Archive for October 2015

Google Introduces ASUS OnHub “Intelligent” WiFi Router


Google has teamed with up Asus this time to bring you an intelligent and powerful WiFi router. This is second in line from Google’s Wi-Fi router family after the TP-LINK and promises you of the performance never experienced before.

Teaming up with the company that claimed to build the world’s fastest WiFi router, Asus, Google has introduced a new line of WiFi routers that will make the blank spots in your home disappear. Second member in the family of OnHub (previous one was TP-LINK) promises you the services unprecedented.
OnHub comes with new innovations like wave control which lets you boost the WiFi speed for a particular device with just a wave of your hand over the router. The cylindrical shaped OnHub easily blends with the aesthetics of your house as well.

Google has also announced that the performance oriented software updates for Asus OnHub will come next week which will let the router select different combinations of the antennas to give the best signal to your devices, depending on their location in the house.

If all your lifehacks of boosting the WiFi signal failed, and the regular technical methods for improving WiFi performance didn’t work either, then Google’s OnHub could be a the answer.

For $219.99 the Asus OnHub will be available for pre-orders from select stores. Watch and learn more about the Asus OnHub on the OnHub platform.




Wednesday, October 28, 2015

How To Remain Anonymous Online

As for the title of this article, yes, pun intended. When I first started exploring online chat rooms and learning more about how the internet worked, I have to admit I was rather naive to it all. I remember watching an online video which led me here to Anonymous. This video, in part tells people to ask for help remaining secure and private online. In the spirit of this message I write this article.
We all hear about the NSA and government surveillance or hackers lurking in the shadows. For some people, the internet can seem like a scary and intimidating place. Do you want help feeling safer online? Do you want to be unafraid about making an online purchase? Would you like in interact and learn with people from all around the world without feeling spied on by some unknown powers at be? If you are like many people you have suspicions or hesitations online, but here are some tips from the professionals on how to help you stay anonymous on your journey.
Step 1. Use a good firewall software for your computer. A good firewall software you can use is a high-end built directly into Kaspersky and Norton Internet Security (2013). Also, using Kaspersky or Norton, you are getting spyware protection and live website protection to protect you from unsafe websites.
Step 2. Purchase a hardware firewall. You can get them for as little as $50+ from a pawn shop (if they have any) and up from there. This will help in protecting not only your computer, but if you hook it into your internet connect before your router/modem, it protects all of your networked devices.
Step 3. Utilize a VPN connection. VPN (Virtual Private Network) actually simulates your computer as if you are logged into the network from another location. a good VPN company to use is from Barracuda. They offer SSL as well as VPN connections.
Step 4. Once you have completed steps 1-3, now you need to get a more secure browser than IE, FireFox, Chrome, etc. I am talking about the Tor Network. Tor is one of the leading web browsers that also comes with another VPN connection and keeps your website viewing privatized. Tor is 100% free and safe to use.
How can you further protect your privacy interacting as anonymous online? Invent an alias, a surname if you will, with a name of your choice. Go and register this name with one of the big email service providers. Use this new email to register any new Twitter, Facebook, Instagram, ‘etcetera’ accounts. Be sure to clear all browser cookies before using this alias, or better yet, use a different web browser for your anonymous identity than you would use for your more typical internet activity. If you have a further need for security beyond these steps you may want look into encryptionstenography or TAILSsystem.
Saturday, October 24, 2015

Top 5 Antivirus Software To Protect Your PC


Wh

en shopping around for a new anti-virus software, you will likely run into a no-cost version of the software that promises to be as capable as the paid products. If one is to rate anti-virus application categories into various levels, you will notice that the no-cost applications are listed at the bottom. Although free software can be tempting, they are not as efficient as paid software; this tends to apply to all types of software and not just antivirus protection. One visual irritation with free anti-virus software, is the certainty that each program will display advertisements. In addition, the most frustrating thing you will experience when using free antivirus programs, is the lack of support. Funded programs commonly offer wide technical support, allowing you to contact someone via e-mail, phone or message.

Basic Definitions

Although anti-virus software has evolved and is now able to eliminate emerging malware, the term antivirus stayed. The term anti-malware, would now accurately define the software’s functionality. To get an idea of the common types of malware out there, we have constructed a list of malware types.

Spyware

This software is designed to secretly obtain personal data.

Ransomware

This unique version of malware infects your computer, confines entry to your computer system—perhaps preventing you from browsing the internet or accessing the hard drive—and then demands that you pay money to the malware designer.

Worms

This kind of malicious program is designed to replicate itself quickly and spread to other PCs, often via the local network.

Trojan Virus

Trojans are different from worms, mainly because they are not developed to replicate themselves. Instead, Trojans are designed to trick you into installing them, allowing them to cause data loss, theft and sometimes total-system damage.

Rootkits

A rootkit is a furtive type of malware that hides itself by typical methods of detection, and allows persisted privileged access to a computer system. As a requirement from the hacker, the rootkit makes an attempt to gain administrator access on your computer. The malware then hides so it cannot be detected.

Okay, now we have all the basics covered, let’s check out the list of amazing antivirus protection:-

1) Bit Defender



Image Source: Google Image – This logo can be used under the deeds of Creative Commons.
Bitdefender includes matching essential features such as scheduled scans, email protection, anti-spyware services. In addition, Bitdefender helps you by safeguarding you from scammers and comes with a free credit monitoring service. You can get additional information about the free credit monitoring services via the Bitdefender website.

With its high efficiency, display of useful functions, solid support and superb experience, Bitdefender is a fantastic antivirus software. With its performance, it arguably surpasses the competition. Bitdefender’s antivirus software includes features that are commonly reserved for detailed internet security suites. In addition, if you ever experience a malware destroying your system, Bitdefender’s assistance staff are there to help you 24/7.

2) Kaspersky


Image Source: Google Image – This logo can be used under the deeds of Creative Commons.
It has no rival when it comes to searching for and destroying malware – even if the malware is known or recently created. It does not slow the speed of your system to any calculable degree. Furthermore, it does not make mistakes when it decides which files are safe and which are harmful. Kaspersky’s security program even includes a lot more features than a few others in its category. For example, some of Kaspersky’s rivals have no anti-phishing and no instant detection of detachable hardware or media products.

However, an essential function of Kaspersky antivirus is its ability to detect, restrict and remove viruses.

Furthermore, it goes beyond being an antivirus software by providing security from all malware, most notably spyware, rootkits, security intrusions and screen lockers. It also consists of a virtual keyboard, allowing it to protect you computer from a form of malware called a key-logger. In addition to its anti-malware features, the antivirus offers anti-phishing—that means it informs you when a web page is not safe to access—and it prevents you from accessing web pages that are known to contain malicious software.

3) McAfee


Image Source: Google Image – This logo can be used under the deeds of Creative Commons.
Although it does not claim it to be a complete online protection package, McAfee does include a generous set of features. In a test conducted by AV-security, the software got exposed to a hundred and thirty-eight trials of zero-day vulnerabilities; McAfee stopped all of them. But that’s not all; it also discovered some nineteen thousand additional viruses lurking on the web. As with any antivirus, McAfee gives its users full control over scanning and one can also choose real-time protection of everything, or you can simply set its limit to programs and individual files. However, by adding the full protection suite, or as they call it the “total protection” plan, one can gain the means to guard your identity and block spam and dangerous emails.

4) Norton


Image Source: Google Image – This logo can be used under the deeds of Creative Commons.
Norton Security allows you to guard up to five gadgets and PC’s (in total) with a solitary package. This can be managed from the owners online account with additional technical online support. But it doesn’t stop there, from the daily protection of various malware, this product also protects you from phishing attempts. During the different tests conducted by respected software companies, Norton Security also accomplished perfect protection and functionality scores. It accomplished this with seldom perceptible affects on system functionality. By eliminating the tiered steps strategy of buyers-grade protection products, Norton Security offers all non-commercial end users with protection that is far above a standard entry antivirus application.

5) Avira


Image Source: Google Image – This logo can be used under the deeds of Creative Commons.
The results of this antivirus – in terms of its ability to block attacks – accurately detects threats without confusing the right documents and programs for the bad ones. Avira, and the rest of the anti-malware programs, made no errors when correctly identifying safe files and web pages. None of them mixed up dangerous files and malicious websites with secure ones. However, in the tests created to measure the virus protections impact on system performance, Avira slowed down the machines. Furthermore, for any user based outside of Europe, if you are in need of customer support, a long distance call must be made. Lastly, whereas most of the market products cover more than one device with a single license, Avira’s only supports one PC with a single license.
Friday, October 23, 2015

NSA has Decrypted 1 Trillion Encrypted Connections

Current Security;

By now, most of our internet usage is utilizing 1024-bit encryption for the passing of the Diffie-Hellman. We also use VPN, SSH, HTTPS, to encrypt our information in messages.
The Diffie-Hellman protocol is actually a method in which is used by two computers in order to generate a privately shared key in order to exchange information on an unsecure channel.
The decryption of this encryption level should take one full year as well as several hundred thousands of dollars.

