do You know:-Interesting Technology Facts (post 1)

Interesting Technology Facts

Hello friends , this can be Technical SOS web log during this web log you may get Facts,Hacking,information.so during this post i introduced thusme fascinating Technology Facts etc associated with technology .so be prepared as a result of this facts increase your info cause you to smarter then different.so get half in do You know series
🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻

  • Do you know The Apple II had a hard drive of only 5 megabytes (5 MB) when it was launched.
  • Do you know Ubuntu is one of the more popular distributions of Linux. The word Ubuntu comes from an African word meaning “I am because of you”.
  • Do you know Bill Gates house was designed using a Macintosh Computer.
  • Do you know The first alarm clock could only ring at 4 am.
  • Do you know The 30th of November is known as “Computer Security Day“ or "World Cyber Security Day"
  • Do you know Skype is banned from the public in China
  • Do you know Christopher Sholes invented the QWERTY keyboard in 1868.
  • Do you know Nokia’s first mobile phones were released in the 1980’s.
  • Do you know Before Nokia took over the number one spot in 1998 Motorola was the world's biggest mobile phone seller
  • Do you know In 1991 Motorola launched iDen i 1000 plus.which was the first mobile in history to feature a two-way radio,email and internet
  • Do you know the first person to invest in facebook was Paypal Co-founder Peter thiel Who invested 500,000 USD.
  • Do you know The Large majority of SAMSUNG Products around 90% firm's own factories.
  • Do you know SAMSUNG was the first firmin history to sell the watch phone,Digital T.V and mp3 phone.
  • Do you know The First computer sold by apple was priced at 666.66 USD. which is said to be the number of SATAN.
  • Do you know The retina display of ipad is actually a SAMSUNG Production.(apple does  not create retina display it provide by SAMSUNG.)
  • Do you know Nokia does not use number while naming its handset in asia( various mobile company thinks that 4 number is unlucky).
  • Do you know The first computer of the world, the ENIC. weight around 27 tonnes and occupied an entire hall.
  • Do you know Commanly used WI-FI previous names is WaveLan FlankSpeed DragonFly WECA and IEEE 802.11b, Direct Sequence.
  • Do you know 60% of apps in the apple app store have never been downloded.




I think do you like this facts and this do You know series. and you learn something new about technology

HACKING TUTORIAL #3

HACKING TUTORIAL #3

Ransomware





Ransomware: It is a sophisticted piece of maleware that blocks the victim access to his files,and the only way to regain access to the files is to pay a ransom.



Types of Ransomware

There are 2 Types of Ransomware
  1. Encrypting Ransomware
  2. Locker Ransomware

  • Encrypting Ransomware:  Which incorportes advanced encryption algorithms.it is designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Ex:- Cryptolocker, Locky , Cryptowall and more
  • Locker Ransomware:- Which Looks the victim out of the operating system , making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

How ransomware works :   

Ransomware kits on the deep web have allowed cyber criminals to purchase and use a software tool to create ransomware with specific capabilities and then generate this malware for their own distribution and with ransoms paid to their bitcoin accounts. As with much of the rest of the IT world, it's now possible for those with little or no technical background to order up inexpensive ransomware as a service (RaaS) and launch attacks with very little effort. In one RaaS scenario, the provider collects the ransom payments and takes a percentage before distributing the proceeds to the service user.

  • [attackervictim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released.
  • [victimattacker] To carry out the crypto viral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric cipher text as well as the symmetric cipher text of the victim's data. It zero sizes the symmetric key and the original plain text data to prevent recovery. It puts up a message to the user that includes the asymmetric cipher text and how to pay the ransom. The victim sends the asymmetric cipher text and e-money to the attacker.
  • [attackervictim] The attacker receives the payment, deciphers the asymmetric cipher text with the attacker's private key, and sends the symmetric key to the victim. The victim deciphers the encrypted data with the needed symmetric key thereby completing the cryptovirology attack.

