ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label
Showing posts with label Cyber News. Show all posts
Showing posts with label Cyber News. Show all posts

Hackers Crash Macs Using Dos Attacks Unknown rwxr-xr-x 0 1/11/2017

Filename Hackers Crash Macs Using Dos Attacks
Permission rw-r--r--
Author Unknown
Date and Time 1/11/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan


  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 

















Click on the link given below for reading the article.


Hackers Crash Macs Using Dos Attacks



Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.



To subscribe follow the steps given on www.extremehacking.org/broadcast 

Windows 10 preview 15002 Comes With Tons Of New Features Unknown rwxr-xr-x 0 1/11/2017

Filename Windows 10 preview 15002 Comes With Tons Of New Features
Permission rw-r--r--
Author Unknown
Date and Time 1/11/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India

Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan



  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 









Click on the link given below for reading the article.


Windows 10 preview 15002 Comes With Tons Of New Features



Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.



To subscribe follow the steps given on www.extremehacking.org/broadcast 

Hello Kitty Database Hacked, 3.3 Million User Details Breached Unknown rwxr-xr-x 0 1/11/2017

Filename Hello Kitty Database Hacked, 3.3 Million User Details Breached
Permission rw-r--r--
Author Unknown
Date and Time 1/11/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India

Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan











_____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 









Click on the link given below for reading the article.




Hello Kitty Database Hacked, 3.3 Million User Details Breached






Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.




To subscribe follow the steps given on www.extremehacking.org/broadcast 

ESEA Hacked, 1.5 Million User Records Stolen Unknown rwxr-xr-x 0 1/11/2017

Filename ESEA Hacked, 1.5 Million User Records Stolen
Permission rw-r--r--
Author Unknown
Date and Time 1/11/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India

Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan



  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 









Click on the link given below for reading the article.


ESEA Hacked, 1.5 Million User Records Stolen


Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.


To subscribe follow the steps given on www.extremehacking.org/broadcast 

Why Windows Uninstalls Only One Program At A Time, Not More? Unknown rwxr-xr-x 0 1/10/2017

Filename Why Windows Uninstalls Only One Program At A Time, Not More?
Permission rw-r--r--
Author Unknown
Date and Time 1/10/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India



Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan





   ____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 





Click on the link given below for reading the article.


Why Windows Uninstalls Only One Program At A Time, Not More?




Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.


To subscribe follow the steps given on www.extremehacking.org/broadcast 

Hacker Publishes Open Source Tool For Finding Secret Keys On GitHub Unknown rwxr-xr-x 0 1/10/2017

Filename Hacker Publishes Open Source Tool For Finding Secret Keys On GitHub
Permission rw-r--r--
Author Unknown
Date and Time 1/10/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India



Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan





  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 





Click on the link given below for reading the article.


Hacker Publishes Open Source Tool For Finding Secret Keys On GitHub




Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.


To subscribe follow the steps given on www.extremehacking.org/broadcast 

How Iran’s efforts to censor porn led to Internet outage in distant Hong Kong - Unknown rwxr-xr-x 0 1/10/2017

Filename How Iran’s efforts to censor porn led to Internet outage in distant Hong Kong -
Permission rw-r--r--
Author Unknown
Date and Time 1/10/2017
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India



Sadik Shaikh | Extreme Hacking | Cyber Suraksha Abhiyan





  _____      _                             _   _            _    _             
 | ____|_  _| |_ _ __ ___ _ __ ___   ___  | | | | __ _  ___| | _(_)_ __   __ _ 
 |  _| \ \/ / __| '__/ _ \ '_ ` _ \ / _ \ | |_| |/ _` |/ __| |/ / | '_ \ / _` |
 | |___ >  <| |_| | |  __/ | | | | |  __/ |  _  | (_| | (__|   <| | | | | (_| |
 |_____/_/\_\\__|_|  \___|_| |_| |_|\___| |_| |_|\__,_|\___|_|\_\_|_| |_|\__, |
                                                                         |___/ 





Click on the link given below for reading the article.


