Ethical Hacking

ADVANCED TECHNOLOGY

Header Ads

LightBlog

Breaking

Saturday, 23 June 2018

June 23, 2018

WHAT ARE WEB COOKIES and HOW THEY WORK USES AND SECURITY

I hope you all are well aware about this statement.Do you what this statement means and what the heck are cookies?

If not,then you are at the right place,this article is dedicated for web cookies.


WHAT ARE WEB COOKIES

Web cookies refers to the plain text record which is sent from the website and stored on the user's computer by user's web browser,while user is browing over a particular website. Web cookies contribute a lot as far as user experience is concerned.

HOW THEY WORK ?

Basically,server sends the data to the user's browser in the form of cookies.Now,it is upto the browser,to accept or to reject the cookies.If it accepts,then it is stored as a plain text record on the user's system.Now,when a user arrives at another page,on the same site,then browser sends the same cookies to the server for retrieval.After successful retrieval,your servers know what was stored earlier.

Cookies are the plain text records of 5 fields :

1. Expire : It defines the date when,the cookie would be expired.

2. Domain : The domain of your website.

3. Path : The directory which set the cookie.

4. Secure : If this field contains the word "secure",then the cookie may only be retrieved with the secure server.However,if this field is kept blank,then no such restrictions exists.

5. Name=Value : Cookies are set and retrieved in the set of name-value.

So,this is the working of a cookie.

USES OF COOKIES

Cookies were mainly designed for CGI PROGRAMMING.The data contained in a cookie is automatically transmitted between the servers and browsers,so CGI scripts can read and write values that are stored on cookies.

Also,main idea behind cookie is to provide greater user experience over sessions by sessions.

Cookies are probably one of the best way to make the site work more efficiently,as well as to provide crucial information to the owner of the site,which he can use further to improve the website.

SECURITY ISSUES

We all know that cookies are stored on the client-side on the client's system, and in some cases may contain sensitive data. Therefore, the cookie data is in complete control of the client it can be modified/overwritten/captured and reused.Cookies are also used to store the session data.For instance,the login details of the user.These cookies may be stored on websites,Imagine the damaged that can be done by session-capture or session-hacking,and also, we had witnessed the session hijacking over the past few years.

So,in order to protect yourself from all these cyber attacks,you should ensure that your session is encrypted and secured.

So,atlast, we can say that cookies are one of the best way to enhance the performance of the webpage,and allow the owner of the website,to provide greater surfing experience to the users.




Friday, 18 May 2018

May 18, 2018

Best Windows shortcut Keys Everybody Shoud Know.


Best Windows shortcut Keys Everybody Shoud Know.



hey guys, 
                 I am telling about the top best shortcut key's on you keyboards . you absolutely want to know about thise keys .

1.  WINDOWS KEY  => thise key help to fast open your windows menu.

2. WINDOWS + A   => thise key help to go action center on fast way. just clicking the some keyboard keys. 

3. WINDOWS + Ctrl + B  => this shortcut key shows the new nortification on the nortification area .  

4. WINDOWS + C  => You can open cortana voice assistant clicking these key. thise work on windows 10 and other too. 

5. WINDOWS + D  => Minimize the all window you are opened.

6. WINDOWS + E  => thise key help to open the windows explorer in fast way. 

7. WINDOWS + F  => it open the windows feedback option in windows 10 . 

8. WINDOWS + L  => You can switch usert by clicking the windows +l.

9. WINDOWS +  M  => Minimize the all window you opened .

10. WINDOWS + shift + M  => the the all windows you minimze .

11. WINDOWS + O  together  => For rotate you windows screen .

12. WINDOWS + Q  => For the searching you can click the windows + q and you got a pop box for searching .

13. WINDOWS + U  or  WINDOWS + V  =>  yu can go directly on the setting of windows 10 .

14. WINDOWS + W  => It open the windows ink work for taking notes or screenshot .

15. WINDOWS + X => it is for the application of mobile .

16. WINDOWS + Y  => it open the yahoo messenger for you if you installed the yahoo messenger. 


Some keyborad shortcut for mac or apple laptop.
1. COMMOMD +  UP button  => If you visiting on webpage on cliking these keys you can go directly on top .

2. COMMOMD +  DOWN button  =>   If you visiting on webpage on cliking these keys you can go directly on down .

3. COMMOMD +  SEMICOLON  => it shows the all mistakes in you document or text .

4. COMMOMD +  1  => you can switch the by clicking these key or clicking commomd +2 for go to tab 2 and more on .

5. COMMOMD +  DELETE  => you can dlete the hole word or letter by clicking commond + delete keys .

6. COMMOMD +  H  => it is for hidding the all window you are opened .

7. COMMOMD +  shift + T  => if you by mistake close the some tab in your brawser by clinking these keys you can get back the tecent closed tab.


writed by :- Mukesh .


