32-Bit Vs 64-Bit Windows OS: What Is The Difference? How To Choose?

Microsoft Windows comes in many variants with barely visible feature differences. A noticeable variation is observed when we have to choose between a 32-bit or a 64-bit version. Lack of knowledge regarding the basic difference between a 32-bit and a 64-bit operation system adds to the puzzlement when it comes to deciding the appropriate version.

Microsoft started releasing 64-bit versions shortly after the launch of their well-liked and fantasized Windows XP, which had the longest product lifespan of around 14 years. Time-traveling into the history reveals that the very first implementation of the 64-bit operating system was a Unix-like UNICOS created by the supercomputer-maker Cray Inc. in 1985. The development continued and many operating systems — Mac OS X, Windows, Solaris, and the most recently Google’s Android — were baked into their 64-bit versions.

The operating system variants are designed to utilize a kind of processor architecture and named so accordingly. A 32-bit OS is designed to take advantage of the resources facilitated by a 32-bit processor (like Intel’s x86) and same is the case for a 64-bit OS. So, the topic that should be discussed first is the processor.

A ‘bit’ of knowledge

What does a bit stand for? The smallest piece of data in a computer is known as a bit or binary digit. We know that computer only understands binary language (the 0s and 1s), so, each and every bit can have only one binary value, either 0 or 1. A computer stores data in a collection of such bits known as a byte. 8 bits make up a byte, also called an octet.

Something about the 32-bit vs 64-bit processors

A processor or CPU includes a number of registers and logical circuits. Also called the brain of the computer, people often confuse CPU with the cabinet of a desktop computer. The size of the register is 32-bit in a 32-bit CPU and similar for 64-bit. The number of values that can be stored in its register are 2^32. These values are used to map the address of the memory locations present in the physical memory. So, 2^32 = 4 gigabytes is the amount of memory or RAM a 32-bit processor can access during its operation.

In the case of 64-bit, the register can store 2^64 values that amount to 16EB (exabytes) of RAM. A grand figure when to compared to 4 GB memory that could be accessed by its 32-bit older counterpart.

A 32-bit CPU can process 4 bytes of data in one CPU cycle as 8 bits are equal to 1 byte. So, if the size of the data to be processed is greater than 4 bytes, it would require the CPU to go for another cycle to process the remaining data. In the case of a 64-bit CPU, the whole data, if less than 8 bytes, could be processed in a single go. Even if the data is more than 8 bytes, the 64-bit processor would require less time than the other one. You’ll not be able to notice much difference in normal day usage, except that you are the one who likes to multi-task between heavy applications. A 64-bit processor comes in multi-core options enabling more processing power without increasing the size of the hardware.

Scientists Discover Matrix-like Technique To ‘Upload Knowledge To Your Brain’

Scientists have discovered that feeding knowledge directly into the brain could be as easy as going to sleep. This was made possible at HRL laboratories based in California where researchers claimed a 33 percent improved learning. It seems, soon the Matrix-movie like realities could be a possibility.

Uploading-information-to-brain

Imitating the same efforts at HRL Laboratories, based in California, researchers are finding out a way to upload information to the brain. They are also successful on a much smaller scale than seen in the movies.

Researchers working on this claim to have developed a simulator which can feed information directly into a person’s brain. Once the information is fed, that can be used to teach a person new skills in a shorter amount of time.

We have already seen in the Matrix movie that the protagonist Neo is able to learn kung fu in seconds after the martial art is ‘uploaded’ straight to his brain.

Gmailify – Gmail App Now Gives you Gmail Features on Non-Gmail Email Accounts

gmail

Google is rolling out a new feature to their Gmail application that enhances your third party email accounts. Those who have a Yahoo! Mail or Hotmail/Outlook.com email address, you can now enable Gmailify for that account and get Gmail type features like spam protection and inbox organization. Google says they’re looking to add support for other email providers in the future.

If this is your first time using Google’s client with a non-Gmail account, you’ll need to create a new Gmail address to link to. And it wants more. A user’s existing email account will be linked to Gmail and in turn users will get such features as inbox organization through smart categories and other filters, spam protection, and even have Google Now cards appear based on their emails.

If you’d like to Gmailify your email, there are some restrictions. According to the blog post, Google is planning to add other email providers beyond Yahoo!, Hotmail and Outlook in the future. For the past year, Google’s Gmail app for Android has allowed users to access third-party email accounts such as those from Yahoo or Outlook. That feature let non-Gmail folks enjoy Google’s Gmail app, but it didn’t give them some of the same features of Gmail, like spam protection. It’s a nice feature, and I’m sure that Google is hoping that after experiencing the best features that Google has to offer, some folks will end up signing up for Gmail to get an account that enjoys all of these features natively. So far this feature is only available on Android, but it will likely also be rolled out to the iOS Gmail app.

Google’s blog post did not indicate that a Gmail app update would be required to activate these new features, so the change is probably a server-side switch that should go live soon. We agree. So starting today, if you use Yahoo! Better yet, Google says more providers are now in the works.

Quantum Super Computer Detects and Self-corrects its Errors

 

How would you feel when the one thing that separates humans from machines is drawn out. Feverish? Happy? Weird? Yes, this new generation  quantum computer will do the irreversible. It has got the conscience. It can self-check for errors and suppresses them without human invigilation.

 quantum-robo
team of quantum physicists in Martinis Lab have come a step closer in creating the circuitry that would allow them to process supercomputing done by quantum computers. The revolution is promised by the new quantum bits (qubits) compared to the previously done classical computing. Qubits infuse the system with high levels of reliability and speed, thus building foundations for large scale superconducting quantum computers.Till now computing has been done by classical methods in which the bits were either in states 0 or 1, but qubits exist at all the positions simultaneously, in different dimensions. This special property of being omnipresent is called ‘superpositioning’. However, one of the difficulties is keeping the qubits stable to reproduce the same result each time. This superpositioning characteristic makes qubits prone to ‘flipping’, therefore making it difficult to work with.

