Skip to main content


Showing posts from February, 2018

High Risk on these Non Banking Financial Companies.

Financial Intelligence Unit of India listed over 9500 NBFCs as high Risk NBFCs Financial Intelligence Unit – India (FIU-IND) was set by the Government of India vide O.M. dated 18th November 2004 as the central national agency responsible for receiving, processing, analyzing and disseminating information relating to suspect financial transactions. Get Full List Here

Excellent alternative for OpenVPN client for Linux with GUI

OAST OpenVPN GUI is a OpenVPN client for both Windows and Linux. Read this How to setup OpenVPN Step 1: Download these script Linux x86 client: Linux x86-64 client: 1) Download the file and save it to your "Downloads" folder 2) Open "Terminal" by Ctrl+Alt+T then enter the following commands: cd Downloads/ → to open the directory where the file is located sudo chmod +x → to make the file executable ./ → to execute the file (try “sh ./” if not working) *.Software requirements OpenVPN service and Java runtime environment are installed, make sure to install these packages prior to installing OAST: sudo apt-get install openvpn default-jre gksu -y → Debian based distributions (Ub

Use Firefox with Container Tab Extension and stop advertising tracking you.

Containers is a feature in Firefox  lets you separate your work, shopping or personal browsing without having to clear your history, log in and out, or use multiple browsers.   Container tabs are like normal tabs except the sites you visit will have access to a separate slice of the browser's storage. This means your site preferences, logged in sessions, and advertising tracking data won't carry over to the new container. Likewise, any browsing you do within the new container will not affect your logged in sessions, or tracking data of your other containers. Normally, For example, generally if you have logged into any particular website account, all tabs in Firefox browser window will show you logged in with the same user account and you can't use a different user account created on same website.  With Container Tab you'll be able to use different user accounts and identities on same website in same Firefox browser window . It becomes possible because e

Latest trick.Play JioTV in PC without any software or JioTV website

Coming soon .    Subscribe to Our mailing list to get this trick as soon as it goes alive!

cryptocurrencies | How it Works

How hackers are able to steal data even from a air gaped computer.

Air-gapped computers are those that are isolated from the Internet and local networks and so, are believed to be the most secure devices that are difficult to infiltrate. MAGNETO and ODINI Both the techniques make use of proof-of-concept (PoC ) malware installed on an air-gapped computer inside the Faraday cage to control the " magnetic fields emanating from the computer by regulating workloads on the CPU cores " and use it to transmit data stealthily. The two techniques are named MAGNETO and ODINI and are both the work of scientists from the Cyber Security Research Center at the Ben-Gurion University of the Negev in Israel. This a part extracted from their research paper [M]oving charges in a wire generate a magnetic field. The magnetic field changes according to the acceleration of the charges in the wire. In a standard computer, the wires that supply electricity from the main power supply to the motherboard are the primary source of the magnetic emanation

Internet security:How to prevent HTML5 canvas fingerprinting on Google Chrome?

Canvas fingerprinting is one of a number of browser fingerprinting techniques of tracking online users that allow websites to uniquely identify and track visitors using HTML5 canvas element instead of browser cookies or other similar means. What is canvas fingerprinting? Canvas fingerprinting is a kind of tracking technology used by website operators to uniquely identify a visitors against other visitors. It does so without relying on cookies or IP address or user agents sent by the browser. Instead, this technology uses Javascript to draw some image onto a HTML5 canvas element. How to prevent canvas fingerprinting in  Chrome? Depending on the graphics card and video driver used in the user's system, the pixels on the canvas will be different from those drawn on another computer. Another Javascript method can be used to export the pixels on the canvas, which then can be used to generate a hash and sent back to the server. Check your browser Here Chrome provi

what is the future of our society?

Futurologist Georgi Georgievich Pocheptsov tell us 5 points about the future society. • Why teach a person who for the rest of his life, for example, will sit behind video games ( robotization and automation will replace 60-70% of current employees ). The authorities will only introduce a few compulsory years of education, making all other education paid or free - only for selected talented children (future engineers). For most, the current basic 3-4 years of schooling will suffice. • The understanding of politics will also change. There will be no politicians as such . There will be experts and expertocracy. They will vote not for politicians, but through a network ("referendum") for concrete proposals, which, in case of adoption, will immediately be embodied by the Council of Experts. • Because of the impossibility of understanding logic, diffuse attention, low educational level, the media are already changing their role today. News, just information is losing

BT0072 Computer Networks -2

1. Define the term routing. Differentiate static and dynamic routing. Routing (or routeing) is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data networks (such as the Internet), and transportation networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes ; typically hardware devices called routers , bridges , gateways , firewalls , or switches Static Routing Static routing is not really a protocol, simply the process of manually entering routes into the routing table via a configuration file that is loaded when the routing device starts up. As an alternative, these routes can be enterd by a network administrator who configures the routes . Since these routes don't change after they are configured (unless a human