Monday, 30 April 2018

April 30, 2018

SEO (Search Engine Optimazation)


SEO (Search Engine Optimazation)


What is SEO?


SEO Stands for Search Engine Optimization. It is a procedure of upgrading the sites to make them
achieve a high position in Google’s. The range of site advancement that tries to enhance the way
substance is positioned via web search tools.
The Presence of the site in the primary pages of internet searcher ends up noticeably most extreme vital on the off chance that you are facilitating some type of online deals. Likewise for Internet advertising sites, the guests are the foundation of offers, so it ends up noticeably fundamental to keep the guests tie to the sites and make them invest sufficient energy. Keeping in mind the end goal to accomplish this assignment, the site should be composed such that the client discovers it easy to use and has a craving for going by regularly. The connections and pages of the site ought to stack effectively.
            Google, Yahoo, Ask and Bing are the web search tools which represent most of the web activity. So let your SEO work for you in making a check for your site on these web crawlers. Search engine optimization does not have a few supernatural occurrences in their kitty to redirect all the activity to your sites.
Likewise, it is of no utilization when the different kind of individuals visits the site. Forthcoming focused on clients are required to be directed; this is finished by utilizing great catchphrase choice and substance on the site.

A portion of the SEO strategies are:
 Designing of Keywords rich space names for your site.
 The presence of rich contents on the website with potential keywords and adequate repetition of the keywords in the text.
 Optimization of Meta Tags of HTML coding of your site.
 Internal Linking to remove every broken connection so that the internet searcher viably files your site
 Designing important page title to achieve the entire goal of the site

Our SEO Services:-

 Search Engine Optimizing (SEO)
 Social Media Marketing (SMM)
 Pay Per Click Advertising (PPC)
 Digital Marketing Services
 Online Branding Services
 Online Reputation Management (ORM)
 SEO Copy Writing (SEO Content Writer)
 Local SEO Marketing


April 30, 2018

Social Media Optimization

SOCIAL MEDIA OPTIMIZATION

Add caption

What is Social Media Optimization?

Social networking sites are many in number and frequently visited by the young and old alike. So it makes perfect business sense that new and existing products be marketed here where there is maximum visibility. The term Best Social Media Optimization refers to the marketing of products and services through social networking sites like Facebook, Twitter, Orkut, Flicker, YouTube and Myspace to name just  a few. It is an inexpensive method to build better awareness of your brand and also helps to establish direct and more intimate contact with your customers. Communication with competitors, customers and suppliers, understanding the needs of the customer, gaining and creating new customers and managing the company image has all been influenced by online social networks and has in a way made it more accessible and easier than ever before.

Advantages of a Social Media Marketing Company

Effective SMO needs huge investments of time and energy by an individual and most people are running short on this. This is when an agency that specializes in SMO can come to your rescue. Professionals who are familiar with the ins and outs of the system take a fraction of the time that you would need and not to mention the vast experience and knowledge they have. Their network and contacts are incredible, which ensures that they get the job done more effectively than you can even imagine. SMO Company makes sure that new developments do not miss their eye which in turn keeps you on top of your competition.



How to choose best SMO Company in India?

The social Media optimization company is provided to offer the services for the media marketing. These companies are provided to meet the requirements and needs of the media marketing. This will be the best place to promote your Search engine optimization jobs. It becomes a difficult task to opt for the best social media optimization. There are certain points which have to be considered in choosing the best SMO Company. The first thing to be considered is the amount which has to be invested in the search engine services. Whatever it is, you have to select a company for getting a high engine rating. Only by this, you can increase the traffic of your web site.
These social media optimization companies in India provide so many unique services for building your online business. Profile selection and blog commenting are some of the customized services offered by the Social media optimization company. These companies are sure to expand your search engine optimization business to a greater extent. You can engage a SMO company for the internet marketing which requires the regular follow-ups. Your online presence is sure to get increased by opting for the best website marketing. These search engine optimization companies facilitate you with various tips for building your online market.

Friday, 20 April 2018

April 20, 2018

LONG-AWAITED CRISIS IS HERE AND MANY DEVICES AREN'T READY


LONG-AWAITED CRISIS IS HERE AND MANY DEVICES AREN'T READY

YOU KNOW that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door open to a host of abuses. Even decades, content and web services firm findings that it has observed attackers actively exploiting a flaw in devices like routers and video game consoles that was originally exposed in 2006.
Attackers are actively exploiting these weaknesses not to attack the devices themselves, but as a jumping off point for all sorts of malicious behavior, which could include DDoS attacks, malware distribution, spamming/phishing/account takeovers, click fraud, and credit card theft. This creates elaborate "proxy" chains that cover an attacker's tracks, and create what Akamai calls "multi-purpose proxy botnets."

Down With UPnP

UPnP helps devices on a network find and essentially introduce themselves to each other, so that a server, say, can discover and vet the printers on a network. You can find it both on internal, institutional networks and on the larger internet, handling things like IP address routing and data flow coordination. UPnP works with and incorporates other network protocols to negotiate and automatically configure these network communications, and it can be used when applications want to send each other large quantities of data to facilitate a sort of unrestricted fire hose—think video streaming, or a gaming console talking to its web server.

Uptick in Attacks

UPnP attacks haven't been around. Last month, for example, Symantec published evidence that an espionage group it tracks known as Inception Framework uses UPnP proxying to compromise routers and obscure its cloud communications. But observers note that the strategy is probably not more common because the schemes are difficult to set up.
The whole point of proxying is to cover your tracks, so a lot is still unknown about how attackers use UPnP proxying and for what. But Akamai's goal is to raise awareness about the problem to ultimately reduce the number of vulnerable devices that exist.


Internet of Threats

·         Internet of Things security is still not enough of a priority-A big part of the problem is that every device is a black box, we don't know what code these things are running and it's all proprietary (aka unvetted) -This means that even when the tech industry develops and agrees on a standards and protocols, IoT manufacturers that aren't focusing on security can still implement them in problematic ways, leading to vulnerabilities.



·         Online banking accounts and other services involving sensitive content are obvious criminal targets and are vulnerable to spyware, phishing, malware scams and identity theft.
·         Connected, 'smart cities' are one of the hoped-for benefits of the IoT, but they will also inevitably mean cybercriminals and cyberterrorists trying to gain control of city services like lighting, traffic control and emergency systems.






April 20, 2018

How To Make Pendrive Bootable


Make your Pendrive Bootable



Hi Friends….Today I am sharing the easiest method to Create Bootable Pendrive. For this, we need at least minimum 4GB Pendrive. By making pendrive bootable, we can install Windows.
INSTALLATION:
1.   Insert Pendrive into a running Computer.
2.   Open a Command Prompt window in Computer.
3.   Type Diskpart.




4.   In the new command line window that opens, to determine the Pendrive number or drive letter, at the command prompt, type list disk, and then click ENTER. The list disk command displays all the disks on the computer.

5.   Type clean, and ENTER. This command deletes all data from the Pendrive.

6.   To create a new primary partition on the PenDrive, type create part pri, and then click ENTER.

7.   To select the partition that you just created, type select part 1, and then    ENTER

8.   To format the partition, type format fs=ntfs quick, and then ENTER.

9.   Type active, and ENTER. Then type exit, and ENTER.

10.    When you finish preparing your custom image, save it to the root of the PenDrive.

11.    At the command prompt, type select disk <X>, where X is the drive number or drive letter of the Pendrive, and then click Enter.

CREATING BOOT SECTOR:

Let us assume Pendrive is the G: drive and the DVD installer located on drive I:
1.   By default, Command Prompt’s active directory for Administrator permission is on C:\Windows\System32>. We will navigate Command Prompt to set on DVD (I:) as its active directory. Just type ‘i:’ hit Enter, and the active directory changed to I:

2.   Type ‘cd boot’ and click Enter. Active directory changed to I:\boot>.

3.   Type ‘bootsect /nt60 G:’ and click Enter. Creating boot sector on G: drive (Pendrive).

4.   Type ‘exit’ and click Enter to close Command Prompt. Until this step we have made a bootable Pendrive sucessfully, and the Pendrive is ready to be used as a boot media.

1.   COPYING ISTALLATION FILES:To install Windows from a bootable Pendrive, we just need to copy the whole installation files contained on the DVD installer to Pendrive. To do this, open the Command Prompt as in previous steps. Once it opens, type ‘xcopy i: \ *. * g: \ / E / H / I’ and then press Enter. Wait until all the files in the DVD installer copied to the Pendrive. Now bootable Pendrive is ready to be used for installing Windows from Pendrive.

I hope it’ll help you to create bootable Pendrive.

April 20, 2018

VLC Media Player Keyboard Shortcuts


VLC Media Player Keyboard Shortcuts


Hi Friends….Today I am sharing the easiest method to use of VLC Media Player Keyboard Shortcut. 

VLC media player best media players out there for Windows. I remember those days when I used to exchange movies and songs in CDs/DVDs with friends, and there were times when default media player failed to play various videos that have some different formats. But, VLC was there that played almost all formats. That is the main reason; people love VLC. That all, you get for FREE. Yes, VLC media player is offered free.


List of VLC Keyboard Shortcuts


Press “F” to make VLC go full Screen

Once you play a movie in VLC, and it is in small windows, just press F and it will be toggled into full-screen mode. Again, pressing F will get back to the smaller screen.

Press “A” to Change Aspect Ratio

Aspect ratio in VLC is the ratio of width and height of the screen playing the video. Many videos don’t display well, in that case toggling between predefined Aspect ratios can help. Though it can be done by going to the menu as well but just pressing A will do this job which is easier.

-/+ Play video slower/faster

Though you can go to Playback >> Speed and adjust if you play a video either faster or slower, you have the shortcut keys for it. Press – button to play slower and + to play faster. Press -/+ multiple times to make the playback slower/faster.

Press “Space” to pause the Playback

If you are watching a video or movie, and suddenly you have got to do some work, but you don’t want to miss any scenes, just quickly hit space button, the playback will be paused. To resume, press the space button again. Simple!

Press “S” to stop the Playback

If you want to stop the playback but don’t want to close VLC, then simply press “S,” and playback will be stopped.

“Ctrl + H” to hide/unhide the menu and controls

Pressing Ctrl + H will hide controls and menu, and again pressing the same will get them back showing.

Press “N” to Play Next and “P” to Play the Previous file on the Playlist

If you have added many videos or songs to the playlist, and you want to toggle them one by one or just want to play next track, you can press N, and if you want to play previous one, press P. You can repeatedly press N/P to toggle between files one by one.

Press “T” to show time remaining and elapsed

While playing a video, press “T” to display the time remaining and elapsed. It will display in the upper right corner of the playback.

Press “Ctrl + E” to display audio/video adjustment window

If you want to adjust audio/video settings, press “Ctrl + E” while playback. Then, you can adjust settings from the window displayed as you see in the above screenshot.

Press “M” to Mute

While you are watching a movie or song, if suddenly your phone rings and you don’t want to miss the scene, but you have to answer the call as well, you can simply mute the video and answer the call. So that you can keep watching the scenes while you talk over the call. To do this, Press “M”, and playback will be muted.

Press “Ctrl + P” to Play from start

No matter how much time elapsed in the video you are watching, as you press “Ctrl + P”, it will restart the video from the beginning.
Shift + Right Arrow : 3 seconds forward
Shift + Left Arrow : 3 seconds backward
Ctrl + Right Arrow : 1 minute forward
Ctrl + Left Arrow : 1 minute backward
Alt + Right Arrow : 10 seconds forward
Alt + Left Arrow : 10 seconds backward
Alt + M : Open media menu
Alt + L : Open playback menu
Alt + S : Open subtitle menu
Alt + O : Open tools menu
Alt + I : Open view menu
Alt + A : Open audio menu
Alt + V : Open video menu
Alt + H : Open help menu

VLC is the most popular video player online, and most of us use it because it does play almost all popular formats.



April 20, 2018

New Raspberry Pi


New Raspberry Pi



The new release comes two years after the introduction of its predecessor, the Raspberry Pi 3 Model B. The Raspberry Pi computer runs the open source Raspbian operating system. The Raspberry Pi 3 Model B+ is an incremental upgrade to a line of predecessors.

Hardware Rundown

·        64-bit 1.4-GHz quad-core Broadcom Arm Cortex A53-architecture processor replaces the Raspberry Pi 3 Model B's 1.2-GHz CPU.
·        Gigabit Ethernet boost (over USB) is nearly three times faster than the previous 100-MB speed.
Other improvements:
·        Bluetooth 4.2 (an upgrade from 4.1) that supports Local Area Networks at 2.4 GHz and 5 GHz along with Bluetooth Low Energy;
·        Dual-band WiFi;
·        Modular WiFi compliance certification.

Boosts Usability

The latest Pi release remains affordable, and it is compact and flexible as well as robust. It runs on open source software, which makes it accessible to everyone.
"The new features mean we can do so much more with so little," said Saxton. "The connectivity is the big one for us.