VPN, shorted for Virtual Private Network, is in fact a network in which is constructed by using other public wires, commonly the internet uses. This connects to a private network that is set up by a company that has an “internal” network. This aids in protecting your computers by making your computer appear to be in another location.

Secure Shell, known as SSH, is also referred to as a Secure Socket Shell. This is a Unix based command line interface in which network engineers use to securely access remote computers. This is also used by network administrators in order to gain access and control web space as well as remote control of servers.

Lastly, HTTPS, shortened for Hyper Text Transfer Protocol Secured, ensures the secure socket layer and/or transport layer security (TLS) and performs as a sublayer in which lays underneath a regular HTTP (Hyper Text Transfer Protocol). The HTTPS not only encrypts the page requested by users, it also decrypts the page as it returns from the web server.

Current Threat;

By now, everyone knows of the NSA, as well as other governing agencies and spies, are working in order to not only track our every move but to also listen in on our conversations and personal emails. We can see the newest removal of our basic rights, when the NSA designed and developed the Data Center of Utah, as seen here. For the past, x-amount of decades, our governing agencies has been violating

Edward Snowden, a famous and world known whistleblower, has performed revelations in the year of 2013. Now the NSA has a new system in which has decrypted over one trillion private and secured messages across the internet world-wide.

By now, it is no doubt that any one doesn’t know about our beloved NSA spying on us. As the “investigations” of both public and private connections have been violated for decades now. Now, the NSA has the powers to break the encryption on over one trillion devices worldwide with Internet connection. We can see, from the National Security Act of 1947, that the Act in fact contained a specific ban upon intelligence operatives from performing their tasks domestically. We can also see that in Article II, Section 3, that there are clearly established and well defined procedures that need to take place in order for the government to perform “eavesdropping” upon the Citizens of America. You can read upon the original National Security Act of 1947 here.

As our technology progresses along in time, our mobile technology is known to have tracking devices in them. The tracking devices are reported to aid you in the even in which you get lost, or you require the local law enforcement agencies.

New Threat;

While our National Security Act of 1947 has entitled the Citizens of America with privacy from the spying government, we understand that our government does not care about our rights. And the NSA uses proclaims they are just looking for acts of terrorism.

While the NSA and other governing agencies and spies are lurking in the darkness, the NSA has been working on something much larger. In fact, the NSA has spent one full year as well as over three hundred million dollars on the investigation and decryption of over one trillion secured and encrypted connections from all over the world.

During the ACM Conference which was based upon Computer and Communications has presented a paper in which discusses the advances of even the most plausible theory upon how our government was able to break into some of the world’s most widespread encryption services found upon the internet.

Please, feel free to read their paper here.
While reading their work, we are able to see that the NSA has in fact exploited our common implementations of the Diffie-Hellman key encryption. This key encryption is also one of the most common forms of exchanging encrypted messages over the uses of an untrusted web channels.
While the Diffie-Hellman encryption key is supposed to be one of the most safe and secure form of encryption as this method is supposed to take a few hundred years to complete the decryption. Not to mention the financial support it would require.

On that note, the most serious vulnerability from the NSA as well as other governing spies, have actually decrypted the Diffie-Hellman Key exchange. This is now allowing our governing agencies the power to spy and eavesdrop upon our secure connections. The government has access to over a trillion encrypted devices that are connected to the internet. The NSA had set up an eleven-billion-dollar budget just covered the research and still had financial support left over.

This is also the preciously reason in which other privacy advocates has been attempting to push the website developers world-wide into utilizing virtual private network applications. Using the VPNA as well as cryptographic software allows for a more secured connection between devices, that even our government would have to invest more time and money into. However, using those methods would then invoke major website connections to redevelop, or simply transfer, their existing website onto the VPNA and then encrypt their website using their preferred methods of cryptography.

Protecting Yourself;

The government may be gaining access to our encryption messages, there are still a number of ways to protect yourself online.

The first way is to completely abandon the cloud services. Even professional IT experts have resisted the little urge to “host” their programs and data onto a public cloud storage system. The NSA is able to be “sitting” at a tier one ISP watch list. This will allow them to watch your data go by and on its way onto the Cloud Server.

While most of the population by now is used to the Texting services found on any mobile device, I strongly recommend the immediate halt on all of your text messaging as well as instant messaging applications. When you send a message, it typically goes to a server where it is kept, and then from the server it is sent to the preferred contact you have chosen. While there is not much you can do to make your texting services safer and more secure, you can control the security of your instant messaging. This is done by utilizing your own personal IM services combined with your own XMPP (Extensible Messaging and Presence Protocol).

Everyone uses email, so encrypt all of your emails that you send. This can be accomplished by using services such as PGP (Pretty Good Privacy) as well as S/MIME (Secure/Multipurpose Internet Mail Extensions). These are actually very difficult to use, and the people in which you send your emails to must also use the same S/MIME services.

One of the most common ways of “hiding” is to hide your web browsing usage. By using SSL (Secured Socket Layer) is a good idea. Yes, the NSA has broken the SSL, but it is still a very good idea to practice. One way you can do this is by installing an HTTPS Everywhere extension on your browser. HTTPS Everywhere is only available on Google Chrome as well as Mozilla FireFox.
Using the Tor Network and tools by using the Tor Browser Bundle (TBB) can be used on your current choice of operating system such as Microsoft Windows, Linux Ubuntu, and Apple iOS. When you are using Tor, this allows your connections to be private and secure wherever you gain access to.
Another great form of protecting yourself is to close all firewall applications. This can include your calendar, clocks, recording services, etc. You can also take advantage of Incognito Mode, which is aimed to allow you to surf the internet anonymously.

This one is a bit dramatic and probably harsh to some, but the best line of security is to quit all of your social media networks completely. Starting with Facebook is the worst social network of them all, as Facebook holds onto all of your data.

However, the only real way to be completely secure about your internet privacy is to have a fundamental alteration upon our laws and how we are enforcing privacy laws.

This Article (NSA has Decrypted 1 Trillion Encrypted Connections)  is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.
Wednesday, October 21, 2015

Top 15 Advanced Operating Systems For Hackers



1. Kali Linux


Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni and Devon Kearns of Offensive Security developed it by rewriting BackTrack. Kali Linux is the most versatile and advanced penetration testing distro. Kali updates its tools and it is available for many different platforms like VMware and ARM. if you want to know more about Kali Linux then i recommend you read my previous article: An Introduction To Hacker’s OS Kali Linux And Setup Tutorial.

Click here to download



2. BackBox 


It includes some of the most used security and analysis Linux tools, aiming to a wide spread of goals, ranging from web application analysis to network analysis, from stress tests to sniffing, including also vulnerability assessment, computer forensic analysis and exploitation.

The power of this distribution is given by its Launchpad repository core constantly updated to the last stable version of the most known and used ethical hacking tools. The integration and development of new tools inside the distribution follows the commencement of open source community and particularly the Debian Free Software Guidelines criteria.

Click here to download


3. Parrot-sec forensic os


Parrot Security is an operating system based on Debian GNU/Linux mixed with Frozenbox OS and Kali linux in order to provide the best penetration and security testing experience. it is an operating system for IT security and penetration testing developed by the Frozenbox Dev Team. It is a GNU/Linux distribution based on Debian and mixed with Kali. 

Parrot uses Kali repositories in order to take latest updats for almost all the tools, but it also has its own dedicated repository where all the custom packets are kept. This is why this distro is not just a simple Kali “mod” but entire new concept which relies on Kali’s tool repositories. As such, it introduces a lot of new features and different developing choices.Parrot uses MATE as a Desktop Environment. Lightweight and powerful interface is derived from famous Gnome 2, and thanks to FrozenBox highly customizable with captivating icons, ad-hoc themes and wallpapers. System look is proposed and designed by the community members and also members of Frozenbox Network, who are closely following the development of this project.

Click here to download


4. DEFT



Deft is Ubuntu customization with a collection of computer forensic programs and documents created by thousands of individuals, teams and companies. Each of these works might come under a different licence. There Licence Policy describe the process that we follow in determining which software we will ship and by default on the deft install CD.

Click here to download


5. Live Hacking OS


As i am said before Live Hacking OS is also based on linux which has big package of hacking tools useful for ethical hacking or penetration testing. It includes the graphical user interface GNOME inbuilt. There is a second variation available which has command line only, and it requires very less hardware requirements.



6. Samurai Web Security Framework


The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

Click here to download



7. Network Security Toolkit (NST)


Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools. 

What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.

Click here to download



8. Bugtraq


Bugtraq is an electronic mailing list dedicated to issues about computer security. On-topic issues are new discussions about vulnerabilities, vendor security-related announcements, methods of exploitation, and how to fix them. It is a high-volume mailing list, and almost all new vulnerabilities are discussed there.
Bugtraq team is experienced freaks and developers, It is available in Debian, Ubuntu and OpenSuSe in 32 and 64 bit architectures.

Click here to download



9. NodeZero


It is said the necessity is the mother of all invention, and NodeZero Linux is no different. There team is built of testers and developers, who have come to the census that live systems do not offer what they need in their security audits. Penetration Testing distributions tend to have historically utilized the “Live” system concept of linux, which really means that they try not to make any permanent effects to a system. Ergo all changes are gone after reboot, and run from media such as discs and USB’s drives. However all that this maybe very handy for occasional testing, its usefulness can be depleted when your testing regularly. Its there believe that “Live System’s” just don’t scale well in a robust testing environment.

All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.

Click here to download



10. Pentoo


Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable live cd. Pentoo is also available as an overlay for an existing Gentoo installation. It features packet injection patched wifi drivers, GPGPU cracking software, and lots of tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches - with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.

Click here to download



11. GnackTrack


GnackTrack is an open and free project to merge penetration testing tools and the linux Gnome desktop. GnackTrack is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.

Backtrack is not only a single player in the field of ethical hacking, so you can try some other distribution as well, if you are Gnome lover than must try this, however backtrack 5 is also available on Gnome platform. Just like backtrack, Gnacktrack comes with multiple tools that are really helpful to do a effective penetration testing, it has Metasploit, armitage, wa3f and others wonderful tools.


Click here to download



12. Blackbuntu





Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security. Blackbuntu is penetration testing distribution with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10 and work on reference Back|Track.

Click here to download



13. Knoppix STD


Knoppix STD (Security Tools Distribution) is a Live CD Linux distribution based on Knoppix that focused on computer security tools. It included GPL licensed tools in the following categories: authentication, password cracking, encryption, forensics, firewalls, honeypots, intrusion detection system, network utilities, penetration, packet sniffers, assemblers, vulnerability assessment and wireless networking. Knoppix STD version 0.1 was published January 24, 2004, on Knoppix 3.2. Thereafter, the project stagnated, lacking updated drivers and packages. A release date for version 0.2 has not yet been announced. A list of tools is available on the official website.


Click here to download



14. Weakerth4n


Weakerth4n is a penetration testing distribution which is built from Debian Squeeze.For the desktop environment it uses Fluxbox.This operating system is ideal for WiFi hacking as it contains plenty of Wireless tools. It has a very well maintained website and a devoted community. Built from Debian Squeeze (Fluxbox within a desktop environment) this operating system is particularly suited for WiFi hacking as it contains plenty of Wireless cracking and hacking tools.

Tools includes: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing Android Hacking, Networking and creating Shells.



15. Cyborg Hawk


The most advanced, powerful and yet beautiful penetration testing distribution ever created. Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. It has 700 + tools while Kali have 300+ and also dedicated tools for and menu for mobile security and malware analysis . Also it is easy to compare it with Kali as to make a better OS than Kali we have to outperform it. It is a new operating system based on Ubuntu linux, i am not tested this OS that is why i placed it in the last of this list.

Cyborg Hawk is developed by Team Cybord led by Vaibhav Singh and Shahnawaz Alam from Ztrela Knowledge Solutions Pvt. Ltd.