How Iran’s efforts to censor porn led to Internet outage in distant Hong Kong




Now are security updates are available on WhatsApp via Extreme Hacking Broadcast channel.


To subscribe follow the steps given on www.extremehacking.org/broadcast 

Sophisticated machine intel can be used to track down malware writers and pirates Unknown rwxr-xr-x 0 1/03/2016

Filename Sophisticated machine intel can be used to track down malware writers and pirates
Permission rw-r--r--
Author Unknown
Date and Time 1/03/2016
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

Wrong doers, sophisticated intel is keeping a close eye on you


Thanks to the use of using stylistic programming traits which in turn transforms into sophisticated intel, individuals anonymous programmers, from malware writers to copyright infringers, along with those who are baiting governments with censorship-foiling software should be warned that their identities will not remain a secret for much longer.

The research that is being conducted is titled ‘De-anonymizing Programmers: Large Scale Authorship Attribution from Executable Binaries of Compiled Code and Source Code’ and in a synopsis form of an explanation, it basically explains that researchers have begun trying to identifying malicious programmers and have stated that there if the writing style of that particular writer is different, it will ultimately lead to their current whereabouts. The research was presented by Aylin Caliskan-Islam to the 32nd annual Chaos Communications Congress on Tuesday. Another publication titled When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, written by researchers based at Princeton University in the US, one of whom is notably part of the Army Research Laboratory was also presented.

The researchers have stated the following concerning their findings:

    “While we can de-anonymize 100 programmers from unoptimized executable binaries with 78 per cent accuracy, we can de-anonymize them from optimized executable binaries with 64 per cent accuracy. We also show that stripping and removing symbol information from the executable binaries reduces the accuracy to 66 per cent, which is a surprisingly small drop. This suggests that coding style survives complicated transformations.”

Naturally, there will be a scenario where the writing style of one malware writer is going to be similar to the writing style of another writer, and that is an element that might not get picked up by the intel, which is where the researchers are introducing several other methods that will allow them to further isolate the writing styles of such individuals in order to their capture malicious individuals much more swift, and obviously much more accurately.

This approach can also be used for a variety of different applications ranging from the preservation and strengthening of encryption methods. However, since the research is still in its nascent stage, it will obviously take a while before sophisticated intel will be able to bring down justice swiftly.

www.extremehacking.org
CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

Google Search declines as Microsoft’s Bing search engine keeps growing Unknown rwxr-xr-x 0 12/29/2015

Filename Google Search declines as Microsoft’s Bing search engine keeps growing
Permission rw-r--r--
Author Unknown
Date and Time 12/29/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

Google Search goes down, Microsoft’s search engine Bing is now at 20.9 percent market share in the US beating Google and Yahoo

The new statistics in the search business show that while Microsoft is continually growing in the search business, Google is rapidly losing users year-over-year (YOY). However, Bing adoption is on the rise.


According to the comScore data for the month of November 2015 in the United States, where on one hand, Google and Yahoo have stagnated in terms of performance, on the other hand, Microsoft’s search engine is the only one among the giants that has been able to improve its share during the month.


In November, with 63.9 percent, Google continued to be number one in the US of the searches in the United States performed on its sites. Whereas, Microsoft came second with 20.9 percent, and Yahoo came third with 12.5 percent.

Even though both Google and Yahoo had the same performance as in October 2015, Microsoft was able to improve its share by 0.1 percentage points. The figure may not seem much, but what is interesting to note is that Bing is slowly but steadily growing over the 20 percent share that was achieved in summer.

While for Microsoft it is surely a significant milestone to reach 20 percent in the search business, but at the same time, Google also lost its grip in the last few months.

Google is now at 63.9 percent, down from no less than 67 percent a year ago, due to its flat performance in the last couple of months. There is no doubt that Microsoft is also partly responsible for this fall.

One of the reasons behind Bing’s increase on the desktop is clearly Windows 10, the new operating system from Microsoft, which not only uses it as the default search engine, but it also packages it into Cortana, the company’s personal assistant available on PCs and mobile devices.

The coming months is expected to see a rise in Bing’s search share, as more people are expected to migrate to Windows 10. Hence, it will be interesting to see how Google responds to slow down it’s descend.


www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

The guy who invented USB is not getting a single cent for it Unknown rwxr-xr-x 0 12/28/2015

Filename The guy who invented USB is not getting a single cent for it
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

Used in more than 10 billion devices throughout the world, the USB turned 20 years old last week. However, the man who discovered the technology has not made a single penny off it and he is fine with it.



Ajay Bhatt, Intel’s Chief Systems Technologist, who’s largely responsible for inventing the USB technology, told Business Insider, “I don’t do these things for money. I did this to bring about change, and it’s not very often that somebody gets a chance to bring about this big a change.”

As a matter of fact, the USB technology did not make money for anyone. This is because Intel, who was the first one to back Bhatt’s USB idea and who owns all patents to the technology had decided from the start to make it open and royalty free.

Bhatt believed that Intel had every right to do so.

The USB which is now regarded as the standard for connecting different devices, was once met with a lukewarm response from tech companies, including Apple and Microsoft, in the early ’90s when Bhatt had first proposed the idea to them.

Creating a single connector was a smart idea that basically bypassed the need for a separate driver or floppy disk to install each application. However, the basic fear of breaking the existing compatibility functions kept the companies from investing in his idea. But Intel was the only company that was bold enough to make the investment in his idea at the time.

“As an engineer, I’ve been handsomely rewarded by the company,” Bhatt added. “And I couldn’t do this kind of work anywhere else. I have nothing to complain.”

Even though Intel was the first to support the idea and has started building support for it into its chips, actually it was Apple who first shipped a USB compatible product – the iMac G3 – for end users in August 1998. Immediately, Microsoft followed suit when it provided USB support for Windows 98’s second edition.

So, does Bhatt believes that he may have missed out on a chance to make hundreds of millions of dollars? No. He believes that his contribution to the overall computer industry is what makes up for it. The basic purpose was to make the PC easier for regular users, and expand the overall PC market, and the USB undoubtedly helped the cause.

“If computers are seen to be easy, then we’ll sell more computers, and as part of that, we’ll sell more chips. It’s a much bigger picture that Intel saw,” Bhatt said. “As the pie gets bigger, we get a piece of the pie, and we’re happy with it.”
Whats Next

So will there ever be another technology that would be available everywhere as the USB? Bhatt thinks he found one: the stylus.

Currently, Bhatt is working with 35 companies to create a standard for stylus pens, so they could all work under one universal technology. If his vision comes true, then it would be mean that an Apple stylus pen could be used in a Microsoft Surface, and vice versa.

“We are defining a standard to make the stylus more ubiquitous, more responsive, and address the entire handwriting experience,” Bhatt said. “It’s the next frontier.”

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

Top 5 simple tips that can spread Wi-Fi throughout your house Unknown rwxr-xr-x 0 12/28/2015

Filename Top 5 simple tips that can spread Wi-Fi throughout your house
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

The biggest problem with modern Wi-Fi is that it still doesn’t spread throughout the entire house. Here are five easy steps to make sure you can get it done.


The last few years have seen the sudden rise and use of wireless networks. Wireless networks can be a lifesaver like most advanced technologies. In comparison to wired networks, the speeds are either equal or in some cases even faster.

However, on the other hand, it becomes very frustrating when your home wireless network is moving at a snail’s pace. The speed of wireless network connection in reality actually depends on your proximity to the router. For instance, if you are on the farther side of the house, you might get slow Internet or nothing at all. Such a connectivity when you are trying to check an important email or trying to send an important file. So, how do you take full advantage of the home tech? Well, the solution is simple.

Provided below is the five-step guide that will help solve your wireless networking problem, when you find yourself overwhelmed by bad reception and painfully slow download speeds:

Step 1: Figure Out The Right Network Standard For You

There are five wireless network standards: 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac. Any of them can be used, while keeping in mind the below:


  •     802.11a is particularly used by large corporate networks.
  •     802.11b is low-cost, but it has a slow maximum speed (11 Mbps) and tends to get some interference from home appliances. Provide enough space in-between your router and objects like cordless phones and microwaves to avoid this problem.
  •     802.11g is the newest of the three standards, and it combines the best aspects of 802.11a and 802.11b. It’s also backward-compatible with everything that runs on 802.11b. 802.11g has a maximum speed of 54 Mbps, which is solid for most home use.


Recently finalized with a top speed of 600 Mbps, 802.11n standard is the best so far. The N routers are still new and may have problems with devices configured for 802.11b/g networks.

Irrespective of the standard, ensure that all your equipment like computer, router, etc. runs on the same one. For instance, an 802.11g router won’t run with an 802.11a range extender. You can get away with 802.11g for personal use, or some 802.11ac equipment, if you want to be fancy.

Step 2: Design Your Network

The next step is to decide where to place the gear and how much of your house to cover. Majority of users dont give a damn to this all important aspect. Normally the Wi-Fi router is placed in a prominent position without consideration for the size of the home, material used to construct the walls or the walls that could interfere with the signals. Brick or concrete walls, for instance, will need a different layout than a wood-frame home. Depending on your home’s size (for anything under 1200 square feet, a router alone should be fine), you should plan to buy one wireless router as well as at least one range booster. Placing the gear in central locations would be the best option: The router should go within easy wiring distance of your ISP’s Ethernet modem, with the range booster accessible to force out greater coverage.

Step 3: Purchase Your Gear

Cisco, Netgear, and Alfa are just a few of the wireless networking gadgets names available on the market. Note that there is no perfect way to run this, as every router can come with its own set of problems. However, you need not worry too much as long as you stay within the same family, since the wireless standards are fairly common.

If you have got a small studio apartment, then probably you don’t need that range extender, and can get away with a less expensive wireless router. However, on the other hand, if you want better-quality coverage through an entire house, then, in that case, you may likely want to jump for a higher-end system. All boils down to budget, but when it comes to wireless networking equipment, you get what you pay for.

Step 4: Hook Up Your Network

The simplest part is installation, irrespective of which router and repeater you choose. Power down your ISP’s modem, plug your new router into the appropriate output port, and then plug your router into your primary computer. Power everything up and wait for the on-screen instructions to appear and help you set up the router. It will take a few minutes, but once the lights blink green on the router, you are good to go on at least one floor of your home.

Your repeater/range extender installation runs much the same way. However, before keeping the extender where you want, ensure that is recognized on your network. You can do this by getting the extender into the same room as the router and powering it on. Once your extender is identified by the router and the software has been installed to make them talk to each other, you can move the device where you actually want it. Note that radio interference can cause havoc with your network.

Step 5: Secure Your Network

Simply installing your router can result in an unsecured network that anyone can get access to, which in turn can kill your bandwidth and potentially make your files fair game for theft. To make it secure, create a network password and encryption profile. All you need to do is enter the admin dashboard for your router, which can be done in any one of two ways: Either through the software package that came with your router, or by visiting www.routerlogin.com and entering the default username and password (found in manufacturer instructions).

Follow the on-screen instructions, set a strong and proper password. It’s done.

From now on, you should have a secured wireless network that is available throughout your house and, if done right, maybe into your yard too.

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

Torrents leak : Hive-CM8 to leak 40 top Hollywood movie screener versions in coming days Unknown rwxr-xr-x 0 12/28/2015

Filename Torrents leak : Hive-CM8 to leak 40 top Hollywood movie screener versions in coming days
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

A movie piracy release group, which calls itself Hive-CM8, has illegally stolen not less than 40 of Hollywood’s biggest films to be released this summer and is promising to release them online over the next few weeks.


The group claims to have obtained high quality versions of films such as Tarantino’s The Hateful Eight, The Revenant starring Leonardo Di Caprio and Will Smith’s NFL-based drama Concussion.

Several of the highest-profile films of the year, including recent releases like Creed, Joy, and Steve Jobs, In the Heart of the Sea, The Danish Girl, and Bridge of Spies are among the films already available to download on various piracy sites.

The leaks began on December 20th with a note saying The Hateful Eight was just one of 40 screeners that the so-called CM8 “scene group” would be releasing. “Will do them all one after another, 9th hot title,” reads the documentation accompanying the most recently leaked film, Spotlight, according to Motherboard. All but The Revenant have been leaked under the name “Hive-CM8.”

The films are all high-quality DVD screeners, which are copies sent to people like journalists, award judges, and other industry professionals for evaluation purposes.

Some members of the public have delighted in the torrent of free entertainment, prasing the group for boosting their holiday plans. But of course the hack has drawn criticism from frustrated industry insiders.

The leaked version of The Hateful Eight has been traced back to a top Hollywood executive, co-CEO of Alcon Entertainment, Andrew Kosove. according to The Hollywood Reporter. Kosove says he never saw the DVD, whose delivery was accepted by an office assistant. The screener was sent to Kosove for awards consideration and identified by invisible watermarks embedded in the playback.

The FBI, working in conjunction with major Hollywood studio The Weinstein Co., were able to pinpoint his copy of the film as the source of the leak from a watermark on the DVD sent to him. However he has denied ever receiving the film. He said that the DVD was accepted by an office assistant.

“I’ve never seen this DVD… It’s never touched my hands. We’re going to do more than co-operate with the FBI. We’re going to conduct our own investigation to find out what happened,” he told The Hollywood Reporter. The origins of the other leaks are unknown at this time.

According to reports in TorrentFreak, “The Hateful Eight” was downloaded over 300,000 times after the first day of the leak, which combined with the other movies released by CM8, almost guarantee that Hollywood will pursue legal repercussions.

Last year, The Expendables 3 was leaked online nearly a month before its official release. The movie was downloaded by more than 10 million people causing it to lose a claimed $250 million in revenue.

The Hive-CM8 group, whose slogan appears to be “doing it right the first time,” has been around for at least five years and in the past has been responsible for leaking films such as The Hobbit, 12 Years a Slave, The Social Network and Interstellar.

It is not uncommon for a string of high profile movies to be leaked in the lead up to awards season but the claimed size and coordination of the latest hack is exceptional.

Discussing the leaks, one of the reddit user noted on a thread: “Screener season is officially in full swing.”

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

DNA Hard Drive Capable of Holding Data for One MILLION YEARS Unknown rwxr-xr-x 0 12/28/2015

Filename DNA Hard Drive Capable of Holding Data for One MILLION YEARS
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

Our conventional hard drives stores up to, well, a terabyte of data or two? What would you say if I say that this very capsule could store data so much as billions of terabytes? What if I say that it is possible to code DNA so that it could store such vast amount of information?




Interestingly, storing information on DNA is quite simple. One simply has to program the A and C base pairs of DNA as a binary ‘0’, and the T and G as a ‘1’. The question is, how long would the data be stored?

In 2013, scientists managed to sequence genetic code in 700,000-year-old bones of a horse. The problem is the storage of the code. The conditions of storage must be well defined. Otherwise, on exposure to the environment, it can change and breakdown. Recently another type of data storage method was being talked about- the IBM’s racetrack memory to kill the hard drive is invented.

In order to do that, scientists encoded ‘Switzerland’s Federal Charter of 1921’ and ‘The Methods of Mechanical Theorems’ by Archimedes onto a DNA strand. That sums up to 83 kilobytes of data. These strands of DNA were then encapsulated into tiny glass spheres, about 10 nanometers in diameter. Then this glass packaging was compared to other methods of packaging by subjecting each package to temperature conditions about 60 to 70 degree Celsius conditions that replicated the chemical degradation that would usually occur over hundreds of years, all crammed into a few destructive weeks.

Even after this sped-up degradation process, it was found that the DNA inside the glass spheres could be recovered using a simple fluoride solution. The data could still be read. The glass spheres in this case worked pretty much like fossilized bones.

It is predicted that the data on the DNA strand could be preserved for more than a million years provided it is stored below -18 degrees Celsius. It could be stored for more than a thousand years if stored below 10 degrees at specific conditions.

The major setback to this DNA hard drive is its cost- one hard drive could be as expensive as $1500. Researchers and scientists are already storing data into these DNA hard drives. And the band OK Go are also storing their records in it.

I wonder if you can handle the overwhelming awesomeness when you realize that the whole of Wikipedia and Facebook could be stored in one small time capsule.

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune

India says goodbye to GPS, to have its own desi navigation system, IRNSS Unknown rwxr-xr-x 0 12/28/2015

Filename India says goodbye to GPS, to have its own desi navigation system, IRNSS
Permission rw-r--r--
Author Unknown
Date and Time 12/28/2015
Label
Action
Institute For Ethical Hacking Course and Ethical Hacking Training in Pune - India
Sadik Shaikh | Extreme Hacking

Bye bye GPS, India to soon have its own position determination system







The Indian Space Research Organisation (ISRO) is developing an indigenous position determination system that will replace the American Global Positioning System (GPS) used to get the time and place information anywhere on or near the earth and will also have enhanced access in remote areas.

“We will have our own position determination system using our own navigation constellation, the IRNSS series which will be operational by middle of next year. It is a kind of replacement GPS…The US is offering the GPS navigation, IRNSS is indigenous,” said Deviprasad Karnik, the director of publication and public relations, ISRO.

It will also aid in navigation and monitoring of fleet (trucks and ships) movement, the official added.

Developed by ISRO, Indian Regional Navigation Satellite System (IRNSS) is a regional navigation satellite that would provide accurate position information to users in the country, and will be under complete control of the Indian government.

“Once the constellation is completed, we need some time to establish the accuracy part, validation and other things. The advantage is that the navigation range has been designed to span around 1,500 km radius around India,” he said.

“GPS is not available at all places. Signal is weak in remote areas but our own signal will be available in remote areas with better accuracy.”

As an example of the app-based positioning service, Karnik said, it will help in effective management of fleet movement.

“Monitoring and effective management of fleet of trucks or ship monitoring will be done through spacecraft. For example, for ships the system can inform which route will be more effective. That will save time and fuel,” he said.

IRNSS is needed because the foreign government-controlled global navigation satellite system does not guarantee service in all situations.

The two types of services provided by IRNSS are as follows:

• Standard Positioning Service (SPS) – This will be provided to all users


• Restricted Service (RS) – This is an encrypted service that will be provided to authorised users only.(Including the military)

The applications of IRNSS include disaster management, vehicle tracking and fleet management, integration with mobile phones, terrestrial navigation aid for travellers, visual and voice navigation for drivers, and more.

With this system, the ISRO will provide GPS connectivity to most of the rural part in India by 2016. For this mission, ISRO will be using seven satellites namely IRNSS-1A, 1B, 1C, 1D, 1E, 1F and 1G out of which IRNSS-1A, 1B, 1C, 1D are already in the Orbit. The remaining three satellites including 1E, 1F and 1G will be launched in January, February and March respectively.

Meanwhile, the ISRO organization is hoping to get the IRNSS fully operationable by next year July. Moreover, the ISRO is requesting the device manufacturer’s to incorporate the additional hardware, so that the device can receive the signals from IRNSS.

As per the official, the so-called IRNSS will provide location accurately to almost 20 meters. This data from IRNSS can be used in all the devices, which supports the additional hardware.

“Both these L and S band signals received from seven satellite constellation of the IRNSS are being calculated by special embedded software which reduces the errors caused by atmospheric disturbances significantly. This in turn gives superior quality location accuracy than the American GPS system”, said a senior ISRO official in an interview.

ISRO also aims to make signals available not only to India and surrounding countries but also to the entire globe, said ISRO Chairman Kiran Kumar. “As we make it global, global users will be able to take advantage. Otherwise, now only regional users can take advantage of IRNSS”, he added.

www.extremehacking.org

CEH v9 CHFI v8 ECSA v9 CAST ENSA TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, Center For Advanced Security Training in India, IT Security Training Information Security Traning Courses in Pune, Ethical Hacking Institute in Pune, Ethical Hacking Course in Pune, Ethical Hacking Training in Pune, ceh certification in pune
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan