Friday, 26 June 2015

How to Hack a Military Drone Manual is Already Online

drone
The information needed to hack a sophisticated military drone is already available on internet and hackers could use this how-to guide for hijacking military drones, an Israeli defense manufacturer said earlier this week. This news comes in the wake of the increasing warnings of drone hacking.
Drones are the new warfare tools as they are cost and life-saving by performing multiple functions with ease. A manual named “The Requirements for Successful GPS Spoofing Attacks” was published back in 2011 just a month before the CIA drone downing by Iran. Israel Aerospace Industries cyber-programs director Esti Peshin pointed out the possibility of the use of this document in the downing.

Peshin said, “It’s (How to Hack a Military Drone Manual) a PDF file…essentially a blueprint for hackers.” “You can Google, just look up ‘Tippenhauer’ – it’s the first result in Google. Look up ‘UAV cyberattacks’ – it’s the third one. ‘UAV GPS spoofing attacks’ – the first one,” she added.
The study explains the way to feed the GPS system to fake signals so that drones end up losing the ability to calculate its coordinates. In the report, Peshin says that the goal of the study was to point out the “effective receiver-based countermeasures, which are not implemented yet in current standard GPS receivers.”
The PDF file published didn’t mean any harm but hackers could have possibly exploited the instructions given before the drone manufacturers recognize the risks and fortified the drones.

At the end of the article, they had listed many UAVs and told which were riskier than the other by the way.
Currently, the Pentagon is working to shield the UAV surveillance and navigation system from the outside interference.
Read out extensive coverage on drones and know about the latest advancements being made in the field.
Visit this link for the 2011 PDF file on how to hack a military drone.

Thursday, 25 June 2015

I love this so much. Watts has always been one my favorite philosophers. Hearing his words superimposed with the different movie clips made watching this all the more interesting and ethereal .
”We live in a culture where it has been rubbed into us in every conceivable way that to die is a terrible thing. And that is a tremendous disease from which our culture in particular suffers.” – 

Mystery Solved: Why Do Earphones Always Get Tangled Up in Pocket?

-earphone entanglement
Scientists have been working very hard to solve the complexities of the universe.  While some geniuses have been busy hacking the human brain, others are busy creating artificial ones. But does anyone care to work for the common man’s cause??
hen it comes to daily life complexities and entanglements, the first and foremost that comes to mind is the twining of your earphones. No matter how neatly you put them inside your bag, they somehow emerge out as intricated mess. As if they have some kind of superpower. And if you dared to put them in your denims, then be prepared to play with the knots.
Now the question is why do the earphones and other stringy objects get tangled up when jostled up. Physicists now have stepped up to this problem and did a few trials by hustling strings of different stiffness and lengths in a box. They found that complex knots often form within seconds ( something even the kids know very well ).
Now a mathematical knot theory is used to analyze the knots. The probability P of knotting depends upon the length of the strings. Above the critical length, the probability first increases sharply and then saturates below 100%.  Also if the strings are stiff then the probability of knotting is lower but increases with long and flexible strings.
We analyzed the knots by calculating their Jones polynomials via computer analysis of digital photos of the string. Remarkably, almost all were identified as prime knots: 120 different types, having minimum crossing numbers up to 11, were observed in 3,415 trials. All prime knots with up to seven crossings were observed. The relative probability of forming a knot decreased exponentially with minimum crossing number and Möbius energy, mathematical measures of knot complexity. Based on the observation that long, stiff strings tend to form a coiled structure when confined, we propose a simple model to describe the knot formation based on random “braid moves” of the string end. Our model can qualitatively account for the observed distribution of knots and dependence on agitation time and string length.
-string knot formation.
Knot formation chronology.
Well, now we know why do our earphones entangle. But I would love to know how to stop them from doing so. Anyone ready to perform experiments for that…? 😛

Wednesday, 24 June 2015

More Than 600 Million Samsung Devices Have Vulnerability In The Keyboard

Mobile security researcher from NowSecure have founded that more than 600 million Samsung devices are vulnerable to remote code execution vulnerability in the Samsung keyboard.
According to NowSecure Samsung stock keyboard using the SwiftKey SDK which allows hackers to access sensors on the device, microphone, GPS, pictures, camera and even messages.
This vulnerable allows hackers to download and install malicious app on the device without requiring the user’s permission and can even track incoming and out messages and calls.
Samsung and the Android security was notified last year about CVE-2015-2865. Patches are available to download since 2015 but there is no proper count on how many devices are updated. Since the Samsung stock keyboard comes default on all Samsung devices and cannot be uninstalled.
According to Official support forum, “We’ve seen reports of a security issue related to the Samsung stock keyboard that uses the SwiftKey SDK. We can confirm that the SwiftKey Keyboard apps available via Google Play or the Apple App Store are not affected by this vulnerability. We take reports of this manner very seriously and are currently investigating further.” said by SwiftKey team

Friday, 12 June 2015

Windows 7 and Windows 8 Features You Will Miss After Windows 10 Upgrade


windows-10-features
As the July 29 release of Windows 10 comes closer, new features and functions are making their appearance each day. But there are some features from your Windows 7 and Windows 8 PC that will no longer work when you’ll upgrade your PC to Windows 10.
In this article, we try to mention some of the worst sacrifices that you’ll be making with Windows 10.

Take a quick look at them:
There is a huge possibility that you won’t be able to choose the timings and parts of the updates you want to install in Windows 10. Microsoft wants to be in-charge of this department and you may not like it.
If you are going to upgrade your PC to Windows 10, you won’t be able to use Windows Media Center anymore. Currently Windows Media Center is available in Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate, and Windows 8 Pro and Windows 8.1 Pro with Media Center.

Windows 10 won’t be having Solitaire, Minesweeper and Hearts Game that are pre-installed on Windows 7.
If you use floppy drive, it won’t be supported out of the box by Windows 10. You will have to download the latest drivers using the manufacturer’s website or Windows update.
To run DVDs, you will need a third-party software in Windows 10.
If your current PC has Windows Live Essentials installed, the OneDrive version will be removes and replaced with inbox version of OneDrive.
Windows 7 desktop gadgets won’t be a part of Windows 10.
Even though some of these changes might affect you, upgrading to Windows 10 isn’t a bad choice given the fact that it is available free of cost if upgraded within one year.
To the features that won’t be continued in Windows 10, there are many free and efficient alternatives available.

Thursday, 11 June 2015

How to Protect Google Chrome with secure browsing

These days, around everyone uses internet daily. And use different browsers to access the internet. Majority of people prefer Google Chrome because it’s fast, easy to use, secure and reliable. But people still doubt about how secure they are. They try different methods to become more secure.
To protect your account and other information, you need to protect your browser. To protect your browser from other people, you need to put a lock on it. This way, if anyone tries to access your web browser on which you are logged in at many places, your passwords are safe,etc , they woun’t be able to access your browser without a password which they don’t know.
Protect-google-chrome
Now you might not know how to add a lock on your web browser. Follow the steps below to add a lock to your Google Chrome and secure your data from others.
  1. Make sure you have the latest version of Google Chrome.
  2. Download the Extension Simple Startup Password by clicking here.
  3. Add this extension to your Chrome.
  4. After installation, it will ask you for a password.
  5. Type the password which you want and click save button.
  6. Close your Browser and open it again.
You are all set. Now whenever you will open your Chrome browser, it will ask you for a password. If you entered the correct password, it will open the browser otherwise not.
You just secured yourself and your data and passwords from other people like your friends or others who are trying to steal your data. If you like this article, you might also like other articles on our website LHN.

Top 10 Screen Recording Softwares For Windows

Screen recording software can be useful when you want to show a project or some informational video on Howto or apresentation or even record a game to share your game play with your friends and family.
We have listed few best screen recording software. Links will open in new tab.

1.CamStudio (Free)

CamStudio is used widely for recording screen and capturing. You can even enable or disable your mouse cursorrecord sounds from software or a microphone. You can even select your screen pixel to be recorded or a selected program window so that the rest won’t be recorded in your desktop.

2.Ezvid (Free)

Ezvid is a screen recording software with an in-built video editor where you can split your recordings and you can add text and slip your recordings and create a slideshow effect and speed control. Using this software you can upload your video directly to YouTube.

3. Jing (Free)

Jing allows you to capture video, animation and images and share them on internet. In jing we can create short keys to make things quicker. You can record and selected Window or region that you would like to record in Jing

4.Screenr (Free)

Unlike other software screenr has nothing to do with you computer or install on your computer. It is a free online tool where you can record your screen without installing any software on online. It requires Java and you can record upto5mins maximum.

5. Rylstim Screen Recorder (Free)

Rylstim Screen Recorder is simple software that just records your screen after you hit “Start Record” This software does’nt record input device like microphone. Rylstime is a free software and you can even get a paid version too. This software is useful for people who are lazy on configuring their settings.

6.Camtasia Studio (Paid) (Free Trial Version only)

Camtasia studio best paid software for screen recording or screen capturing. You can even import videos, music, photos and customize according to your need. You can even export your video or upload your video directly to YouTube.

7. Webinaria (Free & Open Source)

Webinaria is a open source software for screen recording and screen capturing. Using this software you can create Flash(AVI to FLV) recordings of your desktop, record microphone with your presentation or demo and even save or edit your recordings to add voice, webcam or text.

8.FRAPS (Paid) (Free Trial Version Only)

FRAPS is widely used by gamer’s to record game play. Fraps can capture audio and video upto 7680×4800 with customframe rates from 1 to 120 fps (Frames per second). In Fraps we have hotkeys to record screen. It also used for recording movies at great quality.

 9.ActivePresenter (Free + Paid)

Active Presenter is similar to other screen recording softwares. You  can add voice, call-outs, annotations, videos and graphics. You can export your video to website,desktop,mobile device.

10.Icecream Screen Recorder (Free)

Icecream screen recorder a free tool to record your screen as a screenshot or a video. Easy to use and can record Skype video in HD and record webinars and games. In 3 ways to explain this is easy,simple and useful tool.

THINGS YOU MAY NOT KNOW ABOUT COMPUTER AND INTERNET

Here is a list of interesting facts about Computer and Internet that might make you surprise. In this list the image belongs to respect to author and we don’t own any one of them.
The first actual computer “bug” was a dead moth which was stuck in a Harvard Mark II computer in 1947.
bug

CAPTCHA is an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”
captcha

Only 8% of the world’s currency is physical money, the rest only exists on computers.
digitalmoney

A 15 year old hacked NASA computers and caused a 21-day shutdown of their computers. He hacked Pentagon weapons computer too.

hackednsa

In 1936, the Russians made a computer that ran on water.
watercomputer

How to Protect Google Chrome with secure browsing

These days, around everyone uses internet daily. And use different browsers to access the internet. Majority of people prefer Google Chrome because it’s fast, easy to use, secure and reliable. But people still doubt about how secure they are. They try different methods to become more secure.
To protect your account and other information, you need to protect your browser. To protect your browser from other people, you need to put a lock on it. This way, if anyone tries to access your web browser on which you are logged in at many places, your passwords are safe,etc , they won’t be able to access your browser without a password which they don’t know.
Protect-google-chrome
Now you might not know how to add a lock on your web browser. Follow the steps below to add a lock to your Google Chrome and secure your data from others.
  1. Make sure you have the latest version of Google Chrome.
  2. Download the Extension Simple Startup Password by clicking here.
  3. Add this extension to your Chrome.
  4. After installation, it will ask you for a password.
  5. Type the password which you want and click save button.
  6. Close your Browser and open it again.
You are all set. Now whenever you will open your Chrome browser, it will ask you for a password. If you entered the correct password, it will open the browser otherwise not.
You just secured yourself and your data and passwords from other people like your friends or others who are trying to steal your data. If you like this article, you might also like other articles on our website LHN.

How To Delete Empty Folder With One Click

Why do you wanna have empty folders for no use? You can download software when your tired to search and delete. This program does a great job by deleting the empty folders and saving our time.
The software scans the computer very fast for finding empty folders and we can view the result in tree format or read a log file, we can even analyze icon description (example: “android files” , “iPhone photos“) as well as a color description (example: red: will be deleted, blue: protected and gray: will not be deleted)

Step1: Download, install, and run Remove Empty Folders.
Step2: Now click Browse… button and specify the target location
Step3: Click Scan button and wait for couple of seconds (depends upon our computer speed)
Step4: On right side of the software you can see the list of empty folders
Step5: Right-click on a folder to Open in Explorer,Protect or Add to Ignore list 
Step6: Click Delete folders to delete all the empty folders.