Monday 23 October 2017

What is Deepnet or Darknet?

Image result for darknet


Many people keep on asking me "What is Deepnet or Darknet?"


Therefore, the normal search engine can not access the site formed Deepnet. This includes sites where its robots.txt is set to prevent Google and other search engines from indexing them on the Internet in order to exclude them from the search. They can be private personal website, intranet and so on.

However, Darknet (the term is often used interchangeably with Deepnet) is not just an index for preventing search engines. Darknet on the site is anonymous, that you can not know who the site is, access to such a Darknet site when the owner. Unlisted site owners can still be traced back to who purchased the domain name and so on. Sites in Darknet are sites that use the Tor (The Onion Router) network. The basis of the Tor network is to include so many nodes where the origin can not track where the data is coming or from.

Ordinary browsers can not open the top domain name for .onion's Darknet site because they are not normal domain names, but a string of random characters followed by .onion. These domain names are created by onions when you use an onions or Tor network hosting anonymous sites. So if you try to access a Web site in Darknet, the DNS server does not have any clues to the content, and you will receive an error that the site has not found. Only the onion server knows how to fix these domain names.

Darknet is part of the Internet that hosts anonymous sites that may or may not provide legal content.

You will need a Tor browser to view these sites. Read our comments on the TOR browser to learn more about the onion router and how it works.

Who uses Darknet or Deepnet? Is it dangerous?
This may be as simple as a group of friends who are discussing serious problems, or as dangerous as an assailant's service. May be the journalists who want to work, the possibility of being sentenced to imprisonment, or who may be drug traffickers and weeds. If there is no fear of being caught, the informant who exports the information has this information, and there is also a child pornography on the website.

Most of the underworld was abused by criminals. This is because it provides almost complete anonymity. Where they sell services such as paying for murder (assassin service), all types of pornography, prostitutes, drug traffickers, weed sellers. That's why Darknet is considered dangerous.

Often some links will not tell you where they are leading unless you access them from a reliable Darknet directory. It is possible that you click on the link to some discussion and put it on an assassin's page. If there is any problem, the police will knock on the door.

Why the authorities can not ban Darknet?
The TOR network was originally created by an American military base and communicated anonymously. They are still reproduced in the underworld government files, rather than open to the public. There are anonymous intranet to store these files, and those who have the password can access these files. Since the federal government and other governments themselves are using Darknet, they do not think that the TOR will be shut down.

This is a free hand for criminals, journalists, informants, etc. They can create and host anonymous sites that only provide anything but can not search from the surface network (or the normal network - possibly the site is not indexed), nor can the mainstream browser open these sites because they do not depend on the traditional DNS server The All Darknet / Deepnet has a .onion domain, accessible only through the TOR browser, and some projects can use the TOR network. But the easiest way to get into Darknet is the TOR browser.

Dear friends, kindly give your opinion or experience if you have ever surf deep web or black-market..
NOTE: please there should be restriction of word due to some kids and immature being.

ALERT!!!: New fast IOT botnet threat to break the internet

BOTNET TARGETING COMPUTER

Just a year after the biggest IoT-based malware in the future, a huge Internet crash was launched by launching a massive DDoS attack - a year ahead, security researchers are warning a new fast growing IoT botnet.
Researchers first discovered "IoT_reaper" by the odd tiger 360 company in September, and the new malware no longer relied on cracked passwords; instead, it exploited vulnerabilities in various IoT devices and swallowed them into botnets.

IoT_reaper Malware currently includes the following nine previously disclosed vulnerabilities in the IoT device vulnerability of the following manufacturers:


  1. Dlink (router)
  2. Netgear (router)
  3. Linksys (router)
  4. Goral (camera)
  5. JAWS (camera)
  6. AVTECH (camera)
  7. Vacron (NVR)

Researchers believe that IoT_reaper malware has infected nearly 200 million devices and has grown 10,000 new devices at an extraordinary rate every day.

This is very worrying, because last year the use of large-scale DDoS attacks Mirai removed the DNS provider Dyn, only 10 million infected devices.
In addition, the researchers pointed out that malware also includes more than 100 DNS resolvers, enabling it to start DNS amplification attacks.

"Currently, this botnet is still in its early stages of expansion. But the author is actively modifying the code, which deserves our vigilance." Qihoo 360 researchers say.

At the same time, CheckPoint researchers have warned that the same IoT botnet, called "IoTroop", has been infected with hundreds of thousands of organizations.

"It is too early to guess the intentions of the threat actors behind it, but with previous Botnet DDoS attacks essentially taking down the Internet, it is vital that organisations make proper preparations and defence mechanisms are put in place before attack strikes." researchers said.

According to CheckPoint, IoTroop malware also exploited vulnerabilities in wireless network camera devices such as GoAhead, D-Link, TP-Link, AVTECH, Linksys, Synology.

At this time, do not know who created this, why, but DDoS threat pattern is soaring, and may reach tens of megabytes of size.
"Our research suggests we are now experiencing the calm before an even more powerful storm. The next cyber hurricane is about to come." CheckPoint researchers warned.

You need to be more vigilant about the security of your smart devices. In our previous article, we have provided some essential, somewhat practical, solutions to protect your IoT
devices.
SOURCE: https://thehackernews.com/2017/10/iot-botnet-malware-attack.html

Termux: The android terminal emulatior


Termux is an Android terminal emulator and Linux environment application that works directly without taking root or setting up. Automatically install the smallest base system - you can use the APT package manager to provide additional packages.

Termux is also a terminal emulator is a program that makes your Android phone like an old computer terminal. It is useful for accessing the built-in Linux command line shell for each Android phone. This allows you to run various Linux command line utiliti

USES OF TERMUX APP!!

Secure Access. Use OpenSSH's ssh client to access the remote server. Termux combines standard packages with precise terminal emulation in a beautiful open source solution.

Feature packed are selected between Bash, Fish or Zsh and nano, Emacs or Vim. Through your SMS inbox. Access the API endpoint and use rsync to store a backup of the contact list on the remote server.

Customizable. By installing the APT package management system from Debian and Ubuntu GNU / Linux you want to install. Why not start with Git and sync your dotfiles?


Explorable. Are you sitting on the bus and want to know which parameters tar accepts? The packages provided in Termux are the same as the packages on Mac and Linux - install the man pages on your phone and read them in a conversation and experiment in another session.


Friday 20 October 2017

How to hack a Facebook account online?

Image result for hack facebook online


Hackers Facebook / Facebook Hackers are one of the most popular hot topics on the Internet, like Gmail hackers. We have prepared a detailed list of how hackers in a few minutes easily hijack someone's Facebook account, how can we prevent this situation? For your information, this is more than 4000 words of the article, there are a lot of useful information, so most people can not read the full article. We have downloaded all of the following technical PDFs for offline downloads, so you can store them on your phone or computer anytime, anywhere.

As FB white hat hackers, I often get the following questions from people:

Is there an online Facebook cracker?
Where can I get FB hacker software?
Is there a free Facebook password finder?
How can i easily hijack someone's Facebook account?


As far as I know, there is no such tool. You will not be able to find it anywhere. However, if you use Google, you will find that many sites claim that they provide free hacking tools online or offline, but you can not download the password file in the case of a completed survey. Even after an annoying completion of the investigation process, you have nothing to get. These things are just for making money. Do not waste your valuable time searching for such hacking tools.

If you want to know how hackers hijack someone's Facebook account, please read the techniques listed below. The most successful of all these techniques is PHISHING. Phishing allows users to easily steal Facebook account passwords in just a few minutes.

Check out this fishing guide to learn more about PHISHING!


Some of the techniques listed below do not apply to FBs, but to all everyday Internet sites such as Google, Twitter, Yahoo, and so on.

BEWARE!!! :- ATM malware is being sold on Dark Web market

ATM malware

ATM malware is available for sales on Dark site market which can  drain available cash on the ATM machine.


In May 2011, Kaspersky Security researchers noted that a forum was advertised with ATM (ATM) malware for specific vendor ATMs.

Since May 2017, malware has been sold on the AlphaBay Dark Web market, but since mid-July the US authorities have canceled AlphaBay, their administrators have started a new standalone site.

At the time of the study, the cost of the kit was $ 5,000. The AlphaBay description covers details such as required tools, targeted ATMs vendors, and tips and tricks for malware operations.

sources : https://latesthackingnews.com/2017/10/17/atm-malware-sold-dark-web-market-can-make-atms-drain-available-cash/


ALERT!: 25% of the Federal Government Mails are Fraud.



The research shows a study released Thursday by architect Agari.

Agari represents more than 400 federal websites, including the Ministry of Health and Human Services and the Department of Veterans Affairs, the Census Bureau and the Senate's real website, to support e-mail fraud.

Although the e-mail lists a word that is "from", the e-mail order does not verify that the message is actually sent to the address listed in the "of" field.

There are updated rules that can automatically verify e-mail, called DMARC. The order will double check whether the listed sender sends a communication, allowing the forged e-mail to be destroyed or sent to spam. The Department of Homeland Security (DHS) this week issued a directive that requires all federal agencies to complete DMARC.


In the case of
Agari and other providers can process DMARC and Agari according to DMARC-certified statistics.

Of the 335 million government e-miles studied by Agari, more than 85 million were fake.

Agari records that only 18% of federal domains have DMARC. Also, more than half of them will not take the DMARC's choice, ask the email provider to delete the fraudulent e-mail or publish it to the spam folder.

Take the time to comment on this article.

Sunday 5 February 2017

Firefox OS is no more as Mozilla set ablaze entire connected devices team

Image result for mozilla phone



Mozilla isn’t having a great deal success with regards to expanding the reach of its maximum well-known product. The business enterprise ceased development and sales of Firefox OS smartphones simply over a 12 months ago, saying it would use technology from the open-source working system to go into the internet of things space. Now, that effort has also died.



The removal of the IoT group will affect round 50 humans. some of them may be able to continue to be on the corporation, as Mozilla has opened new positions that employees from its connected devices initiative can practice for.

The phase’s senior vice chairman, Ari Jaaksi, is also leaving. He follows the team’s director of software, Bertrand Neveux, out of the door.

"we've got shifted our inner technique to the internet-of-things opportunity," 

Mozilla said in a statement on Thursday, "to step lower back from a focus on launching and scaling commercial products to one targeted on studies and advanced development, dissolving our related devices initiative and incorporating our internet-of-matters explorations into an improved recognition on rising technologies."


Unveiled in February 2013, Firefox OS become in most cases targeted at low-end handsets in emerging markets. but it was the rapid adoption of Android in these areas that hampered efforts. The situation was compounded by using the cancellation of the $25 Firefox OS cellphone in 2015, in the end main to the nonprofit forsaking its cellular OS plans later that 12 months.

Firefox OS intro video from 2013


Mozilla did have a few achievement within the related devices market, thanks to Firefox’s inclusion in Panasonic’s 4K television, however the company's different services failed to attract tons interest.
Mozilla believes that the move would not spell the give up of its net of factors endeavors. “IoT is certainly an emerging technology space,

” the agency says, “but it's still early.”

Donald Trump's immigration ban affected by some tech industries! [news]

Donald Trump's immigration ban affected by some tech industries!


It’s now not regularly that you’ll discover the tech industry in settlement over something, however from Alphabet to Uber, the grievance towards Donald Trump’s immigration ban has been the same. Because the President signed the govt order blocking access to the USA citizens of seven Muslim-majority nations, Silicon Valley has fought against the words and actions.


Google changed into one of the first to react to Trump's actions. CEO Sundar Pichai instructed team of workers visiting overseas that may be impacted by the order to return to the USA. In a notice to personnel, Pichai said nearly 2 hundred Google workers are affected by the ban.
"It’s painful to see the personal cost of this executive order on our colleagues," Pichai wrote. "We’ve always made our view on immigration issues known publicly and could keep to do so."

Google has now created a $4 million “crisis fund” so that it will be donated to four groups: the ACLU, Immigrant resource center, international Rescue Committee and Mercy Corps.

Apple boss Tim prepare dinner stated the company will do everything it could to aid affected employees, including that “Apple would not exist without immigration.” Microsoft, in the meantime, has seventy six employees beneath danger. CEO Satya Nadella, himself an immigrant, said: “As an immigrant and as a CEO, I’ve both experienced and visible the fantastic impact that immigration has on our agency, for the United States, and for the sector. We are able to hold to recommend in this essential topic.”

Facebook's Mark Zuckerberg expressed his concerns over the ban at the social network. He wrote that the company is "assessing the effect on our group of workers and figuring out how pleasant to defend our people and their families from any adverse results.”

After it was lambasted for refusing to expose unity with New York metropolis taxi drivers who were placing at JFK airport, Uber said it will create a $3 million legal fund to assist its drivers tormented by the ban. Rival Lyft is also helping by donating $1 million to the ACLU over four years. Its co-founders wrote: “[we] will not be silent on issues.”
Tesla’s Elon Musk, who is a part of Trump’s commercial enterprise advisory group, tweeted that the ban isn't the excellent way to address the country’s challenges.”

LinkedIn, Amazon, Mozilla, Twitter, and many more have also spoken out against the ban. Netflix CEO Reed Hastings had some of the most harsh words, calling the order “so un-American it pains us all.”

“Worse, those moves will make America less secure (via hatred and loss of allies) in place of more secure,” Hastings delivered.

Thursday 2 February 2017

TOP BEST AND CHEAP PHONE IN USA! [MUST HAVE]



Moto G4 configuration


The best reasonably-priced phone in the US is a complicated find. Even in 2017, companies still love to lock you into contracts for budget smartphone prices, only to have you pay the full amount back in high monthly charges.


It truly is why we have sorted via loads of inexpensive smartphones so as to rank the best alternatives that you could purchase unlocked without monthly charges and, importantly, with out a -12 months contract.

And good news: whilst many are $200 or much less, you may sincerely recognize the names: Motorola, Google, Sony and Apple. Others may be new to you, namely ZTE and OnePlus, however they're simply as worth of your consideration.


one of he best cheap phone in the USA is MOTOROLA G4  and has the following configurations below.   

Moto G4

The best Moto G yet 
Weight: 155g | Dimensions: 153 x 76.6 x 9.8mm | OS: Android 6 | Screen size: 5.5-inch | Resolution: 1,920 x 1,080 | CPU: Octa-core 1.5GHz | RAM: 2GB | Storage: 16/32GB | Battery: 3000mAh | Rear camera: 13MP | Front camera: 5MP
$343.53
 
Bright Full HD display
Impressively powerful
Lack of Moto Maker options
No NFC
 
This phone can be acquired in various online shops  like amazon e.t.c
 
best!!!

HOW DOES SMAT HOME DEVICE WORKS [ LATTEST TECH]

what is smart home tech?

A smart home is one that provides its home owners consolation, protection, energy performance (low built-ing charges) and comfort always, no matter whether anyone is home.


"smart home " is the term commonly used to integrated a residence that has appliances, built-in, heatbuilt-ing, aircon, TVs, computers, enjoymentintegrated audio & video structures, protection, and camera systems which can be capable of built-inintegrated with each other and may be controlled remotely by a time schedule, from any room builtintegrated home, as well asbuilt remotely from any region withbuiltintegrated built-in through smartphone or built-innet.

integrated of smart merchandise provide the home and its occupants diverse built-ings — the identical blessbuiltintegrated that generation and personal computbuilt-ing have builtintegrated to us over the past 30 years — convenience and built-inintegrated of time, money and electricity.

most homes do not have these home equipment and systems constructed integratedto them, therefore the most common and affordable technique is for the home proprietor to retrofit smart products built-into their own integrated home.

most products are available integrated one builtintegrated 4 protocols (the way of communication among themselves) and all of these are well suited with the builtintegrated, smartphone, and cell phones. those are the names for the 4: X10, Z-Wave, UPB and EnOcean. products that use the equal protocol provide the potential to feature products and hardware at the house owners own pace and budgetbuilt. The machbuiltintegrated can develop to fulfill the desires of a changbuiltintegrated family as time goesbuilt on. All of these products can be decided on from various manufacturers, integrated an luxurious obsolescence or non-competitive pricintegratedg.

the products SmartHomeUSA gives are all DIY friendly and have been created with retrofittintegratedg integrated thoughtsintegrated (builtintegrated set upintegrated of smart built-in switches without havbuiltintegrated to run any new wires). Our software built-inservices are property owner pleasant and can be built-installed on any currentintegrated desktops.

An integrated crucial feature of a smart home is conservation of the earth's built-in assets. built-inintegrated built-ingsintegrated built-ing aware about the capability to make their houses simply smart — and builtintegrated — via built-inintegrated home controllers built-inintegrated with all home sub-structures to built-inboom built-ingsintegrated by controllbuilt-ing built-inintegrated, wbuilt-indow coverbuilt-ings, HVAC, irrigation and via tracking usage. Many domestic controllers have 7fd5144c552f19a3546408d3b9cfb251 monitoring structures wherebyintegrated they calculate and log utilization built-ingintegrated all related devices, givintegratedg the home owner heightened consciousness and the built-information to make adjustments as essential. these structures may even be accessed over the built-innet from anywhere integrated built-in so the house owner can adjust built-in any time, everywhere.
Related Posts Plugin for WordPress, Blogger...