5 tips to prevent ransomware

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  3. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton WiFi Privacy.
I hope this tip will helps you to protect devices Some time Ransomware is more dangerous so keep safe your device. I hope you like this tutorial 



Artificial Intelligence:- new technology, facts,types.etc...

ARTIFICIAL INTELLIGENCE

Artificial Intelligence


Definition:

AI means Artificial Intelligence so basically AI is an area of computer science that emphases the creation of intelligent machine that work and react like human.


USE:

now they are designed for speech recognition,learning,planning and problem solving


Types of AI:

1) Weak AI (EX:- mobile apps)
2) Strong AI (artificial general intelligence) it is smart as typical human.(EX:-space robot, Normal    robot)
3)Super intelligence:- It is have a intelligent great as common human (Ex:- Sophia the first AI near then Super Intelligence)


New Technology in AI:

GIFI: 


Gifi is the world first transceiver Integrated on a single Chip that operate at 60hz on the CMOS process. It will allow Wireless transfer of audio And Video Data up to 5 gigabits per second. it is very small in size.


6 ways it will impact everyday life

1. Automated Transportation
We’re already seeing the beginnings of self-driving cars, though the vehicles are currently required to have a driver present at the wheel for safety. Despite these exciting developments, the technology isn’t perfect yet, and it will take a while for public acceptance to bring automated cars into widespread use. 

2. Cyborg Technology
One of the main limitations of being human is simply our own bodies—and brains. Researcher Shimon Whiteson thinks that in the future, we will be able to augment ourselves with computers and enhance many of our own natural abilities. Though many of these possible cyborg enhancements would be added for convenience, others might serve a more practical purpose. Yoky Matsuka of Nest believes that AI will become useful for people with amputated limbs, as the brain will be able to communicate with a robotic limb to give the patient more control. This kind of cyborg technology would significantly reduce the limitations that amputees deal with on a daily basis.
3. Taking over dangerous jobs
Robots are already taking over some of the most hazardous jobs available, including bomb defusing. These robots aren’t quite robots yet, according to the BBC. They are technically drones, being used as the physical counterpart for defusing bombs, but requiring a human to control them, rather than using AI. Whatever their classification, they have saved thousands of lives by taking over one of the most dangerous jobs in the world. As technology improves, we will likely see more AI integration to help these machines function.
Other jobs are also being reconsidered for robot integration. Welding, well known for producing toxic substances, intense heat, and earsplitting noise, can now be outsourced to robots in most cases. Robot Worx explains that robotic welding cells are already in use, and have safety features in place to help prevent human workers from fumes and other bodily harm.
4. Solving climate change
Solving climate change might seem like a tall order from a robot, but as Stuart Russell explains, machines have more access to data than one person ever could—storing a mind-boggling number of statistics. Using big data, AI could one day identify trends and use that information to come up with solutions to the world’s biggest problems.
5. Robot as friends 
Who wouldn’t want a friend like C- 3p0? At this stage, most robots are still emotionless and it’s hard to picture a robot you could relate to. However, a company in Japan has made the first big steps toward a robot companion—one who can understand and feel emotions. Introduced in 2014, “Pepper” the companion robot went on sale in 2015, with all 1,000 initial units selling out within a minute. The robot was programmed to read human emotions, develop its own emotions, and help its human friends stay happy. Pepper goes on sale in the U.S. in 2016, and more sophisticated friendly robots are sure to follow.
6. Improved elder care
For many seniors, everyday life is a struggle, and many have to hire outside help to manage their care, or rely on family members. AI is at a stage where replacing this need isn’t too far off, says Matthew Taylor, computer scientist at Washington State University. “Home” robots could help seniors with everyday tasks and allow them to stay independent and in their homes for as long as possible, which improves their overall well-being.

