has told ZDNet their real motives.
Read the statement here:
We aren’t really attention seekers, then again this attack was only a test of power, but we didn’t take down BBC because they had ISIS members on the site. We took down BBC as a test of our power. We use these attacks on ISIS mostly. 
David Marcus, VP of Facebook Messaging Products
The hacking group called this just a “start of a new year.”
The group also sent a screenshot of a web interface that was allegedly used to launch these attacks. The picture indicated an attack peaking up to 602 Gbps.
If this attack size is proved to be true, it would easily surpass the past record for the largest DDoS attack of 334 Gbps in 2015 recorded by Arbor Networks.
Detailing the attack, Ownz said that they have their own ways to bypass the security layers of the Amazon Web Services. He said:
The best way to describe it is we tap into a few administrative services that Amazon is use to using. The [sic] simply set our bandwidth limit as unlimited and program our own scripts to hide it.
We have contacted the Twitter handle of the New World Hacking group for more details and we’ll be updating the article as we get some update.

                                                        For More Updates: Click Here

Website Security

Web Security Terms and Jargon

Have you ever attempted to understand all that technical jargon that goes along with web security? Some of these technical websites, while extremely important, can be almost impossible for most people to understand. The easiest solution is to click away and figure out that you will deal with any security issues as they happen. Of course, this is not the best approach at all. This article will hopefully help simplify some of the basic terms so that you can look into this topic more deeply.

URI – Uniform Resource Identifier

This is the address of your website, or the portion that shows up in the browser bar. When someone enters the first part of the address the search engines start their search. This address is then appended with additional information to deepen the search into any website.
It is the code that is added to the URI that is important when it comes to web security. You can add all kinds of elements to the main address, including links to images, elements and frames. If a hacker can override these and add things to your HTML code, you have no idea where your site might point to. Or more importantly what it might show to a visitor, parts or files of your website that you do not want exposed.
Next we will look at the types of attacks your site might experience:
  • SQL Injection – This is when an SQL command is sent to your server via the URI or through a form field.
  • Cross Site Scripting or XSS – this is one of the most common forms of attacks. The hacker uses a JavaScript code and embeds it into a document. This is done by adding a new field to the end of your URI.
  • Path Traversal – this is a function that you do not want to allow on your server. It would allow people to find all your folders on your server. You can imagine what they would do if they had this type of access.
  • Cross Site Request Forgery – the best way to describe this is by allowing information to be sent into your database. This is done by forms. Potentially it can allow any form of attacker to get access to private information such as payment and banking details.
  • Remote File Inclusion or RFI – this happens when a flaw in your website allows a hacker to add a code from another server to run on your server.
  • Phishing – this is a method that fools people into entering personal information into a bad website.
  • Clickjacking – this uses CSS and inline frames and gets people to click something without them realizing what or where they are clicking too.


