Archive for 2016

What Code Should You Learn in 2016?

what-code-you-should-learn-2015Why you should learn to code?

Apple Founder Steve Jobs once said in an interview: “I think everybody in this country should learn how to program a computer because it teaches you how to think.”
With the changing environment around us and the inclusion of computers in our personal space, technology and computers are now an integral part of our lives. Learning how to code shouldn’t be looked upon as applied sciences and math because it shows us a path to solve life problems and process our thoughts.
This isn’t just a career making skill, but it’s also an in-demand job skill. If you are proficient in your field and having technical knowledge of your subject, learning how to code can empower you to become different and get more attention.
Learning code is now easier than ever. There are so many free and open platforms waiting for you to come and join them. Considering the fact that the average salary of a computer programmer touched an all-time high of $100,000 last year, learning and mastering a language isn’t a bad idea at all.

What Code Should You Learn?

Today I am sharing an enriching infographics by WhoIsHosting. This telling you about the multiple choices you face as a beginner. Take a look and don’t forget to check the best deals on e-Learning courses at the bottom of the post:
learn to code
  
Thursday, May 19, 2016

Microsoft Will Integrate Ubuntu Linux In Windows 10



Microsoft Will Integrate Ubuntu Linux In Windows 10
Somethhing amazing was happened on the first day of Microsoft’s Build Developer Conference 2016, where Microsoft announced that “MICROSOFT WILL INTEGRATE UBUNTU LINUX IN WINDOWS 10”.
Microsoft Will Integrate Ubuntu Linux In Windows 10
Recently the BQ company has put on sale, the first tablet with UbuntuTouch OS in the world, and previously also opted for smartphones. But in the ‘Desktop World’, considering desktops and laptops, Ubuntu takes many more years of filming and has been raised for years as one of the GNU / most interesting Linux as an alternative to desktop users of Windows. Now, Microsoft is very close to the integration of Ubuntu within its own computer operating system, Microsoft Windows 10.
Microsoft’s Kevin Gallo on stage at of Build Developer Conference 2016 said that “The Bash shell is coming to Windows. Yes, the real Bash is coming to Windows, This is not a VM. This is not cross-compiled tools. This is native,” he also added that “We’ve partnered with Canonical to offer this great experience, which you’ll be able to download right from the Windows Store.”
According to the agreement with Canonical, it will allow Windows 10 users soon to run Ubuntu and Windows 10 simultaneously on their computers, not as a virtualized operating system. However, as a part of the native libraries of Windows 10, which is not expected to be available for the users who has the Unity interface, since a change would be more focused on developers.
The interesting thing is the integration is the ability to use tools such as BASH Shell and Terminal desktop operating system Ubuntu, beyond user functions by passing own system interface. Thus, while keeping intact the own interface in Microsoft Windows 10, without possibility of loading the elements of Ubuntu, would mean the complete integration of Linux within Windows 10 and in addition to the hand of one of the most recognized distributions.
According to this movement, on the other hand, Microsoft would have a strong support for the development of their tools of cloud computing, and will have support of a truly broad community to work in software solutions on its operating system. And what is not clear at this point, whether Ubuntu would remain available also independently, as before it was, or this integration would end installable distributions of Ubuntu.



Friday, April 1, 2016
Tag :

Crypto Ransomware Found On EC-Council Website That Runs A Certified Hacker Program



A ransomware was found on the official website of EC-Council that runs Certified Ethical hacker program. After EC-Council did not reply to Fox-IT in the context of the malware injected in their site, Fox-IT decided to go public with this news, the excerpt of which can be read at the end of this blog post.

The website http://iclass.eccouncil.org/, the official website of EC-Council, a new Mexico-based professional organization that runs the Certified Ethical Hacker program, the nemesis of a malware was found this Monday.

Shortly after the malware was found, researchers from security firm Fox-ITnotified EC-Council officials found that one of their subdomains was under the influence of a schemer who had injected angler, a toolkit that provides powerful Web drive-by exploits.

                                 A redirect was embedded at the bottom of the page as seen in this screenshot
Angler toolkit first appeared in late 2013. Since then, it has significantly grown in popularity in the cyber underworld. Angler toolkit evades detection by changing the variations of the various components it uses (HTML, JavaScript, Flash, Silverlight, Java and more).

On Thursday, after receiving no reply from the EC-Council and still seeing that the website was infected, Fox-IT published a blog post showing that the company had failed to respond them.
                      The ransom note presented to instruct the victim on ways to recover files
Unlike other drive-by attacks, this one is very hard for the researchers to replicate. Moreover, this exploit only targets the visitors using Internet Explorer and only when they come to the site from search engines like Google, Bing, Yahoo etc. Even though these conditions are met, people from certain IP addresses from certain geographic locales are also spared.
Here is an excerpt from the Fox-IT team:
Through this embedding the client is redirected a couple of times to avoid/frustrate/stop manual analysis and some automated systems. Once the user has jumped through all the redirects he/she ends up on the Angler exploit kit landing page from which the browser, flash player plugin or Silverlight plugin will be exploited. The Angler exploit kit first starts the ‘Bedep’ loader on an exploited victim machine which will download the final payload. The way the redirect occurs on the EC-COUNCIL website is through PHP code on the web server which is injecting the redirect into the web page. A vulnerability in the EC-COUNCIL website is most likely exploited as it runs the very popular WordPress CMS which has been a target through vulnerable plug-ins for years.


Monday, March 28, 2016

How Lack Of Human Resource Is Threatening The Cybersecurity Realm


Maintaining a Cybersecurity department is the need of the hour for the companies. Human Resource has a major impact on the Cybersecurity and it can be perceived from the situation that there has been a decline in the number of recruitments due the lack of skillset and talent, despite the numerous high-salary job opportunities.
We are humans and using us to accomplish a goal is called Human Resource (HR). The topic concerning to maximize the potential of Human Resource has been prevalent and to my utmost concern, the human race has to input heavy efforts in order to pace up with industry’s increasing talent demands.
Cybersecurity – one of the major fields where the human resource is losing its credibility – is for protecting computer hardware, software, and information stored from potential attacks like DDoS, phishing, tampering, and many more. But in recent years, humans appointed in the Cybersecurity field have shown an acute lack of determination, when it comes to acceptance of new skills as well as consistency in a rapidly changing atmosphere, that requires an individual to remain up-to-the-minute with latest practices and technological trends in the Cybersecurity space.
In a keynote presented by Mathew Rosenquist, a Cybersecurity Strategist at Intel Security, he focussed on how Human Resource is playing a pivotal role in shaping new age Cybersecurity workforce. Despite enormous efforts made by various Cybersecurity organisations and the “digital security field outpaced IT positions by double and twelve times the rate of the overall job market”, it is easy to decipher the situation that a qualified workforce is like a day dream for the security industry, with an estimate of 2 million unfilled positions by the end of 2017.
While speaking at the ICT Educators Conference this month, Rosenquist emphasized on how the current education system can upgrade its course structure by introducing a formal degree program for CyberScience related syllabi. He also discussed that the sole focus on training an individual to acquire proper knowledge and unvarying skill set will help the individual to be an efficient and reliable Human Resource.
Another side of the coin is the diversity of workforce required in the Cybersecurity workspace. There is a rising demand of people with varying interests and capability to think “out of the box” in tricky environments. Rosenquist discussed Intel’s continuous efforts to diversify its workforce, be it on ethnic, gendered, or based on skill level. Intel has plans to invest $300 million for that purpose.
It is a great example of how a corporation can make a difference in the hiring, progression, and retention of a diverse workforce, contribute to building a sustainable flow of talent, and directly support other organizations doing the same.John Pescatore, Director of emerging security trends at SANS Institute
The keynote (presented at ICT Educators Conference) briefs the effectiveness of diverse workforce when it comes to solving problems, finding an error and showing creativity. An individual can take advantage of the competitive hiring process, exposure to executive levels, and significant salary bumps with an average inflation of $12000 than any other computer field.
Intel’s Diversity In Technology Initiative
Intel flagged off its Diversity and Inclusion initiative in January 2015 with a goal to represent a completely diverse workforce by the end of the year 2020. The company will utilize its resources to increase the percentage of women and underrepresented minorities.
According to the Diversity in Technology mid-term report published on May 12, 2015, in the first half of the year 2015 Intel managed to outperform its predefined goal of 40% – 1275 diverse employees out of a total of 2944 hiring in the United States which account for 43.3% – by the mid-year. Exploring the diversity of the workforce yields 35.2% (1035) women, 4.7% (139) African American, 7.5% (222) Hispanic, and 0.3% (9) Native American.

Intel is determined to work on the following key programs:

Achieve full workforce representation through focused hiring and retention programs.

In December 2014, Intel’s US workforce comprised of 23.5% (11386) women employees which increased to 24.1% (12916) by the end of July 2015. A similar increase was observed for African Americans, Hispanics, and Native Americans.
Intel maintains a Diversity Dashboard which is used to keep an eye on the number of new hires and fires to track the progress of women and underrepresented minorities. The Dashboard is regularly synchronized across all Intel divisions and regularly shared with the CEO, VPs, and the executive team.
In the case of leadership roles, by July 2015, the workforce representation was 17.1% (68) for women and 6.0% (24) for underrepresented minorities.
To balance hiring, we have increased focus on advancing our inclusive culture by utilizing fair processes and practices, such as rigorous reviews of annual appraisal parity and pay audits, as well as by increasing investments in our manager and leader capabilities to ensure that the unique skills and experiences of our entire workforce are fully leveraged.
— the report says.

Grow the pipeline of technical talent for the industry at large:

Intel will invest an amount of $5 million over the next four and a half years as per an MOU signed with Oakland Unified School District. The funds will be utilized to improve the number of Computer Science and Engineering graduates by boosting the number of students from 100 to 600. Intel will put forward its efforts to bring volunteer participation of its employees to accomplish this goal in addition to offering employment options to technical graduates from the Oakland district.

Improve diversity in our supply chain and vendors:

With plans to focus on Indirect Service Segment, Intel eyes an approximate investment of $600 million in order to satisfy its intentions to improve supplier diversity. Further aid will be accomplished by performing a collaborative operation with Capital Partners, thereby, increasing technology sector representation in terms of diversity and inclusion.

Invest in diverse entrepreneurs of emerging technologies:

A $125 million Intel Capital Diversity Fund is aimed at rising technology startups which come under the eligibility criteria of a woman or an underrepresented minority as the CEO or founder, or having, at least, three women in leadership roles. The fund announced on June 9, 2015, has been utilized to power Brit + Co, Care Cloud, Mark One, Venafi.
Intel Captial was founded in 1991, and since then, it has been a cash card to around 1400 companies spanning over 57 nations with the total investment amounting to $11.4 billion.
We are proud to take a leading role toward broader participation in technology entrepreneurship and employment. With this new fund, Intel Capital is committed to investing in the best talent from a myriad of backgrounds to cultivate innovations that serve the needs of a diverse public.
— said Intel Capital MD Lisa Lambert, who is leading the Intel Capital Diversity Fund.

Support women in gaming:

Gaming is not considered as a woman’s deal and they don’t contribute much to the male dominated International Game Developers Association (IGDA). Intel made an attempt to make justice with their Diversity in Technology initiative by sponsoring Gamescom, E3, and Nordic Games conferences in addition to creating the game-design seminar for girls titled as Intel Two5Six Scholar Program.
There are some female warriors in the gaming realm such as Katherine Gunn aka Mystik is an American professional gamer who has bagged credits in the Guinness Book of World Records 2016 Gamer’s Edition. She won the second season of WCG Ultimate Gamer in 2010 and is famous for DOA4 and HALO: Reach.

The Crisis Situation

If we time travel four or five years back, the technology companies were not that much concerned about the security aspects, the Cybersecurity division was often included under the IT department. But the pace of time has forced them to think about a separate security division, which is the need-of-the-hour.
“This has resulted in increased salaries and a shortage of qualified [staff for] small to medium enterprises in the marketplace,” – says Douglas Saylors, Director at Information Services Group (ISG) based in Stamford, Connecticut.
One out of the hundreds of concerns faced by Cybersecurity firms is finding talented employees. However, the fact can’t be denied that the complicated and tedious recruitment process poses as an imminent cause to increased number of unfilled positions. Hence, an intelligible perspective should be displayed upfront for a potential recruit.
Talking about the training and skill set aspect, does it really matter?
Intel’s $300 million investment to transform the academia is a clear long-shot but if we have to make a decision on a short-term notice, the lack of skilled workforce and above that, untrained employees may act as a cause to the unreliable future of cybersecurity space dealing with digital attacks every now and then.
The reason so many enterprises need more security people is because they are doing basic things wrong in IT — not keeping up with patches and misconfiguring things.John Pescatore, Director of emerging security trends at SANS Institute
Companies based in the United States often try to lure brains residing in India and other parts of the world, with their H1B VISA schemes and hard cash salary packages. But that’s not a fool-proof solution for the future of this vast field, which is finding it hard to fill the security professional chairs.
These companies should understand the value of proper training, and understand that IT professionals often lack a broader perspective of the Cybersecurity space.This will allow the transformation of the current networking staff into security specialists after proper training. An internal evaluation that would acknowledge the companies whether their security experts can deal with up-to-the-minute cyber-threats is a must.
Write your views in the comments section below.
Thursday, February 4, 2016
Tag :

How To Change Processor Name Permanently



A while ago on Tweak And Trick, I published an article on changing your processor name. But recently, SEO Maseed pointed out that the trick only changed the name temporarily.

After a user restarts his computer, the


name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not have permanent results.

Thus, the alien processor name you had earlier again reverted back to the boring old one.

Problem: To, make the name change permanent, it was required to update the Processor Name String registry key every time Windows starts.

Solution: It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the Windows start up folder. To do so, just follow the steps given below:-


Steps :-

1.  Open Notepad.

2.  Copy and paste the exact code given below:-

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
    "ProcessorNameString"="My Processor name 50000MHz"

To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Open the Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in the Save as Type option. Save the file as ProcessorNameChange.reg or *.reg.

4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.


5. Copy the created Shortcut file.

6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or toC:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.)  if C: is your System drive.

7.  Paste the copied file.


This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. This means that even upon restarting your computer, you will see that the changed processor name is permanent. -

How to Convert Scanned PDF and Images to Text Using Google Drive


Last month I felt the need to convert some image to editable text, so I searched the web and came across few converters/software. But, none of them were free and they asked for a good amount of money. This conversion is performed using Optical Character Recognition Software (OCR).
Today in the morning, I was doing some work on Google Drive and I clicked on a feature which kind of made my day. Actually, Google Drive provides the OCR software for free and you can use it to convert your image files to text.

Convert Images to text using Google Drive:

Before you proceed, make sure that on the image to be used, there is some text; so that it could be converted using OCR. This can also be used to convert PDF files to text for free.
Take a look at these simple steps:
  1. Visit Google Drive Website and login using your Gmail account.
  2. Now click on the New button and select File Upload to upload the image you want to convert. The image can be of any format. Here I have used a screenshot of my website homepage as the image.
  3. After finishing up the upload, right click on the image file and go to Open With > Google Docs.
  4. Now the new tab opens with the image at the top and editable text below it. You can edit the text and resize the image here.
  5. You can either delete the image and save the remaining text and close the tab. Now in you’ll see the Google Document with converted text beside the image file.
  6. Now you are all done and you can edit the image or download in PC to edit.

Points to be noted:

  1. Image should be less than 2 MB in size.
  2. Your converted text may have mistakes in it, so check it before using somewhere.
  3. For PDF files, only first 10 pages are converted to text. If you have a large PDF file, instead of opting for a one-time conversion, go for step-by-step conversion of 10 pages.
Monday, January 11, 2016

How To Cancel A Sent Email in Gmail



In this network more than billions of people are sending and receiving emails daily. But i have a new trick for you for gmail which is How To Cancel A Sent Email in Gmail.
Gmail is the giant mailing network by Google that allows user to send/receive emails and also provide cloud storage space also. Yes you can cancel the email that you have sent to anyone on gmail. Sometime you accidently or intentionally mail to anyone then in that case it feels very embarrassing so at that time you can cancel the sent mail. Just follow up the below method to proceed.

How To Cancel A Sent Email in Gmail

This feature is a part of gmail and you can use this feature to cancel the email that you had sent. You just have to follow some of simple steps that i have discussed below.
  1. First of all login into your gmail account in which you want to cancel the mail.
  2. Now at the right top corner you will see setting option. just click on it.
  3. Now in the drop down list select settings.11
  4. Now under the setting tab you will see the section Labs just click on it.12
  5. Now scroll down and enable the Undo Send button there. As this will enable undo send feature of your account.13
  6. Now at bottom click on the save button.14
  7. Now gmail will give you 10 seconds to undo every email when it is sent, but you can change this time in settings->general->undo send->cancellation period and set it to maximum of  seconds.
  8. Thats it everytime you send the mail it will dislay 10-30 seconds to undo the sent email.
So above is method for How To Cancel A Sent Email in Gmail. By this you can easily avoid sending some mails that you actually don’t what to send but you send them accidenlty at that case this method will be very helpful. Hope you like the post, don’t forget to share this cool post with your friends and leave a comment below if you need our help at any step.
Sunday, January 10, 2016

Mark Zuckerberg’s Messenger vs. Your Phone Number – Who’ll Be The Winner?



On January 7th, Facebook CEO Mark Zuckerberg posted an infographic on his Facebook page announcing that Facebook’s messenger app is being used by 800 million users every month. While this could seem a big number to many, I wasn’t surprised at all. We are constantly online and Messenger has become a part of your digital lives. But, this hasn’t happened on its own — it’s a result of the perfect execution of a long-term strategy by Facebook. 
When Facebook bought WhatsApp after signing a multi-billion deal, many people compared it with Facebook’s own IM service Messenger. But, Facebook has constantly worked to draw a differentiating line between the two. Last year at its F8 conference, Facebook announced that it’ll be developing Messenger as a platform while WhatsApp will be a simple app that’ll continue to focus on make texting and calling a better experience.
In 2015, Facebook made significant changes in Messenger that included video calling, ability to customize conversations with emojis and stickers, updated location sharing, money sharing and a lot more. In his Facebook post, Zuckerberg tells his own story — “It’s an important part of how I run Facebook and keep in touch with my friends and family. I use Messenger to quickly get information from engineers to make decisions. I also message a lot with Priscilla every day and probably use way too many stickers.”
Messenger is one of the top priorities of Facebook in 2016. The company swears to work hard to bring to you more and more ways to communicate with your friends and family. Facebook has already started testing M, its own digital virtual assistant. In his latest blog post, company’s VP of Messaging Products, David Marcus has urged you to do everything the Facebook’s way — as if pushing Free Basics down people’s throat wasn’t enough.
First let’s set some context. Think about it: SMS and texting came to the fore in the time of flip phones. Now, many of us can do so much more on our phones; we went from just making phone calls and sending basic text-only messages to having computers in our pockets.David Marcus, VP of Facebook Messaging Products
facebook messenger
Thanks to the endless number of messaging apps, we have arrived at a point where we don’t remember phone numbers and contact details of other people. With its Messenger app, Facebook is working to eradicated your phone numbers altogether.
Last year, Facebook decided that it will now give its users an option to use sign up for the Messenger without needing a Facebook account. With Messenger, now you can make calls to a person without needing to know someone’s phone number.
“With Messenger, we offer all the things that made texting so popular, but also so much more. Yes, you can send text messages, but you can also send stickers, photos, videos, voice clips, GIFs, your location, and money to people,” Facebook writes in its blog post.
While using WhatsApp to make money isn’t Facebook’s top priority at the moment, Facebook is working hard on Messenger to open a new revenue stream for a long time growth.
Slowly and gradually Facebook is looking to take over your entire phone — wait for it — it’s just a matter of time.
Images: Facebook
Saturday, January 9, 2016

Pageviews

Followers

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -