Tuesday, May 22Care to be aware

Knowledge Base

GlassWire : A Must Have Network Security Tool

GlassWire : A Must Have Network Security Tool

Networking, Useful Applications
Who is your computer talking to? Your browser isn't the only application that's sending data online. Your word processor might be phoning home; a file undelete utility might be talking to its mother ship, and even Windows' own services may surprise you. These are not necessarily nefarious actions, but they're worth knowing about. GlassWire is a free and beautiful utility that lays all of this bare. GlassWire makes network traffic fun to watch. One of the most important things about GlassWire is that it's beautiful. This isn't a minor detail: For many users, network security is equal parts daunting and tedious. Having a tool that's just fun to pop open and watch throughout your day makes a big difference. The graph scrolls in real-time, and there's a zoom slider across the bottom of t...
How To Schedule Jobs in Linux | Cron and Crontab Commands

How To Schedule Jobs in Linux | Cron and Crontab Commands

Ethical Hacking, General, Knowledge Base
Quite like the TaskScheduler utility of Windows, one can utilize the Cron utility to schedule jobs in Linux to run periodically at fixed intervals of time. Used typically for automating system maintenance or administration jobs like backing up data, updating packages and much more, any Linux sysadmin would vouch for its importance. Job scheduling in Linux: Basic Guide What is Cron? The Cron service is a time-based job scheduling service that is typically started when the system boots. It checks every minute for any scheduled jobs and runs them if they exist. What is Crontab? In order to manipulate the job schedules, we use the Crontab program in Linux. Crontab, short for ‘cron table,‘ is a configuration file. Each line of the Crontab represents a job and contains information on what t
How To Block Movie Spoilers, Tech Rumors, And Unrelated Content On The Internet

How To Block Movie Spoilers, Tech Rumors, And Unrelated Content On The Internet

Knowledge Base, Life Hacks, Tips & Tricks
  People love to drop spoiler bombs minutes after a movie or a TV show releases. It’s quite frustrating for most us that we have to deal with the idiocy of these people firing hints on the internet. We really can’t do anything to stop them. Last year, it was Game of Thrones — folks were crazy because someone was back from the dead. The situation resembles similarity with Indian daily soaps, where coming back from the dead is like a daily routine for the characters. That’s a different topic, by the way. Now, the real thing is that we can’t do much to stop movie and TV show spoilers flooding the internet. But we can very well come up with a plan B — plan A was removing movie spoilers, but that’s not possible. So, our plan B is to create a shield for us to withstand the impa
NetBalancer : Controlilng & Prioritizing Internet Traffic

NetBalancer : Controlilng & Prioritizing Internet Traffic

Networking, Useful Applications
NetBalancer is an internet traffic control and monitoring tool designed for Microsoft Windows XP, 2003, Vista, 7, 8 with native x64 support. NetBalancer lets you restrict, monitor, define traffic rules, set limits, monitor usage etc. NetBalancer is an Internet traffic monitoring and controlling software that is available as a free and professional version. Installation and Requirements: The available versions are compatible with Windows 2003 32/64-bit, XP 32/64-bit, Vista 32-bit, Windows 7 32-bit, Windows 8 and Server 2012. The installation is quite simple, and hardly takes 2-3 for setup. Once the setup is complete we’ll have a taskbar icon/UI where the current speed/status will be displayed. NetBalancer pop-ups can be enabled disabled using taskbar icon. Features: Here are the
Disk Forensics : Process Overview

Disk Forensics : Process Overview

Concepts, Cyber Forensics
                                           Disk forensics is the science of extracting forensic information from digital storage media like Hard disk, USB devices, Firewire devices, CD, DVD, Flash drives, Floppy disks etc.. The process of Disk Forensics are Identify digital evidence Seize & Acquire the evidence Authenticate the evidence Preserve the evidence Analyze the evidence Report the findings Documenting                                                                                                                                                                                                                                                                                                                                           Identify digital ev
Remote Desktop: Complete Overview

Remote Desktop: Complete Overview

Concepts, Networking
  What is Remote desktop? Remote Desktop, a function included with Windows XP Professional, enables you to connect to your computer across the Internet from virtually any computer, Pocket PC, or smartphone. Unlike a typical VPN connection (which will give a remote PC access to the company network) Remote Desktop will actually allow you to see and control your connected PC as though you were sitting directly in front of it. Remote desktop vs VPN : Which is a better choice ? why? A VPN and Remote Desktop solve two different problems — perhaps slightly overlapping but mostly distinct and frequently complimentary capabilities. Remote Desktop (e.g., Microsoft RDP or VNC) let’s you sign on to a remote computer using the keyboard and mouse while viewing the screen much as if “yo
Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Delete vs Erase vs Shred vs Wipe: What’s The Difference? Which One Should I Use?

Concepts, Cyber Forensics
                                   Whenever we talk about the terms like wipe, shred, delete, or erase, we often use them interchangeably. It’s generally acceptable in layman terms but these technology terms have distinct meanings and specific uses. In this article, I’m going to tell you why it’s important to understand the underlying differences and working. What is Delete? Without a doubt, Delete is the common term on this list. In literal meaning, delete refers to the act of removing a file from a computer and smartphone. You might have noticed that the deleted files in your computer are sent to Recycle Bin. But, is that it? Whenever you perform the delete action on your computer, smartphone, or any other electronic device, you don’t get rid of it. The deleted file exists on you
How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

How To Repair Corrupted Pen Drive or SD Card In Simple Steps?

Cyber Forensics, Tools
Dealing with a corrupted SD card or pen drive is a tedious task. We spend hours to get back our storage into working condition but get nothing. This article comprises of various methods which will help you repair your corrupted pen drive or SD card. For SD card, you will have to insert it into the slot provided in your computer or by using a card reader. Use adapter if you have a microSD card. It will not work if you connect some device having the SD card like a smartphone or a camera. Check out these different methods. Different methods to repair corrupted pen drive or SD card: Change the drive letter Sometimes your computer is unable to assign drive letters (like C, D, E) to your storage media. Due to this reason, the files on it can’t be accessed. To resolve this issue, you ca
Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Quick Format And Full Format: What’s The Difference and Which One Should I Use?

Concepts, Cyber Forensics
The bookshelf and file system analogy Before going into the details of this answer, one should know the basics of how a file system is built. You can treat it like a bookshelf where books represent files and a catalogue is maintained to keep a record . Let’s consider a scenario where a book will be no longer present (a file is deleted from the disk) or some books are added that aren’t listed in the catalogue. In such case, there will be an error in the system, i.e. irregularities in the catalogue. Deleting files from a disk When you simply delete a file from your computer, it’s just like clearing out the catalogue but leaving behind the books in their shelves. Following that, when one adds a new book to the shelf, older books are replaced by new ones. Same happens with files. Having
Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Disk Defragmentation: What It Is and How Helpful Is It To Defrag My PC?

Concepts, Cyber Forensics
You might have heard tech people talking about the need of defragging the PC to make it faster. It’s often recommended as a way to increase the PC performance. But, do You know the meaning of disk defragmentation? Do you know how often you need to defrag your storage drive? Well, as the name suggests, disk defragmentation sounds something like putting back the broken pieces together. In terms of PC management, it deals with picking up all the pieces of data spread across your hard drive and bringing them together. How does disk fragmentation occur? Most PC hard drives have spinning patterns and they store data in different places. While writing some new data, blocks are created that are sequentially ordered. When a file gets split between different far away blocks, fragmentation o