Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. "Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals. Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank. In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message. The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker. Some Examples Example 1: You receive an e-mail where the sender and the manager or someone on behalf of the support department of your bank. In the message he says that the Internet Banking service is presenting a problem and that this problem can be corrected if you run the application attached to this message. The implementation of this application presents a screen similar the one you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the bank account and sends it to the attacker Example 2: You receive an e-mail saying that your computer is infected by a virus. The message suggests that you install a tool available on an Internet site, to eliminate the virus from your computer. The real function of this tool and does not eliminate a virus, but I give someone access to your computer and all data stored on it. Example 3: a stranger calls your house and says it is the technical support of your ISP. In this connection he says that his connection to the Internet is presenting a problem and then, ask your password to fix it. If you give your password, this so-called technical can perform a multitude of malicious activities, using your access account Internet and therefore such activities relating to its name. FREEKAL:
This app can make Free calls on mobile and landline without requiring any data connection or an app!Anyone intending to use the service can dial the number 080-49202060 after which the call will drop but you will get a call back whereyou have to punch in the desired phone number followed by the # key . After this process both the calls, the one from FREEKALL and the other from the person you called will merge in the conference call fashion offering you a conversation free of cost. If a once-fast computer has slowed to a crawl, you can't really blame the hardware. Sure, you may be able to improve speed by adding RAM, upgrading the CPU, or replacing the hard drive with an SSD. But none of those solutions--all of which cost money--address the underlying problem. Your hardware isn't underpowered. It's overloaded. Cleaning out Windows will very likely speed up a PC. And no, I'm not suggesting reinstalling the operating system. There are less drastic fixes. Look for hog processes Your computer may be running a poorly-written process that's hogging a lot of resources. To find out, right-click the taskbar and select Start Task Manager. Click the Processes tab, then the CPU column header. The top items will be the ones hogging the CPU. If you see an obvious culprit, close the program that's running the process (it's pretty easy to figure out what it is). If that doesn't work, click the End Process button and confirm that you really want to kill this process. Should that fix the problem, avoid using that program in the future. Or find a better-written replacement. Otherwise, back on the Process tab, click the Memory column header and see if you can find the culprit there. Thank goodness—we can finally put to rest to all of the rumors and speculation. Google pulled the curtain on Android 4.4 KitKat Thursday, announcing the new mobile OS will appear first in the forthcoming Nexus 5 handset, which goes on sale for $349. While we weren’t expecting a hefty update, some of the features announced in KitKat—like the newly revamped interface and new messaging features in the Hangouts app—were on our wish list. Other features, like optimization updates to help KitKat run on low-end phones, simply remind us that Google is still battling all the issues that lead to device fragmentation. Regardless, let’s walk through some of the key features of KitKat and what you can expect when you finally get your hands on the new OS (whenever that is, because as we know, Android updates can take a long time to roll out). A better phone dialer You wouldn’t expect an overhaul of a dialer application to be a marquee feature, but Google has achieved the near impossible. When you’re in the dialer interface, now you can type just the first few letters of who or what you’re looking for—whether it’s a business or a friend—and the dialer will immediately bring it up. You won’t have to venture into Contacts for this essential information. If this search functionality sounds familiar, that’s because some manufacturers already offer this feature in their own version of the Android dialer. Samsung’s TouchWiz UI, for example, helps you find the name of the person you want to call by letting you key in the first few letters of his or her name on the number pad. So perhaps the bigger news isn’t that Google overhauled its dialer applications, but that it’s looking to what third-parties are doing to give consumers what they want. KitKat also provides a novel form of caller ID, fetching the location information of unknown numbers that call you to provide a better glimpse into who might be calling and where they’re located. This is an especially helpful addition when you consider the number of telemarketer calls that aren’t routed through an 800 number. The brains of students on their way back to school benefit from the chemicals found in certain foods. The Earth provides many tasty treats for students, but don't leave these foods behind in the school cafeteria. The foods help brain functioning in all people, not just young scholars. Chili Peppers
A fiery hot chili pepper can boost alertness during a cram session, without the jitters and insomnia of coffee. Beyond serving as a tongue-scorching substitute for espresso, peppers, both sweet and spicy, also provide one of the highest doses of vitamin C in foods that regularly appear on American tables. Nerve cells use vitamin C to function and the vitamin collects in nerve endings. Eating fruit with lots of vitamin C improved people's moods after six weeks compared to folks who didn't feast on fruit, according to a recent study in the journal of Human and Clinical Nutrition. Totally blind mice have had their sight restored by injections of light-sensing cells into the eye, UK researchers report. The team in Oxford said their studies closely resemble the treatments that would be needed in people with degenerative eye disease. Similar results have already been achieved with night-blind mice. Experts said the field was advancing rapidly, but there were still questions about the quality of vision restored. Patients with retinitis pigmentosa gradually lose light-sensing cells from the retina and can become blind. The research team, at the University of Oxford, used mice with a complete lack of light-sensing photoreceptor cells in their retinas. The mice were unable to tell the difference between light and dark. Reconstruction They injected "precursor" cells which will develop into the building blocks of a retina once inside the eye. Two weeks after the injections a retina had formed, according to the findings presented in the Proceedings of the National Academy of Sciences journal. Prof Robert MacLaren said: "We have recreated the whole structure, basically it's the first proof that you can take a completely blind mouse, put the cells in and reconstruct the entire light-sensitive layer." Previous studies have achieved similar results with mice that had a partially degenerated retina. Prof MacLaren said this was like "restoring a whole computer screen rather than repairing individual pixels". The mice were tested to see if they fled being in a bright area, if their pupils constricted in response to light and had their brain scanned to see if visual information was being processed by the mind. Vision Prof Pete Coffee, from the Institute of Ophthalmology at University College London, said the findings were important as they looked at the "most clinically relevant and severe case" of blindness. "This is probably what you would need to do to restore sight in a patient that has lost their vision," he said.
However, he said this and similar studies needed to show how good the recovered vision was as brain scans and tests of light sensitivity were not enough. He said: "Can they tell the difference between a nasty animal and something to eat?" Prof Robin Ali published research in the journal Nature showing that transplanting cells could restore vision in night-blind mice and then showed the same technique worked in a range of mice with degenerated retinas. He said: "These papers demonstrate that it is possible to transplant photoreceptor cells into a range of mice even with a severe level of degeneration. "I think it's great that another group is showing the utility of photoreceptor transplantation." Researchers are already trialling human embryonic stem cells, at Moorfields Eye Hospital, in patients with Stargardt's disease. Early results suggest the technique is safe but reliable results will take several years. Retinal chips or bionic eyes are also being trialled in patients with retinitis pigmentosa. Very few people around the world achieved what this wonder-woman did. A mathematical prodigy, also known as the 'human computer', Shakuntala Devi was known for her complex problem-solving skills without the aid of any mechanical device. During her early years, she shot to fame by mentally calculating one of the toughest mathematical multiplications 10 seconds before the fastest and the most efficient computer of the time. Her problem-solving prowess came to the limelight with her performances at various institutions where she answered complex mathematical questions with great ease. She soon rose to prominence for her adept calculations and her confident demeanor. According to many sources, this famous prodigy met Albert Einstein and even he was taken aback by this acclaimed genius' skills. She was able to answer all of his challenging mathematical problems, prompting him to call her a "Mathematical Wizard". Apart from being an unparalleled mathematician, Devi was also an astrologer, activist and a prolific writer, whose works went on to inspire millions of people. Some of her best-known works are 'Figuring: the Joy of Numbers', 'Astrology for You', 'Perfect Murder' and 'The World of Homosexuals'. Scroll further for more information on this intriguing personality.
Finding just the right page among the billions on the Web requires not only a search engine but also a bit of know-how. Here is a selection of my favorite tips for searching the Web. 1. Search for a phrase To search for an exact, complete phrase and not just its constituent words, put it in quotation marks. For example, instead of typing at sunrise on my birthdaytype ”at sunrise on my birthday”. The number of hits will shrink dramatically, as you’ll see only pages that include that exact phrase. 2. Be more specific If you want to find articles about managing bookmarks in Safari on an iPhone running iOS 7, don’t search for just manage bookmarks. Throw all those terms in: manage bookmarks safari iphone ios 7. The more information you provide, the more useful your results are likely to be. 3. Exclude a word
To make sure your search for information on the connector your iPhone uses doesn’t return matches about an atmospheric phenomenon or a fictional race car, put a hyphen (-) in front of terms that should disqualify a page from appearing in Google’s results—for example, lightning -thunder -storm -McQueen. The Silicon Valley home where Apple co-founder Steve Jobs grew up and built some of his first computers is now on the city's list of historic properties. The historical commission in the city of Los Altos voted unanimously for the historic designation Monday night, the Palo Alto Daily News reported. Any proposed renovations to the modest, ranch-style home now require additional review. The home, where Jobs and his foster parents moved in 1968, is owned by Jobs' sister, Patricia Jobs. The commission didn't need her permission for the designation, although she could appeal it to the City Council. Zachary Dahl, a senior planner with the city, said Patricia Jobs requested corrections to the city's evaluation of the property but then didn't respond when it was sent to her for review. "So I'm assuming that was an affirmative because I have had multiple communications with her over the past several weeks," Dahl said. Steve Jobs, with help from his sister and Apple co-founder Steve Wozniak, built the first 100 Apple I computers at the home, according to the city's evaluation. Fifty were sold to a shop in neighboring Mountain View for $500 each. Steve Jobs also wooed some of Apple's first investors and in 1976, established the first partnership for Apple at the home. The company later relocated to nearby Cupertino. "I think it's a good thing for the Silicon Valley," Dag Spicer, senior curator with the Computer History Museum in Mountain View, said about the historic designation. "People need things to reflect on and to hold on to, to have a sense of belonging." More than 29% of youngsters are said to be playing games on smartphones oriPads, even before they can string together a sentence, according to a study. Around 70% of children already know how to use the latest gadgets before beginning to go toschool, according to electronic learning companyVTech. Therefore, by the time they are five years old, these children have already sent 116 texts and 85 emails, Metro.co.uk reported. The study revealed that from the 2000 parents, having children under 11 showed that 47% of them found information for their schoolwork from the internet, as compared to 15% who use traditional books. According to the findings, the usage of smartphones is encouraged by parents, with around 42 percent buying electronic devices for their children for educational purposes. However, the downside effect of the same reveals that 13% of children have accessed inappropriate things online, and 13% have called 999 accidentally VTech's Charlotte Johnson said that children have become more tech savvy and connected to the world than ever before. Many people swear by multiple monitors, whether they’re geeks or just people who need to be productive. Why use just one monitor when you can use two or more and see more at once?
Additional monitors allow you to expand your desktop, getting more screen real estate for your open programs. Windows makes it very easy to set up additional monitors, and your computer probably has the necessary ports. Why Use Multiple Monitors?Multiple monitors give you more screen real estate. Hook up multiple monitors to a computer and you can move your mouse back and forth between them, dragging programs between monitors as if you had an extra-large desktop. People who swear by multiple monitors use them to display multiple things on-screen at a time. Rather than Alt+Tabbing and task switching to glance at another window, you can just look over with your eyes and then look back to the program you’re using. Some examples of use cases for multiple monitors include:
I’m a green tea drinker. Not for the love of the taste — no way! I drink it because I’m told it’s good for me…or, to be honest, the real reason I drink it is because I believe it help keeps my weight in check. But recently I decided to look into it a bit deeper and see what are all these other benefits of green tea people talk of. Why Green Tea? Green tea has been used as a medicine for thousands of years, originating in China but widely used throughout Asia this beverage has a multitude of uses from lowering blood pressure to preventing cancer. The reason that green tea has more health benefits attached to it than black tea is (apparently) due to the processing. Black tea is processed in a way that allows for fermentation whereas green tea’s processing avoids the fermentation process. As a result, green tea retains maximum amount of antioxidants and poly-phenols the substances that give green tea its many benefits. Here’s a list of some of its amazing benefits — benefits that you may not have been aware of. Some of these benefits are still being debated, so please do your own research if you want to use green tea for medicinal purposes. The Windows Task Manager is an important tool for every Windows user. It can show you why your computer is slow and help you deal with misbehaving and resource-hungry programs, whether they’re draining CPU, RAM, disk, or network resources.
Windows 8 has the best built-in Task Manager yet, but even Windows 7′s Task Manager is a powerful tool that every Windows user should familiarize themselves with. Many of these tasks are easier on Windows 8. Opening the Task Manager Windows lets you get to the Task Manger in a variety of ways:
On Windows 7, the Task Manger opens to the Applications tab, which lists open applications and allows you to quickly close them with the End Task button. This works even if they have frozen and aren’t responding. This tab doesn’t allow you to view resource usage. It also doesn’t show every program running on your computer — programs running in the background without visible windows aren’t listed here. Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access.Most malware is no longer created by bored teenagers looking to cause some chaos.Much of the current malware is now produced by organized crime for profit and is becoming increasingly sophisticated. How Ransomware Works Not all ransomware is identical. The key thing that makes a piece of malware “ransomware” is that it attempts to extort a direct payment from you. Some ransomware may be disguised. It may function as “scareware,” displaying a pop-up that says something like “Your computer is infected, purchase this product to fix the infection” or “Your computer has been used to download illegal files, pay a fine to continue using your computer.” In other situations, ransomware may be more up-front. It may hook deep into your system, displaying a message saying that it will only go away when you pay money to the ransomware’s creators. This type of malware could be bypassed via malware removal tools or just by reinstalling Windows. Unfortunately, Ransomware is becoming more and more sophisticated. One of the latest examples, CryptoLocker, starts encrypting your personal files as soon as it gains access to your system, preventing access to the files without knowing the encryption key. |
AuthorAdministrator Categories
All
Archives
April 2014
|