do You know:-Interesting Technology Facts (post 1)

Interesting Technology Facts

Hello friends , this can be Technical SOS web log during this web log you may get Facts,Hacking,information.so during this post i introduced thusme fascinating Technology Facts etc associated with technology .so be prepared as a result of this facts increase your info cause you to smarter then different.so get half in do You know series
🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻🔻

  • Do you know The Apple II had a hard drive of only 5 megabytes (5 MB) when it was launched.
  • Do you know Ubuntu is one of the more popular distributions of Linux. The word Ubuntu comes from an African word meaning “I am because of you”.
  • Do you know Bill Gates house was designed using a Macintosh Computer.
  • Do you know The first alarm clock could only ring at 4 am.
  • Do you know The 30th of November is known as “Computer Security Day“ or "World Cyber Security Day"
  • Do you know Skype is banned from the public in China
  • Do you know Christopher Sholes invented the QWERTY keyboard in 1868.
  • Do you know Nokia’s first mobile phones were released in the 1980’s.
  • Do you know Before Nokia took over the number one spot in 1998 Motorola was the world's biggest mobile phone seller
  • Do you know In 1991 Motorola launched iDen i 1000 plus.which was the first mobile in history to feature a two-way radio,email and internet
  • Do you know the first person to invest in facebook was Paypal Co-founder Peter thiel Who invested 500,000 USD.
  • Do you know The Large majority of SAMSUNG Products around 90% firm's own factories.
  • Do you know SAMSUNG was the first firmin history to sell the watch phone,Digital T.V and mp3 phone.
  • Do you know The First computer sold by apple was priced at 666.66 USD. which is said to be the number of SATAN.
  • Do you know The retina display of ipad is actually a SAMSUNG Production.(apple does  not create retina display it provide by SAMSUNG.)
  • Do you know Nokia does not use number while naming its handset in asia( various mobile company thinks that 4 number is unlucky).
  • Do you know The first computer of the world, the ENIC. weight around 27 tonnes and occupied an entire hall.
  • Do you know Commanly used WI-FI previous names is WaveLan FlankSpeed DragonFly WECA and IEEE 802.11b, Direct Sequence.
  • Do you know 60% of apps in the apple app store have never been downloded.




I think do you like this facts and this do You know series. and you learn something new about technology

HACKING TUTORIAL #3

HACKING TUTORIAL #3

Ransomware





Ransomware: It is a sophisticted piece of maleware that blocks the victim access to his files,and the only way to regain access to the files is to pay a ransom.



Types of Ransomware

There are 2 Types of Ransomware
  1. Encrypting Ransomware
  2. Locker Ransomware

  • Encrypting Ransomware:  Which incorportes advanced encryption algorithms.it is designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Ex:- Cryptolocker, Locky , Cryptowall and more
  • Locker Ransomware:- Which Looks the victim out of the operating system , making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

How ransomware works :   

Ransomware kits on the deep web have allowed cyber criminals to purchase and use a software tool to create ransomware with specific capabilities and then generate this malware for their own distribution and with ransoms paid to their bitcoin accounts. As with much of the rest of the IT world, it's now possible for those with little or no technical background to order up inexpensive ransomware as a service (RaaS) and launch attacks with very little effort. In one RaaS scenario, the provider collects the ransom payments and takes a percentage before distributing the proceeds to the service user.

  • [attackervictim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released.
  • [victimattacker] To carry out the crypto viral extortion attack, the malware generates a random symmetric key and encrypts the victim's data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric cipher text as well as the symmetric cipher text of the victim's data. It zero sizes the symmetric key and the original plain text data to prevent recovery. It puts up a message to the user that includes the asymmetric cipher text and how to pay the ransom. The victim sends the asymmetric cipher text and e-money to the attacker.
  • [attackervictim] The attacker receives the payment, deciphers the asymmetric cipher text with the attacker's private key, and sends the symmetric key to the victim. The victim deciphers the encrypted data with the needed symmetric key thereby completing the cryptovirology attack.

5 tips to prevent ransomware

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  3. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton WiFi Privacy.
I hope this tip will helps you to protect devices Some time Ransomware is more dangerous so keep safe your device. I hope you like this tutorial 



Artificial Intelligence:- new technology, facts,types.etc...

ARTIFICIAL INTELLIGENCE

Artificial Intelligence


Definition:

AI means Artificial Intelligence so basically AI is an area of computer science that emphases the creation of intelligent machine that work and react like human.


USE:

now they are designed for speech recognition,learning,planning and problem solving


Types of AI:

1) Weak AI (EX:- mobile apps)
2) Strong AI (artificial general intelligence) it is smart as typical human.(EX:-space robot, Normal    robot)
3)Super intelligence:- It is have a intelligent great as common human (Ex:- Sophia the first AI near then Super Intelligence)


New Technology in AI:

GIFI: 


Gifi is the world first transceiver Integrated on a single Chip that operate at 60hz on the CMOS process. It will allow Wireless transfer of audio And Video Data up to 5 gigabits per second. it is very small in size.


6 ways it will impact everyday life

1. Automated Transportation
We’re already seeing the beginnings of self-driving cars, though the vehicles are currently required to have a driver present at the wheel for safety. Despite these exciting developments, the technology isn’t perfect yet, and it will take a while for public acceptance to bring automated cars into widespread use. 

2. Cyborg Technology
One of the main limitations of being human is simply our own bodies—and brains. Researcher Shimon Whiteson thinks that in the future, we will be able to augment ourselves with computers and enhance many of our own natural abilities. Though many of these possible cyborg enhancements would be added for convenience, others might serve a more practical purpose. Yoky Matsuka of Nest believes that AI will become useful for people with amputated limbs, as the brain will be able to communicate with a robotic limb to give the patient more control. This kind of cyborg technology would significantly reduce the limitations that amputees deal with on a daily basis.
3. Taking over dangerous jobs
Robots are already taking over some of the most hazardous jobs available, including bomb defusing. These robots aren’t quite robots yet, according to the BBC. They are technically drones, being used as the physical counterpart for defusing bombs, but requiring a human to control them, rather than using AI. Whatever their classification, they have saved thousands of lives by taking over one of the most dangerous jobs in the world. As technology improves, we will likely see more AI integration to help these machines function.
Other jobs are also being reconsidered for robot integration. Welding, well known for producing toxic substances, intense heat, and earsplitting noise, can now be outsourced to robots in most cases. Robot Worx explains that robotic welding cells are already in use, and have safety features in place to help prevent human workers from fumes and other bodily harm.
4. Solving climate change
Solving climate change might seem like a tall order from a robot, but as Stuart Russell explains, machines have more access to data than one person ever could—storing a mind-boggling number of statistics. Using big data, AI could one day identify trends and use that information to come up with solutions to the world’s biggest problems.
5. Robot as friends 
Who wouldn’t want a friend like C- 3p0? At this stage, most robots are still emotionless and it’s hard to picture a robot you could relate to. However, a company in Japan has made the first big steps toward a robot companion—one who can understand and feel emotions. Introduced in 2014, “Pepper” the companion robot went on sale in 2015, with all 1,000 initial units selling out within a minute. The robot was programmed to read human emotions, develop its own emotions, and help its human friends stay happy. Pepper goes on sale in the U.S. in 2016, and more sophisticated friendly robots are sure to follow.
6. Improved elder care
For many seniors, everyday life is a struggle, and many have to hire outside help to manage their care, or rely on family members. AI is at a stage where replacing this need isn’t too far off, says Matthew Taylor, computer scientist at Washington State University. “Home” robots could help seniors with everyday tasks and allow them to stay independent and in their homes for as long as possible, which improves their overall well-being.

Artificial Intelligence Facts (top 6)

1)A scientist named Carl Djerassi not only developed the birth control pill, but also wrote over 1200 papers on different subjects, and wrote one of the first Artificial Intelligence programs in 1965. A program called DENDRAL, which could automatically discover unknown forms of medications
2) Artificial Intelligence has crushed all human records in the puzzle game “2048,” achieving a high score of 839,732 and beating the game in only 973 moves without using any undo.
3) University of Washington students created an Artificial Intelligence program to detect “that’s what she said” jokes.
4)Facebook is developing an Artificial Intelligence design to understand user emotions, identify objects in photos, and predict user actions. 
5) Google has a Quantum Artificial Intelligence Lab with an actual quantum computer.
6)Auto correction is also part of AI.

Dangerous Facts In AI

The AI Apocalypse

There’s little doubt that AI has the potential to greatly improve our lives. AI will make the roads safer, help in medicine, aide the disabled and the elderly, work customer service and a number of countless other jobs. However, AI also poses an incredible threat, and this isn’t the stuff of science fiction, either. Top scientists and technologists like Stephen Hawking, Bill Gates and Elon Musk believe that AI is a very real, and dangerous threat to humankind.
It’s so dangerous that Max Tegmark, a physicist at MIT, compared it to the development of nuclear weapons and says we may only be able to do it right the first time. In fact, there has been a push to actually slow down advancement on AI and focus more on containment. Containment is important because if we were to ever lose control of AI, we may never get it back. Then it’s just a matter of time, since the AI could wipe out humanity because it could calculate that humans are a virus-like being, or it could kill humans as a way of self-preservation. Essentially, AI will either fix all of our problems or destroy us all. In other words, The Terminator and The Matrix aren’t nearly as farfetched as we previously believed.

Artificial Intelligence Can Repair Itself

On the terrifying end of the spectrum, there was a paper published this year about a robot that could rebuild itself, even after losing two of its six legs. The robot doesn’t know what’s broken, but notices that its performance has dropped. Then, using an algorithm based on trial and error, the robot can figure out what’s wrong and how to repair itself. The researchers who developed the robot said that as it fixes itself, it updates its database with all the things that will not work in a phase called “simulated childhood.”
This phase lasts for a few minutes and during that time, the robot processes 13,000 possible movements. Those movements are pulled from 10^47 different behaviors, which is an unfathomable number. For a comparison, that’s how many atoms make up the Earth. The implications of this type of artificial intelligence are essentially limitless. Some of the more exciting prospects include search and rescue and deep sea and space exploration for security purpose it is dangourous
I hope you like this information and you learned some new about artificial intelligence  
.

HACKING TUTORIAL #3

HACKING TUTORIAL #3


What is Dark Net ?


Darknet is an overly network that can only be accessed using specific software,configuration or authorization.(for example:- TOR Browser) I have all ready give information about Tor

http://technicalaia02.blogspot.com/2018/04/hacking-tutorial-2.html
visit this blog for more information.

It is part of the deep Web, Because its contents are not accessible through search engines.
But it is something more, it is anonymous. it hosts anonymous websites.

Yeah,you wouldn't know who the owner is unless he explicitly reveal his information. it offers full anonymity to users too.

Darknet anonymity is usually achieved  using an "onion network".

I am sure you have cut on onion once in your lifetime and you had  been crazy about the number of layers it has,same happens when you use an onion network.
 there are numbers of encryption layers that hide your true identity.

Uses of Darknet:


Ok, so you have grasped what Darknet is, Now you may ask me why should you use it. Well the reason could be any of them:

To better protect the privacy right of citizens from targeted and mass surveillance.
Whistle blowing and news leaks
Hacking and Computer Crime. Maybe,you may want to chat with the most dangerous of hackers.
Sale of restricted goods.
File sharing.

How to Access DarkNet?


Well the most popular way to access Darknet is by using TOR browser. Technically, it stands for ‘The Onion Router’ and it is as simple as installing a new browser.

After that you would need a URL or directory that contains URLs to different websites or class of websites so that you know what to type in into the browser’s address bar.

You can easily get URLs in Onion Directory of  Darknet at http://am4wuhz3zifexz5u.onion/ or just google for DarknetSites.

Make sure you use TOR browser.


Just like you have Google,Yahoo,etc for our widely known Internet, Darknet also has a Search Engine. Some are Torch, Duck Duck Go,etc..

If you want to access Darknet from your pretty phone, you  can use ORBOT(Free).

I think you wanna explore Darknet yourself, So i would leave you here. Just a piece of advice, it is used for all things legal or illegal. So just make sure you verify the links you click.


NOTE: Access Darknet with your own risk. Darknet is filled with legal as well as illegal contents. Hence make sure that you don’t click or access any illegal content. If you are facing any problems, then get advise from cyber security expart or cyber police.This information is only for education purpose. i do not support any hacking activity perform by you .Hacking is not fully legal or illegal.use hacking only for help of normal people.


i hope you like this information if you have any doubt related to this article contact me.next information available as soon as possible 



HACKING TUTORIAL #2

HACKING TUTORIAL #2



Everything about Tor


Where it came from?


Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor named ‘The Onion Routing Project’ or simply TOR Project was developed by Roger Dingledine and Nick Mathewson, launched on September 20, 2002. Further development was carried under the financial roof of Electronic Frontier Foundation (EFF).
The Tor Project Inc. is a non-profit organisation that currently maintains Tor and is responsible for its development. It is mainly funded by the United States Government, further aid is provided by Swedish Government and different NGOs & individual sponsors.

How it Works?

Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted, and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe. At each relay, one layer is decrypted and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus very difficult to trace the identity of user or the server by any surveillance systems acting in the mid-way.

Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers this comes under the category of hidden services. Also, P2P applications like Bittorrent can be configured to use tor network and download torrent files.

Controversies and Influence:

Tor has been eulogized for the anonymity and privacy it provides to the users who want to bypass censorship, who are abused and traumatized by stalkers and social activists who are afraid of being arrested by the authorities. It has been used by different security agencies to share confidential information.
The NSA whistle-blower Edward Snowden used Tor to leak information about PRISM to The Guardian and The Washington Post.

Tor has been criticized for the reason that it acts as a medium for different illegal activities like data breaching, drug dealing, gambling etc. Tor is also used by malevolent people to communicate over the internet while keeping their identity hidden which makes it difficult for the security agencies to trace them.

The U.S. National Security Agency (NSA) has called Tor “the king of high-secure, low-latency Internet anonymity” and similar comments by BusinessWeek magazine, “perhaps the most effective means of defeating the online surveillance efforts of intelligence agencies around the world”.

Another speculation made is that Tor takes its funding from the U.S. Government which may lead to the assumption that NSA may have compromised the identities of individual Tor users, but the executive director Andrew Lewman has disclaimed any confederations with NSA.



Can it be Compromised?

Various claims have been made to compromise Tor’s anonymity and security from time to time. The most famous is the Bad Apple Attack in which the researchers claimed to have identified around 10k IP addresses of active Bittorrent users who were connected via Tor.

Another famous compromise was done by the Heartbleed bug in April 2014 which halted Tor network for several days.

Traffic Fingerprinting is a method used to analyse web traffic by analysing the patterns, responses and packets in a particular direction. This can be used to attack the Tor network by making the attacker’s computer act as the guard.
The main vulnerability found is at its exit points where the level of security is very low as compared to the rest of the Tor network.


Products based on Tor:

The Tor Project Inc. has released Tor Browser which is a modification of an Extended Support Release version of Mozilla Firefox browser. The browser is made portable so that it be used from an external media and reduces the hazel of installation. It removes the user history after every use, thus reducing the risk of any kind of cookie tracking.

Other products like Orbot – an android version of Tor, Orfox – a mobile version of Tor Browser are developed by The Guardian Project which is a global developer community founded by Nathan Freitas.

We can set-up SOCKS (Socket Secure) based applications to use the Tor network by configuring them with loop-back address.



Tor Alternatives:


 Hornet is a new anonymity network that provides higher network speeds compared to Tor. I2P, Tails, SubgraphOS, Freenet and Freepto are other top alternatives that can be used.



Winding Up:


Tor has proved to be a great medium for safe, secure and anonymous web presence that can be provided to a user at no cost. Although it is available for a positive intention, but is also used by malignant people in fulfilling their needs. The Tor project has led to an optimistic approach towards censorship and surveillance free internet.

So i hope you love this Information or you learned about Tor. basically tor is not a Good or not Bad.It is just software it's Depend's on your how you use this software.

HACKING TUTORIAL #1

HACKING TUTORIAL #1



WHAT'S HACK,HACKING AND HACKER ?

 HACKING is unauthorized use of computer and network resources.(The term "hacker" orginally meant a very gifted programmer. in recent years through, with easier access to multiple systems, it now has negative implications.)Computer Hackers have been around for so many years.Since the internet became widely used  in the world , we have started to hear more and more about hacking.Only a few hackers, such as Kevin Mitnick,are wll known.in a world of Black and White,it's easy to describe the typical Hacker.

    A general ouutline of a typical hacker is an Antisocial,Pimple-Faced teeenage boy.(Just for fun).


>>HACKERS.

 Hackers are human like the rest of us and are therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of hackers is that all hackers aren't equal.

 Each Hacker has  motives, Method and skills .

  But some general characteristics can help you understand them.

  Hackers are curious about Knowing new things, Brave to take steps and They are often very Sharp Minded.

Hacker is word that has two meanings:

  1. Traditionally, a Hackers is someone who likes to play with software or electronic.system.Hackers enjoy Exploring and Learning How Computer Systems operate.They love discovering  new ways to work electronically.
  2. Recently Hacker has taken on a new meaning-someone who maliciously breaks into system for personal gain.

GAMES FOR ANDROID USER

looking for free Android game? Don't want to spend more money buying full versions of the best Android apks? We can help you! At red barrls.com you can find thousands of new games. Apk files are very easy to install, just a few seconds and you will enjoy the game for Android. All content is ordered in categories: gambling, arcade, action, rpg and many more. Just select model of your tablet or phone (e.g. Samsung Galaxy Note, Motorola Droid, HTC Desire etc.) in the right panel, and our system will select you the most appropriate files. If you are searching for best Android tablet games, it will be more convenient to sort files by OS version. And remember, totally free mobile content is only at red barrels.com

Need for speed most wanted:
cick below the image to download
Buckle up, hit the gas and hold on tight; you’re in for the ride of your life. Outrun cops, outsmart rivals – and outdrive your friends – in the most dangerous Need for Speed yet. Do you dare to be the Most Wanted?
**Need for Speed Most Wanted is an immersive, high-quality game. Please note that it requires a 550MB+ download and roughly 1,900MB+ free space on your device. To speed things up, we recommend connecting to WiFi.**
MAKE TROUBLE, GET WANTED
Evade a relentless police force while you clash with street racers. Race and chase hot cars like the SRT Viper GTS, Porsche 911 Carrera S, Hummer H1 Alpha, and many more. Feel the intensity of no-brakes-allowed street racing with realistic full-car damage for the first time on mobile.
LEAVE YOUR MARK
Log into Origin to check the Wanted List and find out who is the Most Wanted across platforms and among your friends. Then, challenge your friends and prove your racing skills in nonstop competition.
GO FROM ZERO TO MOST WANTED…
  • Drive and customize over 40 of the world’s most exciting cars
  • Race the way you want! By popular demand, you can now touch or tilt to steer
  • Use Mods to enhance your car and get ahead of the pack in style
  • Experience the action with mind-blowing graphics and intense full-car damage
  • Earn Speed Points to unlock new cars
  • Trick out your phone with an exclusive Most Wanted live wallpaper
Your rivals will do everything they can to stop you from getting to the top – but in this world, there can only be one Most Wanted.

DISADVANTAGES OF KALI LINUX (PART-3)


Disadvantages of Linux

1)  MANY WINDOWS PROGRAMS WILL NOT RUN IN LINUX:-
iTunes, Microsoft Office, Internet Explorer and many other Windows programs will not run natively in Linux. The good news is that there are decent ways around most of these problems. For example, music libraries can be managed with an iPod using programs such as Amarok, Banshee, or Rhythm box in Linux. Mozilla Firefox and Google Chrome are outstanding Internet browsers which can be used in the place of Internet Explorer. It is also possible to run iTunes in Linux using Wine, Virtual Box, or Parallels, though it is difficult to have good results. Libre Office and Open Office are excellent office suites which can be used in the place of Microsoft Office, but while overall compatibility in both suites is good with Microsoft Office formats, it is not perfect.

2) THERE IS A SMALLER SELECTION OF PERIPHERAL HARDWARE DRIVERS FOR LINUX:-

There is a smaller selection of peripheral hardware drivers (for printers, scanners, and other devices) in Linux as compared to Windows, though many new Linux hardware drivers are constantly being added. Closely related to this issue is the fact that not all Linux distros work with all sets of computer hardware, so a person may need to try more than one distro to find one which works well with his/her computer. When it comes to printers, some manufacturers offer better Linux support than others; for example, HP offers excellent printer support for Linux.

3) THERE IS A LEARNING CURVE FOR PEOPLE WHO ARE NEW TO LINUX:-
Despite this, most Linux distros, especially the major ones, are very intuitive and user-friendly. Also, the desktop environments in Linux are in many ways similar to Windows in their appearance. One thing which should be emphasized is that there is also a learning curve for Windows XP users who switch to a newer version of Windows.


Advantages of Linux(part 2)

 Advantages of Linux:

FREEDOM!
Most Linux distros are free….. users do not need to pay for a copy, but this is only one aspect of freedom enjoyed by Linux users! In addition, Linux distros can be freely downloaded and legally installed on as many computers as you want and freely (and legally) given to other people. Because most distros are open source, you have access to the source code and can customize Linux to be whatever you want it to be; you can even create your own distro if you like!Linux is easy to install!  In many instances, it is actually easier to install Linux to your computer than Windows. Click here to learn more about how to download and install Linux to your computer [1].

LINUX IS VERY STABLE!
Linux systems rarely crash, and when they do, the whole system normally does not go down. The “blue screen of death” familiar to Windows users is not a worry for Linux users.


LINUX IS LESS VULNERABLE TO COMPUTER MALWARE!
Because most computer malware are designed to attack Windows (often through Active X which is not typically found in Linux) the odds are considerably less for Linux to be infected with a virus than Windows

[2]. The same holds true with spyware, trojans, and worms. While Linux malware does exist, they are relatively few in number and none have become widespread so far

[3]. While Linux is very secure by its nature, users should still employ good sense while surfing the Internet; click here to learn more

[4]. As long as Linux users download and install only from their distro’s official software repository, then security is greatly increased. One nice security feature In Linux is that files must be made to be executable by someone with administrator privileges, which requires a password. So even if a Linux virus is loaded on a Linux computer, it will not be able to run without the user who has administrator privileges intentionally making it executable. Another important aspect of Linux security is the fact that it is open source. Because the programming code is available for anyone to view, there are many eyes constantly examining it, which makes it highly difficult for malware to be hidden within the code

[5]. Also, security patches normally come much quicker to Linux than other operating systems because so many people are contributing to it. Here are some resources with more information about Linux security and why Linux computers are much less likely than Windows to ever become infected with a virus.

LINUX TYPICALLY DOES NOT SLOW DOWN OVER TIME!
Unlike Windows, Linux does not easily become bogged down with spyware, viruses, trojans, etc., which can greatly reduce a computer’s performance. Also, because Linux does not have a registry like Windows, it is not plagued with registry errors which can slow down a computer over time. Finally, the hard drives on Windows (especially Windows XP and older) computers need to be defragmented on a regular basis in order to maintain faster performance, due to being formatted in NTFS. On the other hand, because Linux is normally formatted in a different way using ext4 among others, there is no need to defragment a Linux hard drive.


LINUX CAN BREATHE NEW LIFE INTO OLD COMPUTERS!
If you have an older computer (especially Pentium III or later) laying around, you can install Linux and in essence have a new computer. In many cases Linux will run faster and you can do all of the basics such as browse the Internet, email, play games, and create and edit documents, spreadsheets, and PowerPoint presentations. It should also be mentioned that Linux runs great on newer computers as well.


WITH LINUX, YOU HAVE SO MANY CHOICES IN A WIDE VARIETY OF DISTROS!
Linux comes in all sizes and flavors, which offers a wide variety from which to choose the distro which will best suit your needs. Another advantage of this variety is the innovation that is taking place in the Linux world because it is open source. You can learn more about different Linux distros by going to distrowatch.com.

WITH MANY LINUX DISTROS, YOU HAVE ACCESS TO FREE SOFTWARE WHICH NUMBERS IN THE THOUSANDS!
Popular distros such as Ubuntu, PCLinuxOS, andOpenSUSE offer excellent software repositories within their package managers where virtually any type of software can be downloaded and installed to your Linux system for free. This includes just about anything you can imagine, such as games, educational software, office suites, and much more! Some smaller distros, such as Peppermint OS, Lubuntu, Bodhi Linux, and Puppy Linux are based on Ubuntu and as a result have access to Ubuntu’s software repositories. One very nice aspect of these repositories is that the software found in them has already been tested for compatibility and safety. For example, the thousands of free and open source software found in the Ubuntu Software Center has been tested and examined by Ubuntu, so a user can be confident that the software will be compatible with Ubuntu and will not include malware.

A SUPERIOR METHOD OF UPDATING SOFTWARE!
With Linux distros such as Ubuntu, OpenSUSE, PCLinuxOS, Fedora and many others, the majority of any software needed can be downloaded, installed, and updated from a central package management system provided by the distro. The result is a very smooth and seamless software updating process for Linux users.

What is kali linux and it's facts


KALI LINUX (part 1)

We know that kali linux is a operating system for pc . But first I wll give you some short information about kali linux. and advantages
or what is future of kali linux. I will give you information in parts.


What is Kali Linux ?
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.


  • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.
  • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
  • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
  • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
  • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
  • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
  • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHFsystems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution.
Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general.

do You know:-Interesting Technology Facts (post 1)

Interesting Technology Facts Hello friends , this can be Technical SOS web log during this web log you may get Facts,Hacking,informatio...