Saturday 28 January 2017

Why Digital India?

Digital India 
Digital  India is a campaign launched by the Government of India to ensure that Government services are made available to citizens electronically by improved online infrastructure and by increasing Internet connectivity or by making the country digitally empowered in the field of technology. ... Digital literacy.
Digital india is a program that is launched by the Prime minister of India, Narendra Modi.  Narendra Modi has planned to use the information technology, computers, telecommunication facilities, internet, network connectivity, digitization techniques to modernize the services offered to citizens.  Digital India also aims at providing internet connectivity to all citizens.

    This program is launched on July 1st, 2015.  A digital week was celebrated with a lot of discussions to finalize the requirements and features of Digital India.

    Digital India will provide digital vaults (safes) for people to store their certificates online.  Each person will have one unique private key, that will allow people access to their own documents.  Applications will be made and processed online.  The possibility of fake certificates will reduce and authenticity is improved.

    Digital training on the technologies will be provided for achieving literacy in citizens.  Mobile phones will be used as the personal identity for various transactions.  People in rural or urban areas will have access to all digital services and the Internet of things (IoT) on their mobiles or other gadgets.

   Digital India will have more transparency in the processes and governance.  It will eliminate a lot of cheating.  The documents are also safe.  This program will increase employment related to these technologies.  A lot of activities will become automated, with quality of service improving.  This program also will make Indians go to a higher level of literacy and technical skills.

   This program is chaired and supervised by the minister for communications and Information technology at the center.  Its aim is to provide Wifi services to 2.5 lakh schools.  Broadband internet connectivity to 2.5 lakh villages, and universal mobile phone connectivity.  Through this program by 2020 we want to achieve net zero imports, ie., exports will be equal to imports.

   Then 400,00 public access points for net will be provided and more than a Crore persons are to be trained in internet technologies, telecom, information technologies.  There is to be  a huge cloud of computers and servers to hold data related to the public.  Broad band connectivity will be provided with vast network of fiber optical cables.    All government offices would have attendance recorded and maintained online, using Bio-metric identification.

   New emerging area of flexible electronics field will be given a push with research and development facility.  The policy for setting up of the BPO organization in India is modified for benefiting North East India.

   There is a lot of importance given to making of digital gadgets and smart phones with in India.  Various technological giants in hardware and software in telecom and computers, have agreed to step in and cooperate in Digital India.  These include the top Indian and Multinational organizations.

   Digital India has 5 years of expected completion period.  It goes hand in hand with smart cities and various government services.  An internet web site is opened for this purpose.  People can contribute, discuss over there to furnish their valuable advises and requirements so that the final shape of Digital India is the best.  

Get More Details on 
http://digitalindia.gov.in/content/about-programme

Friday 16 September 2016

iphone 7 and 7 plus review

iphone 7 a flag ship of a waste??

 
There’s only one thing that matters about the Apple iPhone 7, and that’s its lack of a headphone port. Everything else is irrelevant.
Except that’s utter balls, obviously.
That missing hole is a big deal, sure, but so are the improvements to the camera, the blistering speed of the new A10 processor, and the changes to the home button. In fact, to let any one feature dominate this review – whether good or bad – would be entirely out of keeping with the phone itself, which is the archetypal sum of its parts.
Some of the additions here may seem quite minor, but added together, they equal a surprisingly different beast from last year’s iPhone 6s.

Let's tackle the big issue right away. As you might have heard, the 3.5mm headphone port is no more, taken out back like Old Yeller and given both barrels by (presumably) a symmetry-obsessed Jony Ive.
You’ve got to switch to a pair of headphones with a Lightning adapter if you want to pump music directly into your ears now, or invest in some pricey Bluetooth buds. Sure, there’s a pair of Lightning EarPods in the box, but when have Apple’s bundled ’phones ever been the last word in critical listening?
So, just how big a deal is this? Well, let’s do a little fence sitting.
On the one hand, it’s a typically arrogant move by Apple which will definitely annoy millions of people who already own standard headphones and are quite happy with them really, thank you very much. We imagine there’ll be one or two upset headphone manufacturers too.
The change doesn’t really seem to bring many benefits and while Apple has at least included an adapter in the box so you can keep using that decent pair of in-ears or cans, it’s both pug-ugly and another thing to carry around (and lose) while you’re on the move.
On the other hand… so what? Wireless has been the future of audio for some time now and, in ditching the port, Apple has simply brought that reality forward by half a decade or so. Yes, it’s an arse if you feel the need to buy a new pair of quality headphones, but if you’re set to spend £40 or so a month on a new iPhone the reality is you can probably afford the switch. When it works, wireless feels genuinely new and exciting.
Anyway, we've been here before. Apple does its thing, the world complains, Apple ignores the world, the world gets bored complaining and realises it still wants to buy an iPhone and yadda yadda yadda.
What you do get in place of the headphone port is a second speaker grille - however it doesn’t actually have a speaker behind it, instead just pumping out sound generated from behind the first grille. However up on top of the phone there is in fact a stealthy second speaker hidden behind the earpiece grille. All very strange.
It’s a first for Apple, and it really packs quite a lot of loud for its size. With both speakers pumping, it’ll easily overpower most other phones. Cover up one speaker and you’ll be amazed by how wide the stereo effect can be, too. Netflix in the bath just got a whole lot more immersive. And hey, this time your phone won’t drown if you don't fish it out quickly enough.

Monday 25 July 2016

What is doker?

What is doker?
Docker is an open-source project that automates the deployment of applications inside software containers. Quote of features from docker web page:
Docker containers wrap up a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. This guarantees that it will always run the same, regardless of the environment it is running in.[5]
Docker provides an additional layer of abstraction and automation of operating-system-level virtualization on Linux.[6] Docker uses the resource isolation features of the Linux kernel such as cgroups and kernel namespaces, and a union-capable file system such as aufs and others[7] to allow independent "containers" to run within a single Linux instance, avoiding the overhead of starting and maintaining virtual machines.[8]
The Linux kernel's support for namespaces mostly[9] isolates an application's view of the operating environment, including process trees, network, user IDs and mounted file systems, while the kernel's cgroups provide resource limiting, including the CPU, memory, block I/O and network. Since version 0.9, Docker includes the libcontainer library as its own way to directly use virtualization facilities provided by the Linux kernel, in addition to using abstracted virtualization interfaces via libvirt, LXC (Linux Containers)

Tuesday 18 August 2015

How to Hack

   How to Hack

Primarily, hacking was used in the "good old days" for learning information about systems and IT in general. In recent years, thanks to a few villain actors, hacking has taken on dark connotations. Conversely, many corporations employ hackers to test the strengths and weaknesses of their own systems. These hackers know when to stop, and the positive trust they build earns them a large salary.

If you're ready to dive in and learn the art, we'll share a few tips to help you get started!


1
Learn a programming language. You shouldn't limit yourself to any particular language, but there are a few guidelines.
  • C is the language the Unix was built with. It (along with assembly language) teaches something that's very important in hacking: how memory works.
  • Python or Ruby are high-level, powerful scripting languages that can be used to automate various tasks.
  • Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP.
  • Bash scripting is a must. That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you.
  • Assembly language is a must-know. It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly.
  • 2
    Know your target. The process of gathering information about your target is known as enumeration. The more you know in advance, the fewer surprises you'll 
  • 3
    Test the target. Can you reach the remote system? While you can use the pingutility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.

Tuesday 19 November 2013

How do I write a JavaScript?

How do I write a JavaScript?

Question

How do I write a JavaScript?

Answer

To write a JavaScript, you will need a Web browser and either a text editor or an HTML editor.
  • For the Web Browser, you could use Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, or any modern Web browser you prefer.
  • For the text/HTML editor, you can use any number of options such as NotepadWordpad, Dreamweaver, or one of the numerous other editors available.
Once you have the software in place, you can begin writing JavaScript code. To add JavaScript code to an HTML document, you will need to create or open an HTML file with your text/HTML editor. A basic HTML file will have a docType and some basic HTML tags such as <html> <head> and <body>. For example, a basic HTML 5 document might look something like what is shown below.
<!DOCType HTML>
<html>
<head>
<title>Testing JavaScript</title>
</head>
<body>
Content goes here...
</body>
</html>
When you see JavaScript code on the Web, you will sometimes see some JavaScript code between the <head></head> tags, or you may see it within the <body></body> tags (or even in both places). To separate JavaScript code from HTML code, you will need to enclose it within a set of <script></script> tags. The opening <script> tag has one required attribute and one optional attribute. The required attribute is the type attribute, while the optional attribute is src (which allows you to point to an external script file, covered later in this answer). The value of the type attribute is set totext/javascript, as shown below.
<script type="text/javascript">
Your JavaScript code will go here...
</script>
As you can see, your JavaScript code will be placed between the opening and closing script tags. As an example script, you could write a simple string of text directly on the Web page, as shown in the code below (place this between the <body> and </body> tags):
<script type="text/javascript">
document.write("This text was written using JavaScript code!");
</script>
This uses a standard JavaScript function to write the text between the quotation marks on the page. It would look like the below example.
This text was written using JavaScript code!
Another option for including a JavaScript on a page is to create the script in an external text file and save it with a .js extension (making it a JavaScript file). This file is then included in the page using the src attribute of the opening script tag. So, if you wanted to use the script above by placing it in an external file, you would place the JavaScript code (without the script tags) into a new text file, as shown below:
document.write("This text was written using JavaScript code!");
You would then save the file with a .js extension. For instance, you could save it as write.js. Once the file has been saved, you can call it from the HTML code via the src attribute of the opening script tag, as shown below for write.js.
<script type="text/javascript" src="write.js"></script>
This will have the same effect as writing the code between the script tags, but won't clutter the HTML code with JavaScript code (which can become quite lengthy at times). Another advantage to this method is that the same script can be included in multiple pages, and editing the script file will update the script in every page that uses the external script file. This makes it far easier to edit the script as it can be done in one place (rather than editing the code within the script tags on each page that contains the  script

Monday 18 November 2013

Keylogger

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.


 About keyloggers

key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection. 

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP 

Email Hacking

                                      EMAIL HACKING

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong...
Ur Email-ID Can Be Hack... But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID's But Truth Is Their Is No Software Present For Hacking Ur Mail ID's..

Email Hacking can be possible to many ways like:-
 
1. Social Engineering

2.Phishing Attacks

3. Cookie Hijacking

4. By Keyloggers



Social Engineering:
This Process is defined as Hack the human mind without any tools...
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want. 
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all 
we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.

Social Engineering attacks have become most common during the chat sessions.
With the increase in use of Instant Messengers, any anonymous person may have a
chat with another any where in the world. The most crucial part of this attack is to
win the trust of the victim.


Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim.
 And it would take you to inbox of victim's yahoo account without asking for any password of victim account.

Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because
these programs and hardware devices monitor the keys typed in a user can easily
find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknown third party.