Thursday, July 19Care to be aware

Month: June 2017

Disk Forensics : Process Overview

Disk Forensics : Process Overview

Concepts, Cyber Forensics
                                           Disk forensics is the science of extracting forensic information from digital storage media like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc.. The process of Disk Forensics are Identify digital evidence Seize & Acquire the evidence Authenticate the evidence Preserve the evidence Analyze the evidence Report the findings Documenting                                                                                                                                                                                                                                                                                                                                           Identify digital ev
Bitcoin: Lesser known Facts

Bitcoin: Lesser known Facts

Cyber Security, Facts & Figures
  10 Most Interesting Bitcoin Facts 1. Bitcoin creator, Satoshi Nakamoto, is still a mystery figure Satoshi Nakamoto is the name used by the person who designed bitcoin but there’s still doubt about the real identity. Over the years, many people have been linked with the same, including Nick Szabo, Dorian Nakamoto, Hal Finney, Craig Steven Wright, and others. Some people consider Nakamoto might be a team of people. As of May 2017, Nakamoto is believed to own about 1 million bitcoins with a worth of more than $2 billion. 2. Bitcoins are limited in number You might’ve heard about bitcoin mining, the process using which bitcoins are generated digitally. So, does this mean there could be an infinite number of bitcoins? That’s not the case. A pre-defined schedule has limited the n
Remote Desktop: Complete Overview

Remote Desktop: Complete Overview

Concepts, Networking
  What is Remote desktop? Remote Desktop, a function included with Windows XP Professional, enables you to connect to your computer across the Internet from virtually any computer, Pocket PC, or smartphone. Unlike a typical VPN connection (which will give a remote PC access to the company network) Remote Desktop will actually allow you to see and control your connected PC as though you were sitting directly in front of it. Remote desktop vs VPN : Which is a better choice ? why? A VPN and Remote Desktop solve two different problems — perhaps slightly overlapping but mostly distinct and frequently complimentary capabilities. Remote Desktop (e.g., Microsoft RDP or VNC) let’s you sign on to a remote computer using the keyboard and mouse while viewing the screen much as if “yo
How safe is it to Leave Your Laptop Plugged in All the Time?

How safe is it to Leave Your Laptop Plugged in All the Time?

Explainer, Life Hacks
One often discussed question is whether it’s better to keep your laptop plugged in, or if you should use it on battery power. Turns out, the answer isn’t entirely straightforward. Let’s take a look. Know Your Laptop Battery There are two main types of battery used in laptops: lithium-ion and lithium-polymer. Although they are different technologies, they function in broadly the same way, with power being created by the movement of electrons. This flow also helps to keep the battery healthy.  For both types of batteries, the following statements are true (for modern laptops): A battery cannot be overcharged. There’s no danger of a battery being overcharged if you leave it plugged in all the time. As soon as it hits 100%, it will cease charging and won’t start again until the
Google for jobs : Looking for a new job is getting easier

Google for jobs : Looking for a new job is getting easier

Cyber News, Cyber Security, In Buzz
After making the announcement about a new job search tool at this year’s Google I/O conference, the search giant finally rolled out Google For Jobs yesterday. The platform helps both job seekers employers connect with each other, Google says. As already known, the AI-powered job search engine displays job listings from other leading portals like Monster, Linkedin, WayUp, DirectEmployers, CareerBuilder, Glassdoor, etc. The service is currently available in the United States where people can make job-related queries like “jobs near me” in Google Search Various filters allow people to narrow down jobs based on their location, job title, employer reviews, and other things. Google For Jobs can also send email alerts when new listings arrive. Cloud Jobs API, announced last ye
Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Concepts, Cyber Forensics
                                   Whenever we talk about the terms like wipe, shred, delete, or erase, we often use them interchangeably. It’s generally acceptable in layman terms but these technology terms have distinct meanings and specific uses. In this article, I’m going to tell you why it’s important to understand the underlying differences and working. What is Delete? Without a doubt, Delete is the common term on this list. In literal meaning, delete refers to the act of removing a file from a computer and smartphone. You might have noticed that the deleted files in your computer are sent to Recycle Bin. But, is that it? Whenever you perform the delete action on your computer, smartphone, or any other electronic device, you don’t get rid of it. The deleted file exists on you
How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

Cyber Forensics, Tools
Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason, the files on it can’t be accessed. To resolve this issue, you ca
Google Drive Will Soon Backup Your Computer’s Entire Hard Drive

Google Drive Will Soon Backup Your Computer’s Entire Hard Drive

Cyber News, In Buzz
Google Drive is one of the most used productivity tools of Google. People use it create backups of their data and make sure that their important data is safe. Now, thanks to a new and upcoming feature, Google will let you backup your entire computer’s storage disk. Due to this change, instead of files needing to be stored inside the Drive folder, Google will be able to backup the files inside any of your folders. Later this month, on June 28th, Google will launch this feature in the form of a new app named Backup and Sync. To use this feature, you’ll need to first download the Backup and Sync tool on your Mac or PC. After signing in, you’ll be able to choose the folders that need to be backed up. After doing so, you’ll be able to access Drive across different devices. In its a
Subtitle Hack: 200 Million Devices Are Vulnerable, Download Fix For VLC, Kodi, Etc

Subtitle Hack: 200 Million Devices Are Vulnerable, Download Fix For VLC, Kodi, Etc

0 Day Attacks, Cyber News, Cyber Security
According to a blog post published by Check Point security, a subtitle file could be modified to create a new attack vector and compromise the devices such as PCs, mobile devices, TVs, etc running vulnerable media players. Once compromised, the attacker can perform remote code execution, steal data, use the device as a pawn in a DDoS attack, and more. The researchers say, delivering a cyber attack when subtitles are loaded onto a media players is a “completely overlooked technique”. Most of the people download subtitles files from repositories on the web without giving a second thought, treating them as no more than innocent text files. The researchers say that attackers can upload a malicious subtitle on a repository and manipulate the rankings to put their results on the top. Th
Bing Search: Microsoft will now be “Paying You To Use It”

Bing Search: Microsoft will now be “Paying You To Use It”

Cyber News, Cyber Security, In Buzz
  Well, it’s not a bribe per se but a Microsoft Rewards program which the company has been running in the US since August 2016. Now, the scheme is being released in the United Kingdom. As part of Microsoft Rewards program, a user gets 3 points for making a Bing search, 1 point per pound spent on the Microsoft Store online. To earn more points, you can participate in various quizzes as well. An individual user can earn a maximum of 30 points per day. That’s 10 searches per day if you don’t make any purchases. Microsoft will double the number of points earned until August 15. However, if you use Edge browser to make those searches and other things, the bar raises to 60 points per day. You won’t be getting any real money but these points can be redeemed to get freebies like Xbox g