                                                        For More Updates: Click Here

The Worst Hacks of 2015



Last year we witnessed some of the most shocking cyber attacks ever, with North Korea allegedly hacking Sony over the release of a dumb comedy movie to unknown hackers spilling the private nude pictures of dozens of celebrities. For some, it was the year hacking truly became the norm.
But somehow, 2015 was worse. Hacking and data breaches weren’t just the norm, but they reached far and wide, hitting victims of all kinds, from regular consumers, to government employees, and even children and cheaters. It seemed like no one was spared.
We’ve decided to look back to 2015 and revisit not only the worst data breaches, but those that pushed the boundaries and redefined the world of information security. In no particular order, here’s our list.
Israel Government Allegedly Hacks Kaspersky Lab
In the last few years, the Russian security firm Kaspersky Lab has helped uncover some of the most secretive and high profile government-led cybe rattacks and espionage operations ever, from the landmark Stuxnet to Flame, Red October, and those of the Equation Group. This year, the tables turned when Kaspersky Lab announced it had been hacked by a group of government-sponsored hackers, likely from Israel (though the firm avoided to pointing fingers, the malware used was attributed to Israel in the past). The attack on Kaspersky didn’t spill a lot of confidential data, but it was a sign of things to come: a future where malware hunters are targeted by the own spies they’re trying to uncover, using more than just intimidation tactics.
The Massive Breach at OPM, The Hack That Keeps on Giving
In May, the agency that handles practically all US government employees' data revealed it had been the victim of a month long intrusion, and that hackers had taken the personal data of around 4 million people. That was bad enough, but it turned out the breach was much, much worse than OPM let on.
For starters, hackers (likely Chinese) actually stole the personal information of at least 20 million people, including the fingerprints of 5.6 million people. But we later also learned that the personal data stolen wasn’t just stuff such as date of birth and names, but the intimate personal details of millions of government workers, including those holding security clearances. The stolen data included information on their sex lives, drug abuses, and debt—all information that could be used to blackmail them and even blow their cover. Oh, the OPM hack even involved White House correspondents.
Vigilante Hacker Hits Italian Spyware Vendor Hacking Team
In early July, the usually-quiet Twitter account of the controversial surveillance tech vendor Hacking Team got its name to “Hacked Team,” and started tweeting screenshots of internal emails, as well a link to more than 400 gigabytes of data.
“Since we have nothing to hide, we’re publishing all our emails, files, and source code,” read the tweet.
As it turned out, the company had been hacked by a hacker only known as PhineasFisher, the same mysterious vigilante who hacked Hacking Team’s competitor Gamma International in 2014. The files exposed Hacking Team’s shady customers, including Sudan and Bahrain. Thanks to the cache of internal emails and files, among many things, we also found out how someone stole the company’s equipment in Panama, how its software targeted porn sites’ visitors, and how the company could turn off customers’ spyware infrastructure thanks to a backdoor.
Think of the Children: Toymaker Gets Hacked, Loses Parents’ and Kids’ Personal Data
An anonymous hacker found a way into the servers of the multinational toy company VTech, which makes internet-connected toys. The hacker was able to access the personal data of almost 5 millions parents and 6.3 million children, including their names, home addresses, passwords, and even selfies and chat logs. The data, however, was never published online. The hacker told Motherboard that all he wanted was expose and denounce VTech’s poor security practices. As a result of the hack, the company had to take down its online services, two US senators put into question VTech’s security and privacy protections, and a 21-year-old was arrested in the UK.

“If T-Mobile can’t guarantee my Social Security number’s safety, it shouldn’t ask for it.”

Hackers Steal Social Security Numbers of 15 Million T-Mobile Customers
T-Mobile revealed in October that hackers had gained access to a server of the giant data broker Experience, getting their hands on around 15 million Social Security numbers. The third-most popular mobile phone carrier in the US tried to deflect the blame on the data broker, which was the one actually hit with the breach. But as Motherboard managing editor (and data breach victim) Adrienne Jeffrey argued, “If T-Mobile can’t guarantee my Social Security number’s safety, it shouldn’t ask for it.”
Hackers Dox Cheaters And Embarrass Infidelity Giant Ashley Madison
A mysterious group of hackers calling itself the Impact Team broke into Ashley Madison, a successful and infamous website that promised discreet affairs for married men and women. A few weeks later, the hackers released a large data trove revealing all the names of the sites’ users, as well as internal emails. The hack exposed the service’s many lies, from the faulty paid service to "full delete" an account, to its alleged army of fake women accounts. The hackers claimed it was an easy hack, saying “nobody was watching” despite the fact that emails showed the site administrators knew it was a target for cyber criminals. Most of all, the hack exposed its users secret lives, leaving some of them in despair over what to do. At least three users committed suicide, countless users got blackmailed, and some were publicly outed and doxed. Months earlier, hackers also stole data from hookup website Adult-Friend-Finder, exposing almost 4 million users and their sexual preferences.
The Massive Healthcare Data Spillage
2015 was the year of the healthcare breach, with 55 recorded ones and a whopping 100 million records stolen. The biggest one was the one suffered by the provider Anthem, which lost almost 79 million records. But there were other attacks against other big providers such as Premera and Blue Cross Blue Shield.


For More Updates: Click Here

Tired With Slow WiFi? Your Good Old FM Is Here To Help You

 Facing slower WiFi speed due to network congestion and signal interference is a very common problem. However, researchers have found a way to use FM Radio signals to solve this problem.
Living in a crowded neighborhood can seriously affect your WiFi speed. For those who don’t know, you and the people living around you, have a limited wireless frequency channels that are used by the WiFi networks to move the data. So, if there are more people around you using WiFi, there are good chances that the networks will overlap and kill your speed.
This is a very common problem, specially if you are living in a apartment. To solve this problem, Aleksandar Kuzmanovic, associate professor of electrical engineering and computer science at Northwestern University, is trying something new.
He describes the root cause of this problem as none of the WiFi devices have a reference point about the activities of the other WiFi devices. This lack of coordination and timing creates trouble, that results in poor WiFi performance.
To enable the devices to communicate with each other, researchers have developed the first system for WiFi devices that coordinates without any human involvement and operates over FM frequency.
Sharing the information via RDS (Radio Data System) data of FM, WiFi networks can operate with coordination. Talking to All Tech, Kuzmanovic says, “Devices are able to detect that there is this particular repeating structure and hence they are all able to independently come to the conclusion that hey, this must be the beginning of this particular RDS signal sequence that’s repeating in time.”
Thus, the RDS signals act like a clock for WiFi devices that harmonizes the operations of multiple devices. In a recent research paper, the researchers called this technique Wi-FM and outlined one possible scheduling algorithm.
Kuzmanovic expects his idea to be further used and spread by the industry giants like Google and Apple in their operating system.


For More Updates: Click Here

The UN Agrees To Keep Internet Free And Open For The Next 10 Years

The United Nations wants to keep the internet open and free for at least until the next decade. How successful will it be to keep the internet open and not revise the internet policies for next ten years? Know what UN thinks about the freedom of information and what could be the future of the internet.
Just like the TCP protocol, the backbone of the Internet, which is unbiased, the United Nations wants the same way to keep the internet open and free for at least until the next decade.
In 2005, for the first time, the internet policies were laid out before over 190 UN representatives from different countries around the world at the World Summit on the Information Society (WSIS). The purpose of the summit was to take a ten years review of the internet policies. In 2015, reviews of the internet policies are being said to have been successful by internet freedom advocates. And it was declared that the internet should remain in the hands of the private sector.
This meeting for internet governance was held at the perfect time as different governments across the world are making moves to crack down on internet freedom. Some of the recently seen moves by different governments are China blocking Wikipediabanning of Tor and free wifi in France after Paris attack,Internet neutrality etc. Against its open nature, some governments have also shown interest in localizing the internet. They have proposed stricter measures against internet borders and state-centric policies to ISOC. This might present a contradiction to the global internet phenomenon. Localizing the internet would impede the global development of the internet and internet might get fragmented.
However, arriving at this decision was not so easy. The decision came after a lot of debate over days by the UN representatives. Apart from the inputs from the members of WSIS, input from a variety of government representatives and non-governmental stakeholders, including internet freedom non-profit the Internet Society (ISOC) was also considered. Following which, the UN published a resolution document which covers the main four pillars of the  information society. These four main areas are internet accessibility, human rights and free speech, internet governance, and internet security.
The document released is supposed to be just considered the ‘Outcome of the meeting’, it is still not legally binding. But, it sets up the way for the internet governance for the next ten years until next meeting is held. A focus was also set on the commitment of multi-stakeholder model of internet governance and renewal of the Tunis Agenda. Tunis agenda was a consensus made in 2005 that called for lightweight internet governance and the creation of the Internet Governance forum, an annual multi-stakeholder meeting on internet policy.
Constance Bommelaer, senior director of global internet policy at ISOC said:
As the internet has come to affect all the layers of our life, we must decide, how do we build an informational society, and what are the founding principles we want to organize this society on?
Despite the positive outcome of the meeting, it is expected that there would be a pull up in the local internet security because of the terrorism hitting up the world virtually through the internet.
So, what do you think? Shall the internet be open free for global access or shall it be modified according to the local political and information society consensus?

For More Updates: Click Here