Posts

Image
  Now you can read deleted WhatsApp messages by the sender Many a times the sender sends message and immediately delete them. That is really irritating but now you can read those messages following this simple method. In 2017, WhatsApp introduced the 'Delete for Everyone' feature, allowing users to delete messages within 2 days of sending them. This feature is actually helpful in rare circumstances at the same time this can lead the receiver in frustrating situation. Most common method to recover deleted WhatsApp messages is to regularly back up your data and restore messages from an earlier backup. Go to WhatsApp Settings > Chats > Chat Backup and look for an earlier backup that contains the deleted messages. However, this method can be an annoyance because you need to uninstall your WhatsApp and reinstall it, in backup you can get to read all those deleted message by the sender.   deleting the app and logging in again to run the backup. Recover WhatsApp Messages

Hacktivism Vs Terrorism

Image
H acktivism is the act of hacking, or breaking into a computer system, for a politically, socially or motivated by a criminal purpose. The intentions behind hacking are nothing but to harm and damage. The individual who performs an act of hacktivism is said to be a hacktivist. There are many such scavengers are around who never forget to boast their skills of hactivism. Globally there are 4,00000 community of black hat hackers, out of which 70 percent are students and between the age group of 20 to 25, 18 percent are between the age group of 15 to 20, 2percent are above the age of 30, 10 percent are grey hat hackers. And this population is of hactivists. (Read this beautiful research report in Cyber Terror) from this population 22% are only Indians,10 % from Pakistan ( details of these hactivists with pictures, code name, their addresses, and much more read in Cyber Terror) A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring a

Love and Social Engineering

Image
A love story on social sites is quite a common game. And, especially in the hackers zone this works like a miracle. Love is literary, philosophical, or some would even say metaphysical. In the history of malware, love is a virus writer whim and a well-known cybercriminal social engineering technique. Social engineering, a non-technical breach of security that relies heavily on human interaction and tricks users into breaking normal security measures, remains popular among virus writers. LoveLetter was one of the first, and most notable, examples of social engineering. It arrived as an attachment to an innocent looking e-mail containing the subject line 'I LOVE YOU' (and who doesn't like to receive a love letter?) and the body text 'Kindly check the attached LOVELETTER coming from me'. In an effort to put unsuspecting users further off their guard, the attachment had a double extension, LOVE-LETTER-FOR-YOU.TXT.vbs. Since Windows Explorer doesn't show extensions b

Sextortion on Cyber Space: New Technique of Blackmail & Threatening Young People

Image
Sextortion on Cyber Space: New Technique of Blackmail Threatening Young People Who’s watching your child on her or his PC Webcam -- just friends? Don't be too sure. Age-old crimes take on a new twist in the cyber-world of today. Not least of these is “sextortion,” where in a recent high-profile case, the FBI uncovered 200 victims in just one incident, many of whom were young or even underage. As a term, sextortion has been around longer than most of us probably realize and way before the Web was around. An early use of the term was in a headline of a 1950 article, but no one can be in any doubt that sexual extortion itself has even older origins. In the cyber-world of today, however, sextortion appears to have reached a whole new level. It is perpetrated through a form of social engineering, wherein enough information can be gathered about an individual to hold that victim to ransom. Social networking makes compromising situations easily available to those searching. In the FBI

Search Engine Optimization Secrets Tips & Tricks: Download Free Ebook

Image
SEO For 2010: Search Engine Optimization Secrets lulu.com| 2009 | ISBN: 0557161339 | MOBI, PDF | 252 pages | 31 MB A very well-designed web site is useless if no one can find it on the web. If your company is going to succeed on the web, optimizing your site for search engine visibility is a must. Especially since it is the telephone book of the now, not the future. This book is written by the two most noted and accomplished experts in the field of search engine optimization (SEO) and provides you with proven guidelines, cutting-edge techniques, tips, and the how-to's for planning and executing a comprehensive SEO strategy.This is the first book to cover the Bing search engine in-depth. It tackles how to submit your website to the search engines, basic to advanced optimization techniques, learn how to determinetrophy keywords, keyword density, little known tricks and methods pros use, learn how to increase your rankings, and learn from those who started the entire SEO industry.Thi

IBM uncloaks 20 petaflops BlueGene/Q super

SC10 Although everybody seems to be excited about GPU-goosed supercomputing these days, Big Blue is sticking to its Power-based, many-cored BlueGene and Blue Waters massively parallel supers, and revving them up to bust into the 20-petaflops zone. The Blue Waters massively parallel Power7-based supercomputer and its funky switching and interconnect, and very dense packaging were the big iron of last year's SC09 event in Portland, Oregon, which El Reg told you all about here. And we've covered the GPU additions to the iDataPlex bladish-rackish custom servers IBM builds, as well as the forthcoming GPU expansion blade for Big Blue's BladeCenter blade servers, which are due in December and which are also special-bid products.But the BlueGene/Q super — made of fleets of embedded PowerPC processor cores — is still, in terms of aggregate number-crunching power, the biggest and baddest HPC box on the horizon from IBM for the next two years.IBM lip-smackingly announced the sale of t

Big Security Hole in GOOGLE

Image
Update: The site is now down. Here’s what it looked like: Facebook would probably just consider this a feature, but the rest of us will definitely consider this a big security hole. The creator of http://guntada.blogspot.com (don’t visit that site just yet) emailed us this morning to explain. If you’re already logged in to any Google account (Gmail, etc.), and visit that site, he’s harvested your Google email. And proves it by emailing you immediately. And it even works in “incognito” mode (also known as porn mode). What is the exploit? We don’t know, and Google has yet to respond to us about it. We note that the site doing the exploiting is on Google’s own blogging platform. One developer we spoke with was confused as well, saying: i have no idea what this is exploiting but there’s a decent chance it has something to do with Friend Connect and the way it passes data between iFrames (ie yes, it very well could be opensocial related). whatever is going on it’s an extremely serious secur