Julian Kelly, graduate student researcher and co-lead author of a research paper that was published in the journal Nature said:

It’s hard to process information if it disappears.

Quantum error detection and correction happens because of its usage of parity information i.e. measuring the data change from original one whereas Classical computing uses duplication of data for error detection. That means we have to extract information without destroying quantum nature of qubits. The hurdle that comes in processing the information is that the quantum state cannot be measured. It would lock the qubit, forcing it into a specific state and thus losing its superpositioning power.

World’s cheapest smartphone priced at Rs 251 (below 4$) to hit Indian market today…!!!

worlds-cheapest-smartphone-priced-at-rs-251-to-hit-indian-market-todayUntitled

 

NEW DELHI: Noida-based Ringing Bells is all set to launch the world’s cheapest 3G smartphone at just Rs 251(less than $4) in India, in a move to disrupt the surging smartphone market in India, which recently became the world’s second largest market after China, surpassing the US.

The country is already seeing the average selling price of smartphones dropping down month over month due to intense competition among domestic and Chinese handset players. The introduction of this ultra affordable smartphone will further catalyze the market, and will help bring millions of Indians online

The Freedom 251 will be officially unveiled in New Delhi on Wednesday evening at an event that will be presided over by Dr. Murli Manohar Joshi, MP, with the Union Defence Minister Sri Manohar Parrikar as the Chief Guest.

Booking for this smartphone starts tomorrow at 6:00AM, and the window will be open till February 21, 8:00PM.

According to the company website, the device features 4-inch display, 1.3GHz quad-core processor, 1GB RAM, 8GB internal storage (expandable up to 32GB), 3.2-megapixel back camera, 0.3-megapixel front camera, and a 1450mAh battery.

The company said that the Freedom 251 smartphone has been developed ‘with immense support’ from the government and is touting it as a success story of PM Modi’s flagship ‘Make in India’ scheme.

At present, smartphones available in the market are priced around Rs 1,500. Last year, DataWind had announced that it is teaming up with Anil Ambani-owned Reliance CommunicationsBSE 0.81 % (RCOM) to launch the world’s most affordable smartphone, priced at Rs 999. The phone is yet to hit the market.

Established last year, Ringing Bells will start with the assembly of handsets in Phase-I and aims at full indigenous development of the feature-rich smartphones. It did not disclose any other details about manufacturing, products and pricing.

A new entrant in the Indian mobile phone market, Ringing Bells had launched one of India’s cheapest 4G smartphone at Rs 2,999, recently. It has launched two other feature phones in the market.

Microsoft Is Making Its Own SIM Cards For Windows Devices

Microsoft is working to make its own SIM cards that will help Windows 10 users avoid the messy contract schemes of cellular carriers. This SIM card will work with a new “Cellular Data” app that’ll let you buy mobile data using your Microsoft account.

12115839_980631525308487_5293090025759815108_n

A new app from Microsoft has been spotted on Windows Store that allows the Windows 10 users to access the internet data without a contract. The new “Cellular Data” app gives a user the choice to buy a data plan using the Microsoft account and access the internet easily.

This app suggests that Redmond is developing its own SIM cards that will be compatible with Windows devices. While the company hasn’t revealed the exact markets where it would sell the SIM cards, Windows Store information about Cellular Data app mentions that the service will be available in domestic markets with international roaming in the pipeline.

The company explains on Windows Store: “Now you can buy and use mobile data at your own convenience. Purchase a plan via Windows Store anywhere network coverage is available”.

The company adds that Cellular Data app works solely with some particular Windows 10 devices and needs a Microsoft SIM card.

Features of Microsoft SIM card and Cellular Data app:

  • Get online anywhere regardless of Wi-Fi availability.
  • Purchase cellular data when and where you need it – no fixed contracts.
  • Experience a more secure network using cellular connectivity.
  • Get in control of cost and data usage by checking your balance in real-time.

While it would be unfair to compare the service directly to Google’s Project Fi, Microsoft is taking some inspiration from search engine giant and learning some new tricks to make things easier for its users. It’s possible that Microsoft is busy planning to enter into partnerships with mobile carriers to create its own mobile network.

Microsoft could also adopt a strategy similar to Apple’s own SIM cards for providing cheaper internet services.

About the launch date, partner carriers and pricing details, we’ll have to wait and see.

First Large Scale Test of 5G Wireless Delivers Amazing 3.6Gbps Speed

Huawei and NTT DOCOMO have delivered a promising performance of 3.6Gbps speed. This is the first large-scale field testing of 5G wireless networks.

5g-wireless-network

Do you miss your slow data connection before you switched over to 4G LTE? I bet you don’t miss it at all. Well, thing are going to change once again with 5G wireless networks.

The current 4G LTE networks provide an average 20Mbps download speeds and if you are lucky, you get a little bit more. But, how fast do you expect the next-generation 5G network to be?

Few months ago, the International Telecommunication Union standardized that the 5G data speeds should reach up to 20Gbps speeds. Now, Huawei and NTT DOCOMO, in its “large-scale field trial” of 5G wireless networks, have registered a mindblowing 1.34Gbps speed that peaked at 3.6Gbps.

These early results of a large trial are pretty promising as they are nearly four times the Google Fiber’s speed and twice the Comcast’s fiber service.

This test was carried out in Chengdu, China. This large-scale multi-user MIMO (MU-MIMO) test involved the use of 24 devices simultaneously on 5G network.

Also read: Your WiFi Router Has a Superpower You Didn’t Know

“Results like these show we are making rapid progress and are on the right path,” said Dr. Wen Tong, Huawei Fellow and CTO of Huawei Wireless Networks, in a statement. “I am confident that what we have learned here will be reflected in even more innovative technological advances as we continue working on 5G research.”

“This joint field trial represents a significant advance toward fulfilling Huawei’s commitment to developing 5G technology standards before 2018,” Wen Tong added.

Say Goodbye To GPS! India’s All Set To Switch To The Desi Navigation System, IRNSS

mo_1449578453
It’s time we move away from the American Global Positioning System (GPS) and make way for our own desi navigation system — the Indian Regional Navigation Satellite System or IRNSS on our mobile phones.

In October 2015, Isro held a major meeting in Bangalore involving location and navigation device manufacturers, mobile phone manufacturers and global information system (GIS) technology developers where the advantages of using the IRNSS technology over the current GPS technology was showcased.
Isro feels that seven IRNSS constellation satellites once operational by July next year will be significantly more accurate than the American GPS system.

Unlike American GPS, Isro is recommending a small additional hardware in handheld devices that can receive S-Band signals from IRNSS satellites and inclusion of a code in the phone software to receive L-Band signals.
“Both these L and S-band signals received from seven satellite constellation of the IRNSS are being calculated by a special embedded software which reduces the errors caused by atmospheric disturbances significantly. This, in turn, gives a superior quality location accuracy than the American GPS system,” says a senior Isro official.
All the seven satellites of Indian Regional Navigation Satellite System (IRNSS) are expected to be in orbit by March 2016, Indian Space Research Organisation.
ISRO also aims to make signals available not only to India and surrounding countries but also to the entire globe, ISRO Chairman Kiran Kumar said.

This Computer Cluster Cracks Every Windows Password in 5.5-hours or Less

A password-cracking expert has created a new computer cluster that cycles about 350 billion guesses per second and it can crack any Windows password in 5.5 hours or less.

password-crack-windows-1

Is your password safe enough? If you are feeling confident enough, take a minute and read this story. A password-cracking expert has revealed a new computer cluster that can crack any Windows passwords in less than six hours.

This beast cycles about 350 billion guesses per second and it could use a new virtualization software that gets juice from 25 GPUs (AMD Radeon graphics card). The 64 bit Linux-based GPU cluster runs the Virtual OpenCL cluster platform that allows these graphics cards to work as if they are on a single computer.

Ars Technica writes that this cluster touches the 350 billion-guess-per-second speed while cracking password hashes generated by the NTLM cryptographic algorithm, that Microsoft uses in Windows operating systems.

This means, the cluster can try n mammoth 95password combinations in just 5.5 hours. This amazing set of tries is enough to brute force every possible 8-character password that can contain digits, upper and lower case letters, and symbols.

The Virtual OpenCL cluster platform works along with ocl-Hashcat Plus- a free password-cracking tool. The cluster isn’t limited to brute force attacks and it deploys other techniques like dictionary attacks to crack every possible password combination.

Jeremi M Gosney, Founder and CEO of Stricture Consulting Group tells Ars, “before VCL people were trying lots of different things to varying degrees of success.”

He adds, “VCL put an end to all of this, because now we have a generic solution that works right out of the box, and handles all of that complexity for you automatically. It’s also really easy to manage because all of your compute nodes only have to have VCL installed, nothing else. You only have your software installed on the cluster controller.”

This beast was created using:

  • Five 4U servers
  • 25 AMD Radeon GPUs
    • 10x HD 7970
    • 4x HD 5970 (dual GPU)
    • 3x HD 6990 (dual GPU)
    • 1x HD 5870
  • 4x SDR Infiniband interconnect
  • 7kW of electricity

This New ‘Skyscraper’ Chip Could Make Computers Run 1,000 Times Faster

Researchers and Engineers at Standford have fabricated a skyscraper chip which replaces the conventional Silicon chip and is much faster. Nanomaterials have been used in designing and fabrication of these chips.

skyscraper-chip-faster

Researchers from different Universities and Standford engineers, along with assistant professors, are working over a new computer chip where nanomaterials have been used instead of the conventional silicon chips. These nanomaterials can also be stacked, thus changing the face of the chip from a landscape to  a more efficient ‘skyscraper’ approach.

Referring to the conventional chip design method as suburb design where layouts create the traffic jam in the electronic circuit, thus wasting time and energy, Skyscraper chip will be much more efficient. The traffic jam bottleneck will be addressed by integrating processors and memories in the form of floors of a high rising building thus, creating an innumerable number of permutation and combination for the traffic flow and the energy consumption optimization.

In the past, such trials of creating stacked Silicon chips have been performed. However, due to extremely precise Silicon fabrication process, it needs extremely machine dexterity in stacking two Silicon chips together while fabrication. But, with Skyscraper approach, two Silicon chips can be fabricated differently and later, can be stacked over each other using thousand of wires, a relatively much easier approach. And keeping these points in view, new Skyscraper chip with Nano-material was fabricated. These nanomaterials are actually Carbon Nanotube transistors which have replaced conventional transistors in the design.

Surprisingly, the same team also has replaced conventional silicon chips with resistive random-access memory, or RRAM. RRAM uses tiny jolts of electricity to switch memory cells between the binary states of zero and one. Millions of devices called vias are used to connect each RRAM like tiny electronic ‘elevators’ that allow data to travel over much smaller distances than traditional circuits. The thermo-coolers installed in between the layers make sure that the generated heat does not accumulate, doing long term degradation.

To demonstrate the proof of concept, the same team also demonstrated a four-layer prototype model made from two layers of RRAM memory and two layers of CNTs at the 2014 International Electron Devices Meeting. In their upcoming IEEE paper, they have simulated the result showing how skyscraper approach is 1,000 times more efficient than conventional chip design system.

Are you hopeful about this revolutionary Skyscraper chip? Tell us in the comments below.

Source/Image credits: Stanford.edu

This Is World’s First Commercial Remote-Controlled Drone Powered By Ubuntu

UAVIA, a french company has recently demonstrated the world’s first commercial remote-controlled drones powered by Ubuntu at an event in London. These 100% remotely operable drones are expected to be available in the market soon.

Commercial-remote-controlled-drones

World’s first commercial remote-controlled drones that run on Snappy Ubuntu will soon be available as a mainstream commercial product. This announcement was made by the French company UAVIA, a company adept in making vigilance and surveillance drones which can be remotely controlled from the ground without any human intervention. The whole was made at Copper Box theater in Queen Elizabeth park in London, England during TechCrunch disrupt event.

For remote-controlled drones, failsafe, security and remote software deployments are the key factors to disengage the full potential of Commercial remote-controlled drones. The snappy Ubuntu core operating system is the perfect operating system to unlock the full potential of such flying devices making autonomous flights.

To add more agility to its service towards Commercial Remote-Controlled Drones, UAVIA has developed an in-house cloud control technology. This cloud control technology helps in better remote surveillance of the remote flyers without any human intervention for fully remote controlled drones of new generations.

For drones to become mainstream, we need more of them to become autonomous and we need to facilitate their maintenance

– explains Maarten Ectors, Vice President Internet of Things at UAVIA.

Ubuntu Core is key to unlocking the full drone potential. It brings  onboard intelligence to help drones progress towards autonomous flight thanks to sense and avoid technologies.

Smartphones may disappear in five years, says study

rtx1xpgk_647_121015035209

Smartphones will become obsolete within five years and would be replaced with artificial intelligence, according to a consumer survey by the Ericsson owned ConsumerLab.

Half of the study’s respondents said they thought mobile technology would be redundant by 2021 as the growth of artificial intelligence starts enabling interaction with objects without the need for a phone or tablet, Sydney Morning Herald reported.

“A smartphone in the hand, it’s really not that practical. For example, not when one is driving a car or cooking. And there are many situations where display screens are not so good. Therefore, one in two think that smartphones will belong to the past within five years,” Ericsson ConsumerLab’s Rebecka Cedering Angstrom was quoted as saying.

The research lab surveyed 100,000 people across Sweden and 39 other countries.

With around 1.9 billion smartphone users globally, this means ConsumerLab covered just 0.0052 per cent of active users for its study.

Why linux based OS is better than windows or any other OS and why hackers use Linux

Why-do-hackers-use-linux (1)

Linux use is growing at an amazing rate. This operating system, which has no public relations department, advertising, or government lobby, is being used widely in homes and server rooms alike. It’s also free, and 100% open source, meaning anyone can look at each and every line of code in the Linux kernel. Linux is a true multiuser operating system, and has been since the very first version. It is powerful in it’s simplicity. Though there are robust graphical environments and tools, you can still do everything you could possibly need with just a keyboard and a shell prompt. Since you have the code, you could even make Linux do things it was never meant to.

That’s one of the things that draws both the gurus and the attackers alike. The black-hats have thronged to Linux. It allows them the control they require to do strange and ingenious things. If they want to experiment with new or invalid network packets, they can do so easily without relying on undocumented (or non-existant) API support from the vendor.

Millions of lines of code have been written for Linux applications and libraries, usually in an extremely modular manner, which allows it to be integrated into widely diverse projects. For example a library that allows you to sniff the network for proactive performance monitoring could be used as part of network hijacking code.

The power and flexibility of Linux makes it the hacker’s playground. They use it, learn it, and understand it intimately. And that means that if there’s an insecurity, they’re going to find it. However the very reasons the hackers like Linux are the same reasons more folks are installing it on their own systems today. The ability to look at each and every line of Linux code, and patch it when problems arise, means that Linux can be secured not just by a few programmers locked away in some corporate headquarters, but by any user at any time..

Why Do Hackers use LINUX?

1 : Low cost: You don’t need to spend time and money to obtain licenses since Linux and much of its software come with the GNU General Public License.

2 : Stability : Linux doesn’t need to be rebooted periodically to maintain performance levels. It doesn’t freeze up or slow down over time due to memory leaks and such. Continuous up-times of hundreds of days (up to a year or more) are not uncommon.

 3 : Network friendliness : Linux was developed by a group of programmers over the Internet and has therefore strong support for network functionality; client and server systems can be easily set up on any computer running Linux. It can perform tasks such as network backups faster and more reliably than alternative systems.

4 : Flexibility : Linux can be used for high performance server applications, desktop applications, and embedded systems.

5 : Compatibility : It runs all common Unix software packages and can process all common file formats.

6 : Full use of hard disk : Linux continues work well even when the hard disk is almost full.

7 : Multitasking : Linux is designed to do many things at the same time; e.g., a large printing job in the background won’t slow down your other work.

8 : Open Source : If you develop software that requires knowledge or modification of the operating system code, Linux’s source code is at your fingertips. Most Linux applications are Open Source as well.

9 : Fast and easy installation: Most Linux distributions come with user-friendly installation and setup programs. Popular Linux distributions come with tools that make installation of additional software very user friendly as well.

Kudos! Microsoft Does It Once Again

hacked

Microsoft, long known for harbouring different kinds of malware, this time, “unveils” bootkit, a malware which loads even before the Windows loads itself up. Formatting of drive and uninstallation does not work against it. This malware is targeting financial institutes to fiddle around with their high-valued data.

icrosoft, a fun playground for the feather-capped hackers (Forget about the big daddies), has the proven credibility to offer something to play with to all the hackers, irrespective of their caste, colour, or country. And, before you boast that you have sufficient knowledge of all kinds of viruses on Microsoft’s Windows since the era of Windows XP, rethink. A new kind of virus has been found on Windows named as “bootkit” which strikes right at the fundamentals of Windows just like ISIS striking Paris at their home ground. And kudos! Microsoft does it once again.

It’s a common notion that all the viruses, worms, malware and trojans get activated after booting up the PC at least once. Well, not in this case. This malware is like a hungry wolf who does not want to wait for the prey to come rather it attacks before the prey shows up. Yes, you got it right. This malware loads up itself even before the poor slow-loading Windows wakes from the sleep.

 Now the issue is that since the malware gets loaded even before the Windows loads up, it’s becoming very hard for the Windows to identify the virus, forget about removing it.

If you are thinking about formatting or a complete installation of fresh Windows is going to help you, Nah! the virus is promiscuous enough to hide in the root of your device. Many people are terming this attack equivalent to NSA attack where even the formatting or reformatting of the disc and device did not work.

The threat group behind all this ill-motivated activities is thought to be a part of malware ecosystem called “Nemesis”. These financially motivated attackers are surely after stealing the credit and debit card details and ATM operations. Such attacks have been seen in past but this time, the issue seems real monstrous. We hope Microsoft and financial institutions recover before it’s too late.

Here’s How Hackers Can Control Your Entire Digital Life in Minutes

you-are-not-safe-hack

Very often, people using less technology in their lives, assume that they are not as prone to cyber threats as compared to the people using smart devices at home, storing every gram of their data in the cloud, and managing a circus of social networking accounts. People think that if they’are not active online, there’s no chance of being targeted by a hacker and facing some hacking attack.

o break this notion, recently The New York Times conducted an experiment that involved Mrs. Walsh, a grandmother of six, who volunteered to allow two hackers to try and hack her home. And wait for it- she doesn’t consider herself to be a very digital person. So, she’s kind of invincible, right?

Mrs. Patty Walsh tells that her home isn’t equipped with the so-called army of the modern day “smart-devices.” However, she has a Facebook page, but she doesn’t like posting personal things about herself. She mentions, “I don’t post things about myself and don’t really understand why other people do.”

But, that single Facebook account was enough for the hackers to uncover her entire digital life. Even though it was comparatively locked and here privacy settings were intact, the hackers found her Facebook account days before visiting her house.

The hackers noticed that Mrs. Walsh had liked a page maintained byChange.org and thus they got their first passage into her life. In just 10 minutes, they created a fake email from Change.org and fooled her into signing a fake petition via e-mail.

The link in the e-mail led Mrs. Walsh to a malicious page, where she was asked to enter her mail, address, and password. Well, to save her from some actual harm, the hackers used a service called Phish5 that doesn’t store the passwords and just tests the phishing cons in the wild.

Most of the times we commit the blunder of using te same password again and again at multiple places to avoid confusion. But, this could prove fatal just in case any one of those accounts is compromised. Same was the case with Mrs. Walsh and she later confessed the fact that she was using the same password across all her accounts.

Later, when the hackers visited her home, she greeted them warmly. On a heart-shaped chalkboard, “Welcome Hackers” was written on the front door. Inside the house, Reed Loden, the 27-year-old director of security of HackerOne, a San Francisco security start-up, and Michiel Prins, the 25-year-old co-founder of HackerOne, were welcomed with sandwiches, iced tea and deviled eggs.

Mrs. Walsh was surprised to see that the hackers didn’t fit the images she had in her mind and they even ended their sentences with “thank you, ma’am.” She said, “They’re very polite.”

They had earlier compromised her online life by just a fishing mail attack and now it was the turn of her home. The hackers soon found a way to open her garage door using  a brute force attack.

They also found ways to intercept her TV using its I.P. address and were able to control the television remotely. Doing something that Mrs. Walsh didn’t approve, hackers bought a three-hour package of a set of adult cable channels. Mrs. Walsh said, “What’s so wrong about getting into my TV. I can see how that would be a little shocking to guests.”

Now it was the turn of her PC and by compromising her router, hackers were able to control the internet. They also accessed Mrs. Walsh’s and her daughter’s mail accounts as the browser was set to auto-fill the passwords. Hackers used their access to send her daughter a mail: “Reminder: Change my password.”

They also gained access to her PayPal accounts, here Social Security number, her insurance information, here air miles account and they even accessed her power of attorney forms.

After scanning her PC, the hackers found about 20 malicious spyware programs, including a Bitcoin miner. The other programs were DefaultTab, FunWebProducts, SearchProtect, SlimCleaner and Supreme Savings, that being were used to spy on her browsing and serve annoying ads.

Later, the hackers sat down for a debriefing with Mrs. Walsh, where they outlined the critical points and asked her to change all the passwords and use a password manager. She was also advised to use the two-step authenticationand told how to beware of the phishing attacks.

She was also advised to switch on the automatic updates on her phone and PC to keep them updated with latest security fixes. Later, she invited both of them to the upcoming Thanksgiving dinner.

Mrs. Walsh committed some mistakes that are very common, but it’s very easy to avoid them. Well, this isn’t a story that seems very strange or surprising. This can happen to everybody, including you

Here are some articles focused on security, read them and follow the basic security practices:

Did you find this article helpful, tell us in the comments below.

Google, Microsoft, Apple and Mozilla Working Together On WebAssembly For Faster Web

webassembly-javascript-google-mozilla

The genius minds at Google, Microsoft, Mozilla and Apple are coming together to create WebAssembly (also known as wasm). This is a new binary format – bytecode – to be used in browsers in future and promises about 20 times faster performance. Bytecode is a machine-readable instruction set that is faster for web browser to load as compared to high-level programming languages.

The reason behind this new binary format was to overcome the problems in the execution of JavaScript. The web hasn’t yet utilized the full potential of asm.js and the giants like Google, Microsoft, Apple and Mozilla are teaming up to create this successor.JavaScript creator and former Mozilla CEO Brendan Eich said that asm.js is awesome but once the engine optimize for it, the parser becomes very hot spot especially on mobile devices. The transport compression is needed for compression to save bandwidth but the decompression before parsing hurts and overloads the system. He adds that JavaScript isn’t going away anywhere in future but WebAssembly would makes things easier.

WebAssembly will provide developers a single compilation target for the web and it will be developed as a web standard to be implemented in all browsers. This will make browsers more efficient target for compilers as compared to plain JavaScript.

WebAssembly is expected to grow into portable bytecode for browsers. The early prototypes are showing some advantages like the binary representation is 20 times faster to parse (compared to equivalent asm.js).

The main teams working on WebAssembly are PNaCl team of Google andasm.js team of Mozilla, and they are working to combine their best. There is no formal standards body behind it and it is still in the early stages of development but with major browser makers backing it, WebAssembly has a bright future.

With WebAssembly’s arrival, JavaScript isn’t going anywhere. It is expected that both of these will work side by side. TechCrunch writes that some parts of application may use WebAssembly based modules while the user interface will be written mostly in JavaScript.

Bengaluru (India) Company Aims To Beat Google, Facebook With Tiny Chip

49450209

BENGALURU: A tiny chip designed in Bengaluru, the size of a postage stamp, might hold the answer to connecting India’s rural population to the internet, an ambitious goal being chased by the likes of Google, Facebook and Microsoft.
The chip, called Pruthvi, powers a system which can use television White Space — or wasted spectrum bandwidth — to beam internet to scores of households. This innovation by Saankhya Labs, is important in today’s India, where on one hand the government is pushing its ambitious ‘Digital India’ programme and on the other, large technology companies are working on similar goals.
“World over regulatory authorities are using or planning to use this spectrum for their respective connectivity programmes. India can take the lead in both technology and the markets for TV White Space-based broadband delivery. And how long can the government not push the envelope… It’s got to be expedited sooner than later,” said Parag Naik, CEO and co-founder of Saankhya Labs.
Founded in 2007 by Naik, Hemant Mallapur and Vishwakumara Kayargadde, the company has developed a system called Meghdoot, powered by its Pruthvi chip, which can utilize the existing TV White Space bandwidth available in India to provide wireless broadband to remote areas. TV White Space refers to the unused spectrum between active TV channels that are traditionally used for over-the-air transmission using TV towers and rooftop antennas. In India, this mainly refers to the spectrum used by the likes of Prasar Bharti.
The Meghdoot product family consists of a base station and user-side modem that can together provide Wireless Rural Broadband using the TV White Space spectrum from 400 to 800MHz.
The technology does not require line-of-sight, thus ensuring longer range, and can serve up to a radius of 10-15km depending on antenna tower height and transmit power. The range can also be further increased with more powerful and taller antennas.
The company is soon set to conduct field trials across the country in collaboration with IIT-Bombay, IIT-Delhi and IIT-Hyderabad. They are also in discussions with Microsoft to do trials at Srikakulam in Andhra Pradesh.
The Meghdoot product line is compliant to the Wi-FAR standard, making the device compatible for use in other countries too. The company is also engaged with partners for trials in the Philippines, the US and Singapore.

China Launching Hack Proof Quantum Communications Network In 2016

quantum-communication-china

Short Bytes: In the dawn of modern warfare of subtle cyber intrusions, China is ready and set to use world’s first and largest hack proof quantum communication network. The unhackable quantum communication network will be launched in 2016 and will stretch from Beijing to Shanghai.

 After whistleblower Edward Snowden’s revelations, the entire world was aware of America’s sinister plans to target “network backbones” worldwide. China as its counter is now a step closer to design and use the world’s most secure encryption technology for communication.

The “network backbones” are the net grids where a huge amount of data is transferred and if under attack, could pose a serious threat to any nation. China has claimed of putting to use a new “unhackable” quantum network that will stretch from Beijing to Shanghai by 2016.

Although the quantum communication technology was first proposed by IBM scientists in the 1980s, the technical limitations like maintaining the qubits’ ever-changing quantum state such as their spin over large distances, rendered the idea to a slumber.

There had been a recent surge in developing Quantum computers but in the wake of the cyber intrusions, China will become the first country to use the encrypted quantum communication network on such a large scale. Reports suggest that by 2030, Chinese super secure network will extend across the globe.

Xinhua, the official press agency for China said the network would specifically be used by the institutions that could be the potential targets like central government, military and critical business institutions like banks. Later, the hack proof quantum communication network will be extended to general use as well.

China has progressed in the quantum technology field due to major funding to its research and development programs. Several other countries like Japan, Canada, EU and even the US are planning to launch quantum communication satellites.

The stress is laid on developing a quantum communication network because the system is hack proof and unbreakable, theoretically. If anyone tries to intercept the encryption key, the qubits’ physical state will be altered and the information lost. Also, an alarm will be triggered to alert the communicators.

So basically, the new hack-proof quantum communication network will be the bigger and badder version of Enigma.

New Facebook App allows users to see who deleted them

downloadFinally there is help at hand for those Facebook users who have hundreds of followers. One of the problems of having many followers and friends is that you dont know who has deleted you from the friends list. Who Deleted Me app for both Android and iOS allows users to keep track of their friends list and find out who deleted them.

According to TheNextWeb.com, the app is similar to Who Unfollowed Me for Twitter, which tells the users when friends have disappeared from their list and whether they have deactivated their accounts or actually deleted the user.

When the users download the app it will not show them friends who have deleted them in the earlier period. It only starts tracking from the time the user activate it. Also, it shows the users their newest friends, people they have chosen to block and a ‘last seen’ stamp for everyone in their list.

The App has been created by Exeter-based developer Anthony Kuske and is available for free on Android and iOS. There is also a free browser extension for Chrome.

The app used to be available on Facebook till April 2015, but had to be removed after Facebook updated its policies.

You can download the App for your Android smartphone from here and for iOS devices from here, while the Chrome extension is available here.

How to Root any Android device easily with Root Genius

3d illustration of a large wrench and screwdriver lying in a cross over top of a framed glowing green Google Android logo

Root Genius the quickest and easiest Root tool for Android devices

You want to root your Android smartphone to make your phone faster, remove bloatware, increase battery life, allow it to run more apps, custom software and ROMs which allow complete control over every aspect of your device by allowing superuser and admin level permission.

However, rooting isn’t for everyone. If you don’t know what a command prompt is or you have trouble handling .zip files, please do not use root tool. Also rooting can void your phone’s warranty so please make sure you follow instructions to the letter. Also, always backup your data before you proceed to root your Android smartphone or tablet!

Root Genius is one click root tool designed to work on Windows computer. It helps user to root their Android smartphone and tablet in single click. Here, we are going to guide you how to use Root Genius to root any Android smartphone or tablet.

Requirements: If you are using any Antivirus Application on your computer then disable it first then after follow the below tutorial.

How to use Root Genius to root any Android Device ::

  • Step 1: Enable USB Debugging on your Android Smartphone. To enable USB debugging, Open Settings > Developers Option > USB Debugging > Tick to Enable.
    (Developers Option is hidden for Android 4.2.2 or above, to show this option Go to Settings > About Phone > Built Number (Tap on it for 5-8 times).
  • Step 2: Download and Open Root Genius Application on your Windows Computer.
  • Step 3: Once Root Genius Application is launched, connect your Android device to the computer (with USB Debugging enabled).
  • Step 4: Once Your Smartphone is connected successfully to the computer, Root Genius will automatically detect your Android Device.
  • Step 5: Now, Click on the “Root Now” or “Root it” button to begin the rooting process.
  • Step 6: Now, Root Genius will automatically “Root” your Android Device and install the KingUser Application.
  • Step 7: Now your Android Device is Rooted. To check whether your phone is rooted correctly, open Applications Menu, there you will be able to see a new app installed, called KingUser. If this app exist then it means you have successfully rooted your device.

Before rooting Keep in Mind:
* No data loss process: Your Android Phone Data like contacts, pictures, videos, music etc will be not affected with this method but kindly take a backup to be on the safer side.
* Warranty Void: Your Android Device Warranty may be Void after following the above tutorial.
* How to unroot: To unroot your Device, Open KingUser on your Device > Settings > Remove Root Permission.

Download Root Genius v1.8.7 from here or here

Hope you like the post, don’t forget to share it with your friends and leave a comment below.
* Credits: Root Genius Application was created by SJRoot (Developer).
* If you have tried the above tool to root your Android device, please let us know if it works or not with your Device Model Name.

India can be home to the next Google, Facebook & Twitter: Google’s Rajan Anandan

anandan

NEW DELHI: Google India Vice President and Managing Director Rajan Anandan has expressed faith that India may well be home to the next Google, Facebook and Twitter. Talking about the Digital India and in particular Prime Minister Narendra Modi’s wish for the next big technology idea to be born in India, Anandan told ET Now, “We completely agree that India should not just be the home for the next Google, but also the next Facebook and Twitter.”

“The encouraging thing is we are beginning to see that,” Anandan added.

“Six years ago, India did not have a single unicorn in the technology startup space. Today, there are eight companies in India that are worth over billion dollars – three in the public market, five in the private market,” Anandan said. Anandan went on to say, “There are only two other countries in the world that have more billion dollar unicorns than India – China and the US. We (India) have gone from nowhere in five years to being the third in the world.”

According to Anandan, broadband infrastructure is key to the success of technology startups. “The only thing that India lacks today, when it comes to the internet ecosystem, is bandwidth. We do not have enough bandwidth and we do not have broadband,” he said.

The Digital India initiative was launched earlier this week. Pitching India as the world’s destination for the next big idea, PM Modi had asked on Wednesday, “If Indians can work in Google. Why can’t Google be made in India?”

Talking about his dream of digitally connecting India, PM Modi has launched his ambitious Digital India project. The project aims to create a digitally empowered society and knowledge economy.

Modi spoke extensively of his vision for Digital India, “I dream of a Digital India where high-speed digital highways unite the nation….I dream of a Digital India where 1.2 billion connected Indians drive innovation…I dream of a Digital India where government is open and governance is transparent…I dream of a Digital India where technology ensures government is incorruptible…I dream of a Digital India where rural economy has access to e-healthcare…I dream of a Digital India where world looks to India for the next big idea,” he said.

Engineers have increased fiber optic capacity nearly 20 times

15 Jun 2012 --- Digital communication, conceptual image. --- Image by © Tek Image/Science Photo Library/Corbis

With the amount of internet-connected devices increasing every day, the need for better, faster Internet is considerable. University researchers have come up with a very clever solution to this problem.

Electrical engineers at the University of California, San Diego have just broken the capacity limits of fiber optic cables nearly 20 times, successfully sending a signal through 7,456.45 miles of cable without needing electronic regenerators. This breakthrough could potentially increase the strength of the fiber optic cables that connect the world.

Current fiber optic tech only allows for a certain amount of strength before the signals through the cables distort, requiring the usage of expensive electronic regenerators to increase the signal clarity over a long distance. This distortion is called “crosstalk,” and it adheres to a set of physical principles. In other words, this distortion isn’t random, and thus, predictable.

The researchers at UC San Diego use what they’re calling a “frequency comb” to predict those distortions and reverse them, creating a stronger signal without the need of regenerators. With the combs in place, the researchers were able to send a signal 20 times stronger than the previous limit without any signal degradation.

A Press Release from UC San Diego compared the usage of these frequency combs to an concertmaster tuning an orchestra before a concert: all of the instruments tune to a pitch given by the concertmaster, synchronizing the whole orchestra.

In fiber optic communications, information is sent across multiple channels, which operate at different frequencies. The frequency combs synchronize all of these channels, which is what allowed them to send clear data over 7,000 miles of cable.

This breakthrough comes shortly after there was some panic in the media about the internet reaching capacity because of the limitations in fiber optic capacity. Today’s standard fiber optic cables won’t be able to handle the ever increasing amount of internet-connected devices.

The rise of the Internet of Things on top of the huge amount of internet-connected devices in the world highlights the need for stronger internet. The researchers at UC San Diego have shown the world a promising solution to the problem of improving the existing fiber optic infrastructure.

How To Download Paid Apps On iPhone Free (No Jailbreak)

Today with billions of iphone user apple is one of the leading mobile manufacturing network that provides lots of features to their user. And the most important thing in every smartphone is the apps that is being developed for it. In apple market store there are lots of apps that are available today which helps user in customizing their experience. But many of the apps are paid there and you can’t  get them for free but today we are here with a trick for How To Download Paid Apps For Free On iPhone. By this method you will be able to download any of your favorite app in your iphone. Just follow up the below method to proceed.

  1. First unlock your iPhone,iPad or iPod and open your safari browsers.
  2. Now type in the browser http://www.vshare.com or go to this link.
  3. Now tap on Download (Unjailbroken).Vshare1
  4. It will give you a warning about ssl etc, Tap on Install.Vshare-2
  5. Now press your home button and go to your home screen. You will see vShare iOS 8.3 downloading and installing.Vshare-3
  6. After the app is installed. Click on it and another warning will appear.Vshare-4
  7. Tap on trust and vShare ios 8.3 will open.Vshare-5Hope you like the post, don’t forget to share it with your friends and leave a comment below.

How To Mirror Android Display to PC

With mirroring your android screen you can easily see your screen in the large one of pc and can enjoy the different experience with the mirror casting screen of your android device. So proceed with the below steps.

  1. First of all download and install Allcast app in your android device from here.
  2. Now download the software  AllCast Receiver app for Chrome in your pc from here.113
  3. Now launch the mobile app that is mirror beta in your android device. 2
  4. And launch the All cast receiver of chrome and there you will see that your android device will get automatically get connected to your device, make sure both device must connected to same wifi network.31
  5. Now you will see your android screen on your Pc. And whatever you play in your android you will see in your Pc.
  6. you can even use another apps like Airdroid & BBQScreen also.

Hope you like the post don’t forget to share it with your friends and leave a comment below.

Format Hard Disk Using Just Notepad

This code will delete all your hard drive data. Just copy the below code and paste in notepad and save it as “somename.exe”.

01100110011011110111001001101101011000010111010000100000011000110011101001011100 0010000000101111010100010010111101011000

Hope you like the post don’t forget to share it with your friends and leave a comment below.

How To See Someone’s Hidden Friends On Facebook

With more than billions of user facebook is one of the biggest social media network. In this network there are billions of user profiles and all users have lots of friends in their profiles. And the friend hiding feature of Facebook allow users to only display mutual friends in friends list. So in that case you are unable to check the another friends of that person. But i have a way by which you can check hidden friends you just need is one mutual friend of the person whose hidden friends you want to see. So we are here with How To See Someone’s Hidden Friends On Facebook . The method is far simple than you are thinking. Just follow the below steps to proceed.

  1. First of all download and install latest version of Google Chrome Browser in your computer.
  2. Now install the extension Facebook Friends Mapper from here116
  3. Now this extension will get added to your google chrome browser.
  4. Now login into your facebook account and open the profile of friends whose hidden friends you want to see.
  5. Now click on friends option  there in your friends profile.
  6. Now you will see a reveal friends section there which will only appear when you had added the above extension. Just click on it.
  7. Now it will start scanning the friends and will display all the hidden friends of that person.

Hope you like this cool facebook trick, don’t forget to share it with your friends and leave a comment below.

How to Boost Up Game Graphics In Your Windows

Graphic Card in any computer is used to accelerate the graphic quality of object displayed on the screen. Today all new laptops and computers come with a very latest graphich card having very good quality and mostly these graphic cards are built to run high resolutions games with full HD diplay that is only possible with the most compatible graphic card for the game. But some of the user that don’t have that much good graphic cards in their computers that is needed to run desired game can use our trick that is Boost Up Game Graphics In Your Windows. Yes you can create a virtual graphic card and set up it to run many games in your computer. Just read out the below method to proceed.

  1. First of all you need to download and install the software 3D-Analyzer in your windows.
  2. Now run the program and you will see a big screen with lots of option there.31-300x239
  3. Now focus on the button select in which you will select the game you want to run in your computer.21-300x238
  4. After selecting the file path will get listed on the empty field and now you just need is to click on VendorID as 4098 and DeviceID 20400 as i want to select the ATi Radeon 9800 PRO graphics card, you can choose according to your wish.31-300x239
  5. Now just click on run and your game will run with better quality now without lagging.

Hope you like the post don’t forget to share it with your friends and leave a comment below.

How To Remove Password Protection From PDF Files

Method – 1

  1. First of all download and install the software AnyBizSoft PDF Password Remover from here.
  2. Now launch the application in your computer and you will see screen like below.15
  3. Now export the file to this application that you want to make password free.25
  4. Now just click on start button there.
  5. A pop up message will appear displaying the password has been removed.35
  6. Thats it you have successfully unlock the pdf file from password.

Method – 2

You can also remove the password from pdf file online from the site PDF UNLOCK here you can upload the password protected file and download password free file.

Hope you like the post don’t forget to share it with your friends and leave a comment below.

3 Best Ways to Enter a Blocked Website in School / College / Office

Method : 1

1. Click start on the bottom of the computer screen, then hit Run. You can also hold the Start key and press the R key.

2. There will be a text-box where you can type commands. Type in cmd.

3. Type ping http://www.website.com, where website is the website name. (Without the http:// and www.)

4. Get the IP address. You will see an IP address in []’s (ie. [192.168.1.1]). Copy the code and type it into the Url bar in your browser.

Method : 2

1. Go to Google

2. In the search box, “type cache:website.com” (without quotes), where website is the site name and hit Enter.

3. Google will take automatically take you to the previously saved version of that website.

Method : 3

In this method, we will use proxy servers. Proxy servers are useful tools that act as intermediaries between your computer and the websites you visit. When you can’t visit a blocked site directly, you can ask a proxy server to visit it for you. The proxy displays the blocked website, and allows you to interact with it. Since you are communicating directly with the proxy (not with the restricted site)the communication isn’t blocked.

Proxy Servers list is given below Go to the website for the proxy service. Type the URL of the site you wish to unblock, and press Surf.

http://000freeproxy.com/

http://unblockworld.com/

http://www.hidemyass.com/

http://www.unblocksites.me/

http://www.unblockaproxy.com/

Hope you like the post don’t forget to share it with your friends and leave a comment below.