Monday, 21 July 2014

A complete guide to start programming with any language by Harpreet Sandhu ~ CodingBaba [Partner Blog]

Are you new to programming ?... And don't know how top start it ?... which language should be used at beginning time ..? 





Just Read this Article.... Click Here..

This article is of our partner blog ~~ CodingBaba

Saturday, 7 June 2014

CHINA charges Microsoft windows 8 for backdoor-spying

Microsoft and China are at odds over the issue of cyberspying, with Windows 8 caught in the crossfire.

State-run broadcaster China Central Television lashed out Wednesday at the latest version of Windows and charged that it's capable of collecting a huge amount of data on Chinese society. In a transcript of the CCTV interview published by the Wall Street Journal, an academic shared his opinion on the type of data that Microsoft can allegedly collect through its OS.

"It's very easy for providers of operating systems to obtain various types of sensitive user information," Ni Guangnan, an academician at the Chinese Academy of Engineering, told the interviewer. "They can find out your identity, your account information, your contact list, your mobile phone number. With all that data together, using big data analysis, a party can understand the conditions and activities of our national economy and society."

Adding fuel to the fire, Guangnan pointed to the classified documents leaked by former National Security Agency contractor Edward Snowden as proof that Microsoft has worked with the US government to obtain encrypted data over the Internet.

In response, Microsoft used its own Weibo account to refute the charges and deny all allegations of backdoor spying in collaboration with the US government. As translated in a story by Neowin, Microsoft's denials break down into five points. According to Neowin, Microsoft said it has:


  • Never "assisted any government in an attack of another government or clients."
  • Never "provided any government the authority to directly visit...products or services."
  • Never provided a "backdoor" to products or services.
  • Never provided client data or information to the US government or the NSA.
  • Never "concealed any requests from any government for information about its clients."

Microsoft's war of words with China is part of a larger skirmish between the US and Chinese governments. Charges of cyberspying between the two countries is nothing new. But since the revelations of NSA spying activities were leaked last year, China has used the opportunity to accuse such companies as Microsoft, Google, and Apple of cooperating with the NSA to gather data and steal state secrets. Tech companies have acknowledged that they are required to share certain customer data at the request of the government but have denied that they collaborate with the government or build backdoors into their products and services to allow data to be siphoned.

Such charges can damage a company's reputation and bottom line. In the case of Microsoft, China last month announced a ban on Windows 8 for government computers. At the time, China's state-run Xinhua news agency said simply that the ban was designed to improve security. However, China likely has another motive for wanting to put the kibosh on Windows 8 beyond security fears.

Microsoft has long accused China of widespread piracy of Windows. In 2011, former CEO Steve Ballmer told employees that Microsoft's revenue in China represented only 5 percent of sales in the US although the two markets were about the same size, according to the Journal. As such, a significant number of the PCs in China still running the now-unsupported Windows XP may be using illegal copies.

Microsoft wants to implement a server-based licensing system in China as one way to fight software piracy, the Journal added. And since the software giant no longer sells or supports Windows XP, Chinese consumers would be forced to upgrade to a more modern operating system, such as Windows 8.

Thursday, 29 May 2014

Bing servers more worst search engine services than Google

An independent testing lab in Germany has found that search engines are not 100 per cent effective at removing malicious sites from results — and Microsoft's Bing is much less effective than Google.

Although most search engines have measures in place to protect users against trojans, malicious sites still manage to crop up from time to time — even in the top search results. An independent testing lab in Germany by the name of AV-Test has just completed an 18-month survey (PDF) to find out which search engines are the worst offenders.

The lab tested 40 million websites across seven search engines — Google and Bing, the world's two most popular search engines; Yandex, Russia's biggest search engine; Blekko; peer-to-peer search engine Faroo; Teoma, better known as Ask.com; and Chinese search engine Baidu — and found only a very small number of malicious results returned: about 5000, or around 0.000125 per cent.

Google and Bing were both tested with around 10 million websites, and were the best at weeding out malware. However, it should be noted that there was quite a gap between the two: Bing turned up 1285 malicious sites to Google's 272.

AV-Test also cautioned that malware developers are getting sneaky, using search engine optimisation (SEO) to slip malicious websites into the top search results, since users tend to trust top results more.

Generally speaking, your chances of catching a trojan from a search engine are very low, but it never hurts to be prepared. Make sure your computer's operating system, your browser and your anti-virus software are up to date, and, if you're really worried, use AVG's Linkscanner to check URLs before you visit them.

Source : cnet news

Team Hack4friends,

Tuesday, 25 February 2014

MTGOX world's largest bitcoin trading website turned OFFLINE ~ Hack4friends

MTGOX world's largest bitcoin trading website turned OFFLINE ~ Hack4friends


As we all know in recent days the virtual currency-Bitcoins gained much popularity among all countries's people. And its exchange value to US Dollars raised to 1200$. But now its going to smashed because its exchange values is also decreasing day by day and today its value downed to 425.304$(Biggest fall).




MTGOX got much popularity in few months and ranked as No. 1 online bitcoin trading website.But now website is disappeared from internet and a blank page is left on their website. People from all countries have invested so millions of Dollars($) for online trading with Bitcoins but MTGOX disappeared with all money.
Mark Karpeles, CEO of the pioneering but troubled Bitcoin exchange MtGox, has resigned his seat on the board of the Bitcoin Foundation, the organization that standardizes and promotes the cryptocurrency.

MtGox, which handled the bulk of Bitcoin transactions until fraudulent hacking forced it to freeze withdrawals earlier this month, has had serious liquidity problems since last year. Though others were subsequently hit too, Bitcoin Foundation chief scientist Gavin Andresen blamed the exchange rather than the core protocol for the episode, and MtGox’s systems have struggled to recover.
                                   
                              
                                           All tweets are deleted by MTGOX

The Tokyo-based company has repeatedly promised a fix but failed to deliver. Its most recent communication was on Thursday, claiming that “security problems” had forced it to relocate, slowing down its progress in fixing its records after the attack. It’s not clear whether this is a reference to the couple of angry bitcoiners who were camped outside the MtGox offices, demanding their money.

In a statement on Sunday, the Bitcoin Foundation said it was “grateful for [MtGox's] early and valuable contributions as a founding member in launching the Bitcoin Foundation.” A request for comment from MtGox itself had gone unanswered at the time of writing, though as many have noted the company has deleted its entire tweet history, so take from that what you will.

We also contacted to MTGOX via their old email addresses but till now we have not got any response from their side about it all.

Team Hack4Friends,
@E-Hackers

Friday, 14 February 2014

Biggest DDos attack of the world with 400Gbps ~ Hack4Friends

Biggest DDos attack of the world with 400Gbps ~ Hack4Friends

A massive distributed-denial-of-service attack Monday reached more than 400Gbps at its peak, about 33 percent greater than last year's Spamhaus attack, the previous DDoS record-holder.
The attack was apparently directed at one of the customers of content delivery network and security provider CloudFlare, which first reported the attack. The company said it appeared that attackers leveraged a flaw in the Network Time Protocol (NTP), a network protocol used to synchronize computer clock times.


"Very big NTP reflection attack hitting us right now. Appears to be bigger than the #Spamhaus attack from last year. Mitigating," Cloudflare CEO Matthew Price said in a tweet. "Someone's got a big, new cannon. Start of ugly things to come," he wrote in a follow-up tweet.
Price did not identify the customer targeted by the attack but did say it was directed at servers in Europe, adding that "these NTP reflection attacks are getting really nasty."
The frequency of NTP reflection attacks has grown in recent months. After an NTP attack was used to take down game servers hosting EA's Origin service, Blizzard's Battle.net, and League of Legends, among others, US-CERT issued an alert warning companies of the attack technique's growing popularity.
The basic attack technique consists of attackers querying vulnerable NTP servers for traffic counts using the victim's spoofed address.
"Due to the spoofed source address, when the NTP server sends the response it is sent instead to the victim," CERT warned. "Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim."

"Because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks," US-CERT said in its January advisory, which included suggestions on how administrators could mitigate vulnerability.
The technique's popularity has grown since the emergence of toolkits such as DNS Flooder v1.1, according to security vendor Prolexic, which said Tuesday it has observed the attack used on several clients during the past six months, sometimes with amplification factors of 50 times the originating bandwidth.
"This toolkit uses a unique method where attackers assign DNS servers with arbitrary names and utilize them as reflectors," according to Prolexic's report. "This new technique allows malicious actors to purchase, set up, and use their own DNS servers to launch reflection attacks, without the need to find open and vulnerable DNS servers on the Internet."
Monday's DDoS surpassed the attack last March that peaked with a 300Gbps torrent of traffic flooding spam fighter Spamhaus, CloudFlare, and key Internet switching stations in Amsterdam, Frankfurt, and London. That onslaught resulted, according to some reports, service slowdowns across the Internet.

Team Hack4Friends,
E-hackers

Flappy Bird fakes are hatching Android malware ~ Hack4friends

Flappy Bird fakes are hatching Android malware ~ Hack4friends

Flappy Bird's takedown by its creator has given malware creators a new outlet to exploit unsuspecting users.
According to security firm Sophos, it has discovered several applications claiming to be Flappy Bird in third-party Android app marketplaces. The trouble, however, is that the games in some cases contain malware and in others force users to send a text message to a given number, effectively giving the malware creators all they need to potentially exploit users.


Another security firm, Trend Micro, also chimed in on the issue, saying that it has discovered "a bunch of fake Android Flappy Bird apps spreading online." Every one of those it has discovered so far are "apps that send messages to premium numbers, thus causing unwanted changes to victims' phone billing statements."
Flappy Bird has become a hot-button issue in the mobile world after the game soared to popularity and was subsequently taken down by its creator, Dong Nguyen. That was the opening malware creators needed, the security firms say, to take advantage of users who didn't have a chance to try out the game and want to see what all the hype is about.
Both Trend Micro and Sophos said that users shouldn't attempt to download anything calling itself Flappy Bird, since the original version is "dead." They also warned users to "be wary of apps from alternative markets."

Team hack4friends,
E-hackers

*****************************Thanks for Your kind Visit****************************

Receive All Free Updates Via Facebook.