Sunday, October 18, 2015

ISIS Hacker Gets Captured in Malaysia After Threatening U.S. Government

Ardit Ferizi, known to be the leader of the Kosovar online hacking society in which is known as “Kosava Hacker’s Security (KHS)”. This online hacker has been apprehended by the Malaysian officials, and will soon be handed over to the United States. His crimes are that of leaking personal information and terrorizing the U.S. military as well as government personnel.
Ferizi was arrested and charges put upon him for providing information and material to support ISIS. He is also charged with committing computer hacking and even releasing personally identifiably information of U.S. service members which also includes members of the federal employees.
Ardit Ferizi is going to be handed over to the U.S. attorney’s office in the Eastern District of the state of Virginia in which he will stand trial.
After hacking into the U.S. based company, Ferizi stole the Personal Identifiable Information (PII), of over one thousand U.S. government and federal employees. This may have been dramatically evaded, if Ferizi didn’t just hand over the information to ISIS as ISIS is able to use that information against those employees in which are on that list.
August 11, 2015, there was a tweet in which posted under the title “NEW: U.S. Military AND Government HACKED by the Islamic State Hacking Division!”. This tweet also contained a link to a 30-page document.
Inside of this document, there were known threats from ISIS to the employees in which stated “we are in your emails and computer systems, watching and recording your every move.”
“We are extracting confidential data and passing on your personal information to the Khilafah (ISIS’ alleged caliphate) soldiers, who soon with permission of Allah will strike at your necks in your own land,” continued from the message of the 30-page document.
The remaining pages of the document indeed contained information about employee’s names, personal information, e-mail address as well as passwords, locations and even phone numbers of the 1,351 U.S. military and government officials.
While the threat was posted on a world-wide social site, the intents of this actions is presumed to be a form of communicating with ISIS loyalists not only in America, but other parts of the world as well. This is also considered to be one of the few ways in which ISIS loyalists is able to “exchange” information to each other.
Earlier this year, the U.S. government had announced they killed Hussein in an airstrike in Syira. Hussein was a leading member of the world-known hacking group known as CyberCaliphate. This group in fact carried out mostly nuisance hacks upon the U.S. Military and other U.S. government websites as well as in France and a few other countries.
The Islamic State Hacking Division (ISHD), proclaimed they wanted the “Lone Wolf” attackers to do their biddings. They stated that the lone wolf killers would go into America and kill any of the members on the list, and the attackers where to kill them on sight. “Kill them in their own lands, behead them in their own homes, stab them to death as the walk their streets thinking they are safe” stated ISHD in the 30-page document.
The Department of Defense as well as the FBI has been encouraging their personal to exercise the OPSEC [operations security] in order to prevent measures like this from happening. However, many of the people in which are listed upon the 30-page document are also seen in articles regarding airstrikes on ISIS.
The 20-year old hacker entered the country of Malaysia in August of 2014. His mission was to pursue a degree in computer science as well as computer forensics at a college in Kuala Lumpur.
After receiving information from the FBI, the Malaysian authorities have been monitoring Ferizi for a few brief months prior to the arrest on September 15, 2015 in Kuala Lumpur.
The Malaysian authorities informed the public that Ferizi is to remain under a provisional arrest while the United States authorities obtain the proper documents for the criminals extraction to the United States.
The ISHD has broadcasted their attacks as well as plagiarize the security defense of other websites and departments including an Australian airport website. The ISHD said they have not started the cyber war at this time, however the time of the cyber war is near. This group also stated that the security information is in their hands. As if they are “toying” with us on an emotional level in attempts to scare us into surrendering. Later on, ISHD has stated that we will not have any control over the internet and that we will see how they will control the electronic world.

This Article (ISIS Hacker is Captured in Malaysia after threatening U.S. Officials!) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.

Microsoft: Free Windows 10 Upgrade Comes With 10 Years of Free Updates



Windows 10 is one of most talked about topics on various online forums. Microsoft is leaving no stone unturned to achieve its goal of 1 billion Windows 10 devices. But, free Windows 10 for real? Well, for how long?

According to an update to the Windows Lifestyle Fact Sheet, Microsoft has said that free Windows 10 comes with ten years of free support. In its update, Microsoft has said that it will provide “mainstream security” support until 2020 and “extended security” support until 2025.

However, this 10 years free update offer doesn’t apply to the Windows 10 Enterprise users. But, everyone else, once done with the upgrade process, can literally forget about the updates.
When I ask you to “literally” forget the updates, I mean it. Because, if you are an everyday Windows 10 user, you don’t have the option to avoid Windows 10 updates as they will be pushed to your system without your consent.
windows-free-10-years-update-
Explaining the free Windows 10 upgrade and support cycle, Microsoft says that it will offer a five-year mainstream support to the users that will start from the coming July 29. The other five-year support will be an extended support that will follow the mainstream support. Redmond made it clear that there won’t be any hidden or extra fee involved. However, so features will also depend upon your system hardware. 
But, even if your OEM gives up your device support, free Windows 10 upgrade will still continue to get important security fixes and updates.
Tuesday, October 13, 2015

How Mark Zuckerberg’s Facebook Pays Less Tax than You?

Pageviews

Followers

Blog Archive

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -