Posts

Showing posts from August 7, 2016

Best CMD commands used in hacking

Top CMD or MS-DOS prompt commands which every hacker should know If you have been following Techworm regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and want to learn hacking always ask us for the top Dos Prompt (C:/ or CMD commands in Windows 10/7/8.1) they should know. So here goes. CMD is a power tool which lets you do almost anything with your PC/laptop. There are common commands like CD.. and MD etc which you probably know so we wont get into that. Here are some really useful things a hacker can do with CMD commands. First, open your Network Connection and right click and select Properties . Then Select TCP/IP and click Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS . Now back to the main Local Area Connection window, select File and Print Sharing for Microsoft Networks and hit enter. This is just to make sure you have ...

C++17: New Features Coming To 33-Year-Old Programming Language

The C++17 standard is taking shape and adding new features to the vintage programming language. This major update aims to make C++ an easier language to work with and brings powerful technical specifications. I f you are fond of the relatively newer programming languages like Apple’s Swift, you might be too comfortable calling C++ a bloated programming language. To tackle such questions and improve the support for large-scale software, C++17 is expected to ship in 2017.At the recent standards meeting in Oulu, Finland, the actual and final features list of C++ has been finalised. As a result, C++17 has become a major release just like C++98 and C++11. The new C++ 17 standards are introducing new features like structured bindings and if initialisers, making this vintage programming language “feature complete”. The C++ community is calling C++17 the start of a new era that will bring powerful technical specifications. The non-C++17 features will be released la...

This Guy Hacks A Hydro-Electric Generator To Charge His Smartphone

Real-Life MacGyver Hacks Together a Hydro-Electric Generator To Charge His Device One of the most common problems that one faces with its smartphone is the battery life. Thanks to the numerous social media, games and other apps that one has on its smartphone, the battery keeps getting drained secretly while running these apps in the background. As a result, we end up charging our smartphones more than two to three times in a day. So, what do you do when you are out trekking, or on a wildlife expedition and your smartphone is running out of battery and there are no power outlets to charge your device? In such a scenario, all you require is a little inventiveness that can turn random junk into a working hydro-electric generator. That is what YouTuber Thomas Kim showed in a video posted on YouTube. In the video, he demonstrated how he MacGyver’d some water bottles, disposable platters, 3 Phase stepping motor, rectifier circuit, metal pipes, and other materials into t...

This lady is paid to create earthquakes and terrorist attacks at Google

Meet the Director of DiRT team at Google who is paid to create worst chaos scenarios How would Google employees react if aliens were to invade earth, or an earthquake destroyed California? Tomorrow if an asteroid were to strike Earth, Google wants you to know that it will still be there for you. For this purpose, it has a special chaos creating a team made up of  a group of 10 Google engineers go around purposely wreaking havoc just to see what happens. The woman behind this team called DiRT (Disaster Recovery Testing) Team is Kripa Krishnan and through this process, the team makes sure that Google can keep itself running no matter what happens. Kripa and her team create all kinds of doomsday scenarios possible for Earthlings. Sometimes DiRT makes Martians invade the earth. Other times they create earthquake or a chemical attack. The DiRT teams work is to strik internally at Google targets without giving a warning just like your local police con...

Auto-pilot saved my life says Tesla car owner

Man says Tesla Autopilot saved his life by driving him to the hospital While we were all dissing Tesla for the death of a car owner due to Tesla’s autopilot, there is some good news from another part of United States. A Tesla owner from Missouri man says that the Tesla Autopilot helped saved his life by driving him to the hospital during a life-threatening emergency. Joshua Neally is a lawyer and Tesla owner from Springfield, Missouri, who often uses the semi-autonomous driving system called Autopilot on his Tesla Model X. One fine day, when Neally was driving his Tesla Model X, he developed a potentially fatal blood vessel blockage in his lung. The disease is called pulmonary embolism and could have taken his life but for Tesla’s autopilot. Neally told Slate that Autopilot drove him 20 miles down a freeway to a hospital. The hospital was right off the freeway exit, and Neally was able to steer the car the last few meters and check himself into the emergenc...

Microsoft won’t fix Windows flaw that lets hackers steal your username and password

The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account. A previously disclosed flaw in Windows can allow an attacker to steal usernames and passwords of any signed-in user — simply by tricking a user into visiting a malicious website. But now a new proof-of-exploit shows just how easy it is to steal someone’s credentials. The flaw is widely known, and it’s said to be almost 20 years old. It was allegedly found in 1997 by Aaron Spangler and was most recently resurfaced by researchers in 2015 at Black Hat, an annual security and hacking conference in Las Vegas. The flaw wasn’t considered a major issue until Windows 8 began allowing users to sign into their Microsoft accounts — which links their Xbox, Hotmail and Outlook, Office, and Skype accounts, among others. Overnight, the attack got larger in scope, and now it allows an attacker to conduct a full takeover of a Microsoft account.

How To Free Up To 20GB Space After Windows 10 Anniversary Update?

Image
The Windows 10 Anniversary update is huge and comes with lots new features. But, a lot of space is consumed by the leftover Windows files. You can delete them by using the Disk Cleanup utility present in Windows 10 and free up to 20GB space. W indows 10 Anniversary Update was released on August 2 with some freezes and crashes . The update comes with a plethora of features which were not a part of earlier Windows versions.After a large Windows update, a huge amount of space is consumed by the files from the previous Windows installation. This happens if you use the internal Windows update for upgrading rather performing a clean install using a bootable disk. You can rid of the unnecessary data and free some space on your computer using the Disk Cleaner Utility: Open This PC/My Computer . Right Click on your Windows installation drive (For example, C in my case). Click Properties . Click Disk Cleanup . In the Disk Cleanup window, click Clean up system files . Make ...

Why Do All Airplane Windows Have A Tiny Hole In Them?

Having a hole anywhere on a plane seems a terrible idea, so why there is a tiny gap in the windows? The experts explain the crucial role they play If you’ve ever stared out the window as your plane takes off, you will have seen a tiny hole in your window. At first, it may seem like a weird addition, especially in something that’s carrying a lot of people at a great height, but they’re there for a very important reason: to stop the cabin from depressurizing. ADVERTISING inRead invented by Teads Cruising at 10,600 meters (35,000 feet), the pressure is around 1.5 kilograms (3.3 pounds) per square inch. This is too low for the human body to stay conscious, so the pressure is artificially maintained at around 3.5 kilograms (8 pounds) per square inch. But of course, if you increase pressure inside, the structure has to be strong to hold the difference between the external pressure and internal pressure. The difference between the two puts physical stress on the w...

Best 5 IT Security Certifications

Top 5 IT Security Certifications To Enhance Your Career While not having an IT security certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-leading credentials look at it as one measure of qualifications and commitment to quality. As the market for information security talent heats up and the skills shortage continues, infosec experts who have the right combination of credentials and experience are in remarkably high demand. “A certification today is like a college degree,” says Grady Summers, America’s leader for information security program management services at Ernst & Young. “You may not hire a candidate just because they have one, but it is something that you come to expect in this field.” “There is no replacement for real-world experience,” Summers says. “However, certifications are important and have become de facto minimum criteria when screening resumes.” Here is a list of top fi...

This New Kind Of Super-efficient Wi-Fi Uses 10,000 Times Less Power

To solve the problem of high energy consumption by the Wi-Fi enabled devices, researchers have created a new kind of efficient Wi-Fi that uses 10,000 times less power. While this technology needs some time before it’s applied in the devices, it could be the next big thing in communication technology. Y ou might have noticed that using Wi-Fi on phones sucks the battery way too faster. To address this issue, a team of researchers from the University of Washington has developed a new type of super-efficient Wi-Fi that allows consumers to use the internet by using 10,000 times less power than the current Wi-Fi components.This breakthrough can allow the technology companies to integrate Wi-Fi networking into more devices. At the upcoming USENIX Symposium on Networked Systems Design and Implementation, the team will be presenting a paper with the results of research. So, how did the researchers do it? Basically, Wi-Fi transmission involves digital an...

This developer died 14 years ago, here’s a print out of his source code

Reader scores shonky NetWare support job where he had to share monitors This week, reader Earl tells us that just this year he responded to a Craigslist ad for a Novell NetWare Admin to figure out why .nlm files would not be loaded and fix the issue. Earl says he wrote back and told the person that I was very expensive and I had not worked with NetWare since 2003, but if they do not find anyone else to take the job they should give me a call. Earl was just 90 minutes away by train and got the gig. Said server was a Dell PowerEdge 1300 with 64MB of RAM and a 10GB IDE hard drive. I was told they ‘should’ be able to boot up but no one could remember why they had even bothered to get a ‘new’ server at all. Earl quickly found the problem, namely an ancient surge protector more than a decade beyond its warranty. The text above is a summary, you can read full article here .

How to Play Pokémon Go On Your PC/Laptop

Catch Pokemon with Pokemon Go on your PC/Laptop without ever leaving your desk, but it’s a little bit messy. If you are not living under a rock, you must have heard about Nintendo and Niantic’s gaming sensation, Pokémon GO , which is based on augmented reality.  Pokémon GO requires gamers to walk around their neighborhood with the smartphones to capture Pokémon nearby. For now, Nintendo has not released this game for Windows devices. However, you can play this game on your Windows 10 PC using Android emulator such as Bluestacks. Since you can’t carry your Windows PC, you can use Fake GPS to fool the Pokemon Go on Windows PC/laptop that you are actually moving around. Even if you have Android smartphone or iOS device, if you want to collect all the Pokémons without leaving your desk, then the following may be your solution. Step by step guide to install Pokemon Go on your PC or Laptop Files to Download 1. Download and Install BlueStacks App on your computer....

10 Most Common Mistakes Every Beginner Java Programmer Makes

According to you, which is the most common mistake every beginner makes while coding in Java programming language? Well, there are some basic coding mistakes that people make again and again. Know how to spot them and improve your coding skills. S ince its advent in 1995, Java has been changing our lives and exceeding the expectations of people. The Sun Microsystems team that worked around the clock to develop this programming language targeted the digital television industry. As the concept of Java was too advanced at that time, it seemed perfect for the internet and other applications.Over the time, object-oriented programming language Java has spread everywhere and created its own special place in the world of programming. The language is easy to learn but problems do exist in Java just like any other language. Here I’ll be covering the 10 most common mistakes made by every Java programmer. This list is based on the research work done by data scientists th...

Apple announces long-awaited bug bounty program

Tech companies hold the keys to some of our most personal information — payment details, health records, chat logs with our lovers and archives of family photos — and, as we hand over more and more private data, it becomes increasingly important that companies earn our trust by keeping it secure. Over the past five years, most major tech companies have instituted bug bounty programs, welcoming vulnerability reports from hackers and reimbursing for reports in cash. Companies that don’t have the technical expertise to run their own bounty programs have outsourced this important security work to outside firms. But for years, Apple remained a holdout. While security has been a crucial part of its corporate narrative, Apple has quietly refused to pay for bug reports, at times frustrating security researchers who found it difficult to report flaws to the company. That changed today, as Apple’s head of security engineering and architecture, Ivan Krstic, announced to Black H...

Instagram CEO on Stories: Snapchat deserves all the credit

Image
The one thing you never hear in Silicon Valley is an entrepreneur admit they copied someone else. Yet there in the headquarters of Facebook, the world’s most prolific product cloner, Instagram CEO Kevin Systrom surprised me. He’d just walked me through the demo of Instagram Stories, a pixel for pixel photocopy of Snapchat Stories . The products look so similar I couldn’t help but chuckle as he progressed through the slide deck about a feature he said would probably look familiar. For 30 minutes, the elephant lingered there in Systrom’s plush office alongside Instagram’s PR chief and me. We sat around a table made from a print of a shaggy dog, the first photo ever posted on the app. Six years later, Systrom revealed how for the last six days, he’d posted nothing to Instagram. Despite the glamorous life of a CEO who’d sold his startup for nearly a billion dollars, his day-to-day wasn’t interesting enough to share to Instagram’s feed. It was a permanent place where...

Google Has a New Trick for You, Just Google I’m Feeling Curious

Image
Google has made a new addition to its fun tricks list. Just Google “fun facts” or “ i’m feeling curious”, and get a dynamic answer box that gives new fun facts each time you ask for more. C ompared to Google, an ordinary person knows almost nothing. Google can tell you the weather outside your home , the location of your gift package , or you can even ask some genius question to get a job offer at Google . The company also knows that our weird human race gets bored easily. So, if you are looking to kill some time, Google’s new trick is here to help you.If you simply search “fun facts” or “i’m feeling curious”, the search engine giant displays a dynamic answer box before the other search results, and show a random fun fact in the form of a question and its answer. The short and fun answer is accompanied with a link to the complete content. Below that, you can see a button saying “Ask another question” that will return a new search result with a new fun fact ...

How can you be a good security researcher

So You Want to Be a Security Researcher? Here is how its done! So you want to be a security researcher? Security researchers are much in demand these days due the rise in cyber security threats as well as growth in tech companies. Some of you want to become a security researcher for the fame it offers while others may be in it for the awesome money. Security researchers need a broad set of skills to investigate a constantly-changing threat landscape. But if you broaden your spectrum you may end up being a jack of all trades. Therefore specializing in areas such as reverse engineering or network forensics will boost opportunities for you. A reader on Quora aptly put the following requirements for becoming a security researcher : Firstly, one should know many programming language  like Java, Python, Ruby, C and many more. First the learning part, learing C and C++ programming language will set you up nicely. The two languages will open the doors for further le...

Mega Telegram Hack: Hackers Attacked 15 Million Telegram Users

More than a dozen Telegram accounts were compromised leading to the identification of 15 million users’ cell number. Two researchers were able to point out this mass hacking campaign being carried out and have hinted the involvement of Rocket Kitten group behind this. T he messaging app Telegram is quite popular in the middle-east nations and Latin America. Iran has around 20 million Telegram users which contribute to around 20 percent of the Telegram users. The abundance of users  was enough to lure a hacker group. Reports have been floating around that around 15 million Iranian Telegram users’ phone numbers have been compromised.Two researchers, an independent cyber security expert Collin Anderson and Claudio Guarnieri, were able to detect the security breach which utilized the two-factor SMS verification used by the Telegram app for adding a new device to a user’s account. The hacker, who has access to the SMS data of a device, could add his own device to the...

The Unexpected Happens When You Put a Red Hot Nickel Ball on Floral Foam

In this amazing science video, a red hot nickel ball is placed over a floral foam, but no one expected it to turn out like this. It didn’t melt, it didn’t burst into flames. Check out what happened. D o you like to see things burn, or want to play with red-hot metal ball? YouTube has a number of channels filled with people doing crazy stuff all over the world. Guys perform weird science experiments to quench their knowledge, while some do it just for fun.If you like to watch amazing science videos, then you must have seen the carsandwater experiments. This is a place where you can see all sorts of science experiments and DIY projects. Red Hot Nickel Ball experiments are some of those. What’s happening here? In this episode, a piece of floral foam is tested against a red hot nickel ball.  A red hot nickel ball is placed over the floral foam, but the result didn’t go as expected. The red hot nickel ball didn’t melt the foam or make a hole through it, or e...

How Microsoft Launched Windows 1.0 With This Crazy Advertisement 30 Years Ago

Image
Windows 1.0 was introduced by Microsoft back in 1985, 30 years ago. To market the OS, Microsoft made an infomercial that channeled classic Steve Ballmer. Take a look at Microsoft’s first ever Windows press release and the video. 30 years ago today, Microsoft started writing a new chapter in the computing world with its first version of Windows. On November 20th, 1985, Windows 1.0 was launched as a successor to MS-DOS. This new OS laid the foundation of many Windows features like scroll-bars, icons, dialog boxes, drop-down menus – and apps like MS paint and Notepad.It wasn’t that impressive in looks, but the new graphical clock made it look cool. But, how did Microsoft advertise this product? In its press release, Microsoft boasted and sold the new features: Windows lets users integrate the tasks they perform with their computer by providing the ability to work with several programs at the same time and easily switch between them without having to quit ...