Artificial Intelligence Facts (top 6)

1)A scientist named Carl Djerassi not only developed the birth control pill, but also wrote over 1200 papers on different subjects, and wrote one of the first Artificial Intelligence programs in 1965. A program called DENDRAL, which could automatically discover unknown forms of medications
2) Artificial Intelligence has crushed all human records in the puzzle game “2048,” achieving a high score of 839,732 and beating the game in only 973 moves without using any undo.
3) University of Washington students created an Artificial Intelligence program to detect “that’s what she said” jokes.
4)Facebook is developing an Artificial Intelligence design to understand user emotions, identify objects in photos, and predict user actions. 
5) Google has a Quantum Artificial Intelligence Lab with an actual quantum computer.
6)Auto correction is also part of AI.

Dangerous Facts In AI

The AI Apocalypse

There’s little doubt that AI has the potential to greatly improve our lives. AI will make the roads safer, help in medicine, aide the disabled and the elderly, work customer service and a number of countless other jobs. However, AI also poses an incredible threat, and this isn’t the stuff of science fiction, either. Top scientists and technologists like Stephen Hawking, Bill Gates and Elon Musk believe that AI is a very real, and dangerous threat to humankind.
It’s so dangerous that Max Tegmark, a physicist at MIT, compared it to the development of nuclear weapons and says we may only be able to do it right the first time. In fact, there has been a push to actually slow down advancement on AI and focus more on containment. Containment is important because if we were to ever lose control of AI, we may never get it back. Then it’s just a matter of time, since the AI could wipe out humanity because it could calculate that humans are a virus-like being, or it could kill humans as a way of self-preservation. Essentially, AI will either fix all of our problems or destroy us all. In other words, The Terminator and The Matrix aren’t nearly as farfetched as we previously believed.

Artificial Intelligence Can Repair Itself

On the terrifying end of the spectrum, there was a paper published this year about a robot that could rebuild itself, even after losing two of its six legs. The robot doesn’t know what’s broken, but notices that its performance has dropped. Then, using an algorithm based on trial and error, the robot can figure out what’s wrong and how to repair itself. The researchers who developed the robot said that as it fixes itself, it updates its database with all the things that will not work in a phase called “simulated childhood.”
This phase lasts for a few minutes and during that time, the robot processes 13,000 possible movements. Those movements are pulled from 10^47 different behaviors, which is an unfathomable number. For a comparison, that’s how many atoms make up the Earth. The implications of this type of artificial intelligence are essentially limitless. Some of the more exciting prospects include search and rescue and deep sea and space exploration for security purpose it is dangourous
I hope you like this information and you learned some new about artificial intelligence  
.

HACKING TUTORIAL #3

HACKING TUTORIAL #3


What is Dark Net ?


Darknet is an overly network that can only be accessed using specific software,configuration or authorization.(for example:- TOR Browser) I have all ready give information about Tor

http://technicalaia02.blogspot.com/2018/04/hacking-tutorial-2.html
visit this blog for more information.

It is part of the deep Web, Because its contents are not accessible through search engines.
But it is something more, it is anonymous. it hosts anonymous websites.

Yeah,you wouldn't know who the owner is unless he explicitly reveal his information. it offers full anonymity to users too.

Darknet anonymity is usually achieved  using an "onion network".

I am sure you have cut on onion once in your lifetime and you had  been crazy about the number of layers it has,same happens when you use an onion network.
 there are numbers of encryption layers that hide your true identity.

Uses of Darknet:


Ok, so you have grasped what Darknet is, Now you may ask me why should you use it. Well the reason could be any of them:

To better protect the privacy right of citizens from targeted and mass surveillance.
Whistle blowing and news leaks
Hacking and Computer Crime. Maybe,you may want to chat with the most dangerous of hackers.
Sale of restricted goods.
File sharing.

How to Access DarkNet?


Well the most popular way to access Darknet is by using TOR browser. Technically, it stands for ‘The Onion Router’ and it is as simple as installing a new browser.

After that you would need a URL or directory that contains URLs to different websites or class of websites so that you know what to type in into the browser’s address bar.

You can easily get URLs in Onion Directory of  Darknet at http://am4wuhz3zifexz5u.onion/ or just google for DarknetSites.

Make sure you use TOR browser.


Just like you have Google,Yahoo,etc for our widely known Internet, Darknet also has a Search Engine. Some are Torch, Duck Duck Go,etc..

If you want to access Darknet from your pretty phone, you  can use ORBOT(Free).

I think you wanna explore Darknet yourself, So i would leave you here. Just a piece of advice, it is used for all things legal or illegal. So just make sure you verify the links you click.


NOTE: Access Darknet with your own risk. Darknet is filled with legal as well as illegal contents. Hence make sure that you don’t click or access any illegal content. If you are facing any problems, then get advise from cyber security expart or cyber police.This information is only for education purpose. i do not support any hacking activity perform by you .Hacking is not fully legal or illegal.use hacking only for help of normal people.


i hope you like this information if you have any doubt related to this article contact me.next information available as soon as possible 



HACKING TUTORIAL #2

HACKING TUTORIAL #2



Everything about Tor


Where it came from?


Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor named ‘The Onion Routing Project’ or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20, 2002. Further development was carried under the financial roof of Electronic Frontier Foundation (EFF).
The Tor Project Inc. is a non-profit organisation that currently maintains Tor and is responsible for its development. It is mainly funded by the United States Government, further aid is provided by Swedish Government and different NGOs & individual sponsors.

How it Works?

Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted, and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe. At each relay, one layer is decrypted and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus very difficult to trace the identity of user or the server by any surveillance systems acting in the mid-way.

Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers this comes under the category of hidden services. Also, P2P applications like Bittorrent can be configured to use tor network and download torrent files.

Controversies and Influence:

Tor has been eulogized for the anonymity and privacy it provides to the users who want to bypass censorship, who are abused and traumatized by stalkers and social activists who are afraid of being arrested by the authorities. It has been used by different security agencies to share confidential information.
The NSA whistle-blower Edward Snowden used Tor to leak information about PRISM to The Guardian and The Washington Post.

Tor has been criticized for the reason that it acts as a medium for different illegal activities like data breaching, drug dealing, gambling etc. Tor is also used by malevolent people to communicate over the internet while keeping their identity hidden which makes it difficult for the security agencies to trace them.

The U.S. National Security Agency (NSA) has called Tor “the king of high-secure, low-latency Internet anonymity” and similar comments by BusinessWeek magazine, “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”.

Another speculation made is that Tor takes its funding from the U.S. Government which may lead to the assumption that NSA may have compromised the identities of individual Tor users, but the executive director Andrew Lewman has disclaimed any confederations with NSA.



Can it be Compromised?

Various claims have been made to compromise Tor’s anonymity and security from time to time. The most famous is the Bad Apple Attack in which the researchers claimed to have identified around 10k IP addresses of active Bittorrent users who were connected via Tor.

Another famous compromise was done by the Heartbleed bug in April 2014 which halted Tor network for several days.

Traffic Fingerprinting is a method used to analyse web traffic by analysing the patterns, responses and packets in a particular direction. This can be used to attack the Tor network by making the attacker’s computer act as the guard.
The main vulnerability found is at its exit points where the level of security is very low as compared to the rest of the Tor network.


Products based on Tor:

The Tor Project Inc. has released Tor Browser which is a modification of an Extended Support Release version of Mozilla Firefox browser. The browser is made portable so that it be used from an external media and reduces the hazel of installation. It removes the user history after every use, thus reducing the risk of any kind of cookie tracking.

Other products like Orbot – an android version of Tor, Orfox – a mobile version of Tor Browser are developed by The Guardian Project which is a global developer community founded by Nathan Freitas.

We can set-up SOCKS (Socket Secure) based applications to use the Tor network by configuring them with loop-back address.



Tor Alternatives:


 Hornet is a new anonymity network that provides higher network speeds compared to Tor. I2P, Tails, SubgraphOS, Freenet and Freepto are other top alternatives that can be used.



Winding Up:


Tor has proved to be a great medium for safe, secure and anonymous web presence that can be provided to a user at no cost. Although it is available for a positive intention, but is also used by malignant people in fulfilling their needs. The Tor project has led to an optimistic approach towards censorship and surveillance free internet.

So i hope you love this Information or you learned about Tor. basically tor is not a Good or not Bad.It is just software it's Depend's on your how you use this software.

HACKING TUTORIAL #1

HACKING TUTORIAL #1



WHAT'S HACK,HACKING AND HACKER ?

 HACKING is unauthorized use of computer and network resources.(The term "hacker" orginally meant a very gifted programmer. in recent years through, with easier access to multiple systems, it now has negative implications.)Computer Hackers have been around for so many years.Since the internet became widely used  in the world , we have started to hear more and more about hacking.Only a few hackers, such as Kevin Mitnick,are wll known.in a world of Black and White,it's easy to describe the typical Hacker.

    A general ouutline of a typical hacker is an Antisocial,Pimple-Faced teeenage boy.(Just for fun).


>>HACKERS.

 Hackers are human like the rest of us and are therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of hackers is that all hackers aren't equal.

 Each Hacker has  motives, Method and skills .

  But some general characteristics can help you understand them.

  Hackers are curious about Knowing new things, Brave to take steps and They are often very Sharp Minded.

Hacker is word that has two meanings:

  1. Traditionally, a Hackers is someone who likes to play with software or electronic.system.Hackers enjoy Exploring and Learning How Computer Systems operate.They love discovering  new ways to work electronically.
  2. Recently Hacker has taken on a new meaning-someone who maliciously breaks into system for personal gain.

GAMES FOR ANDROID USER

looking for free Android game? Don't want to spend more money buying full versions of the best Android apks? We can help you! At red barrls.com you can find thousands of new games. Apk files are very easy to install, just a few seconds and you will enjoy the game for Android. All content is ordered in categories: gambling, arcade, action, rpg and many more. Just select model of your tablet or phone (e.g. Samsung Galaxy Note, Motorola Droid, HTC Desire etc.) in the right panel, and our system will select you the most appropriate files. If you are searching for best Android tablet games, it will be more convenient to sort files by OS version. And remember, totally free mobile content is only at red barrels.com

Need for speed most wanted:
cick below the image to download
Buckle up, hit the gas and hold on tight; you’re in for the ride of your life. Outrun cops, outsmart rivals – and outdrive your friends – in the most dangerous Need for Speed yet. Do you dare to be the Most Wanted?
**Need for Speed Most Wanted is an immersive, high-quality game. Please note that it requires a 550MB+ download and roughly 1,900MB+ free space on your device. To speed things up, we recommend connecting to WiFi.**
MAKE TROUBLE, GET WANTED
Evade a relentless police force while you clash with street racers. Race and chase hot cars like the SRT Viper GTS, Porsche 911 Carrera S, Hummer H1 Alpha, and many more. Feel the intensity of no-brakes-allowed street racing with realistic full-car damage for the first time on mobile.
LEAVE YOUR MARK
Log into Origin to check the Wanted List and find out who is the Most Wanted across platforms and among your friends. Then, challenge your friends and prove your racing skills in nonstop competition.
GO FROM ZERO TO MOST WANTED…
  • Drive and customize over 40 of the world’s most exciting cars
  • Race the way you want! By popular demand, you can now touch or tilt to steer
  • Use Mods to enhance your car and get ahead of the pack in style
  • Experience the action with mind-blowing graphics and intense full-car damage
  • Earn Speed Points to unlock new cars
  • Trick out your phone with an exclusive Most Wanted live wallpaper
Your rivals will do everything they can to stop you from getting to the top – but in this world, there can only be one Most Wanted.

do You know:-Interesting Technology Facts (post 1)

Interesting Technology Facts Hello friends , this can be Technical SOS web log during this web log you may get Facts,Hacking,informatio...