Monday 15 October 2018

How to Secure Your Account(BitCoin)

Before reading this post you must have complete all the necessary steps from post one here.http://techymania.website/how-to-get-your-first-bitcoin-2/

Secure Account
Step 1:
Click Security Center on the left side of the page



Step 2:
1. Click mobile verification and your mobile number
2. Get one time password on mobile and enter it on the web page



Step 3:
1. Click two step verification
2. Again received one time password and enter it







Step 4:
Click Settings and you can see Auto logout timing on downside, can change it
Share:

How to Get Your First (BitCoin)

Open Bitcoin Account
Step 1:
Go to website- https://blockchain.info/wallet/#/



Step 2:
Click – Create new Blockchain Wallet and Fill the details (Remember email and passwords)



Step 3:
Get Started



Step 4:
Click –Start Receiving Bitcoins



Step 5:
1. Copy the Bitcoin Address like this-1PnSjJtAaAEe4gpA6aenA6hQAvDt4ckRnX
This Bitcoin Address like the bank account number. So don’t forget it.
2. Check your email and Click Conformation link



Step 6:
1. Click OK
2. It will show your wallet id and ask for password



3. It is important to note down this wallet id (d2c2ycfc-9fee-4dc0-bdcf-61e6d6d29e7d).
This like your name on the bank account



4. Enter password and Click signin
5. Top it will shows some popup. Need again verify your email account



Step 7:
Check your email account and Click verification link





 
Share:

Block-Chain (What You Need To Know)

What is Blockchain?
As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a Bitcoin wallet on your computer or mobile phone, it will generate your first Bitcoin address and you can create more whenever you need one. You can disclose your addresses to your friends so that they can pay you or vice versa. In fact, this is pretty similar to how email works, except that Bitcoin addresses should only be used once.
Balances - block chain
The block chain is a shared public ledger on which the entire Bitcoin network relies. All confirmed transactions are included in the block chain. This way, Bitcoin wallets can calculate their spendable balance and new transactions can be verified to be spending bitcoins that are actually owned by the spender. The integrity and the chronological order of the block chain are enforced with cryptography.
Transactions - private keys
A transaction is a transfer of value between Bitcoin wallets that gets included in the block chain.
Bitcoin wallets keep a secret piece of data called a private key or seed, which is used to sign transactions, providing a mathematical proof that they have come from the owner of the wallet.
The signature also prevents the transaction from being altered by anybody once it has been issued. All transactions are broadcast between users and usually begin to be confirmed by the network in
the following 10 minutes, through a process called mining.
Processing - mining
Mining is a distributed consensus system that is used to confirm waiting transactions by including them in the block chain. It enforces a chronological order in the block chain, protects the
neutrality of the network, and allows different computers to agree on the state of the system. To be confirmed, transactions must be packed in a block that fits very strict cryptographic rules that
will be verified by the network. These rules prevent previous blocks from being modified because doing so would invalidate all following blocks. Mining also creates the equivalent of a competitive lottery that prevents any individual from easily adding new blocks consecutively in the block chain. This way, no individuals can control what is included in the block chain or replace parts of
the block chain to roll back their own spends.

 
Share:

BitCoin (Some Alternatives)

Best Alternatives
Litecoin
Price: $25.26
Market Capitalization: $600 million
Of all the competing cryptocurrencies, Litecoin is the most similar to Bitcoin. It has been thought of as silver to Bitcoin’s gold, or MasterCard to Bitcoin’s Visa. It has also managed to gain the second-highest market capitalization amongst digital currencies. One key difference includes a different hashing algorithm designed so that mining Litecoins won’t result in a similar hardware arms race to the one Bitcoin is currently involved in. Litecoin mining these days involves rigs of video cards, or GPUs. It’s similar to how Bitcoin mining was a few years ago, until its ASICs (application-specific integrated circuits) were designed from the ground up to mine Bitcoins. Litecoins also feature faster confirmation times due to shorter and faster block rewards. It’s scheduled to produce 84 million Litecoins, four times as much as Bitcoin’s 21 million.

Peercoin
Price: $6.26
Market Capitalization: $131 million
Peercoin’s distinguishing feature is that is uses a method called proof of stake as part of its mining, or as Peercoiners often like to say, “minting.” Proof-of-stake rewards minters for the Peercoins they hold over time. This is measured in “coin days,” one coin day being equivalent to holding one coin for one day. It’s similar to how a kilowatt hour is defined as using a kilowatt over the course of one hour. So the more coins you hold over a longer time, the more Peercoins you receive through minting. This is in contrast to most
cryptocurrencies’ proof-of-work mining, which rewards miners based on how much computing power they contribute to the keeping track of transactions. Peercoin also uses proof-of-work mining in conjunction with proof-of-work minting, although Peercoin is programmed to eventually rely only on proof-of-work mining.
The maximum limit for the number of these coins is 2 billion. This is so much higher than Bitcoin’s 21 million that it encourages inflationary pressure, which counterbalances the deflationary pressure caused by everyone trying to mint Peercoins and holding onto them.
NXT
Price: 4.1 cents
Market Capitalization: $40 million
Nxt is most similar to Peercoin in that is utilizes proof of stake to generate more coins. But unlike Peercoin, it uses proof of stake exclusively. The only way to get more Nxt coins is to hold them or exchange them in a process dubbed “forging,” in contrast to Bitcoin mining and Peercoin minting. This has a “green” appeal in that it requires no massive, power-consuming hardware rigs, just a small program that will run on pretty much any modern computer. This also has the practical appeal of not requiring users to invest in the extra hardware and electricity. Instead, you merely exchange something for your initial Nxt coins. Nxt’s developers also pride themselves on having written the Nxt code from scratch, while most alternative cryptocurrencies were developed from using Bitcoin’s code as a basis.
Namecoin
Price: $6.73
Market Capitalization: $52 million
Namecoin is similar to other cryptocurrencies, but with the additional feature of being a way to register domain names. Instead of .com or .net, Namecoin domain names have the .bit extension. Any method of registering and controlling a domain name is called a domain name system, or DNS. The current method of domain name registration is regulated by a nonprofit organization called the Internet Corporation for Assigned Names and Numbers, or ICANN. Because ICANN is a centralized organization, it ultimately has power over domain names and can shut down websites for political or other reasons. But because Namecoin is a decentralized network, no one is in control of it. Just like Bitcoin is a decentralized network that takes the power away from banks and other financial institutions, Namecoin is a decentralized network that takes the power away from ICANN or any other centralized DNS organization. Namecoin is also traded for its own sake, just like Bitcoin. It’s just like any other cryptocurrency but with the added feature of a decentralized DNS system, which amounts to more “intrinsic value,” which everyone is looking for.
Dogecoin
Price: 0.045 cents
Market Capitalization: $11 million
Dogecoin is a cryptocurrency inspired by the “Doge” Internet meme. Compared with the other cryptocurrencies, Doge is most similar to Litecoin. It uses scrypt, the same cryptographic function as Litecoin. A total of 100 billion Dogecoins will ever be mined, which is even more than Peercoin. Yet because the block reward is so large and frequent (every minute), Dogecoin miners have already mined almost 25 billion Dogecoins, almost 25% of the total. While Doge gets my vote for the best Internet meme of 2013, you would think that a cryptocurrency wouldn’t manage to go far based on novelty. Yet Dogecoin’s market capitalization is almost $7 million.
Share:

BitCoin (Things You Need to Know)

Special About the Bitcoin System:
The Bitcoin is a system which allows you to do anonymous currency transactions and no one will come to know about the payment or about all other info related to the payment, including who sent it, who received it, etc.
Satoshi did it by making the system – a peer-to-peer network – controlled by no central authority but run
by a network of contributors and freedom enthusiasts, who donated their time and energy to this innovation.
Essentially, people can do money transactions and no authority or organization will come to know about it.
Satoshi Nakamoto was so talented that he even solved the problem of double spending of digital currency
in his system.

Double Spending:
We can make many copies of digital data, e.g. people copy software and sell it as counterfeit or pirated
copies. We may face the same problem with digital currency – one can copy the digital currency (let’s suppose USD100) and use it as many time as he/she like (as many notes of USD100). Satoshi solved this problem by showing all transactions in a public list. Whenever a new transaction is made, its validity is checked by confirming from the list that the digital currency was not used before. This way, no one can copy the currency and use it for more than one time. It’s a simple but effective idea to stop double spending of the same bitcoin.

Anonymity:
The public listing only shows the transaction ID and the amount of currency transferred. You will be anonymous in the system because you don’t need to provide any of your personal details like your name, address, email, phone number, etc. In comparison, when you use payment gateways like Paypal you have to give up all these personal details.
Using of Bitcoin:
Bitcoins are kept in a digital wallet which you can keep in your computer, or on a website online, which
will manage and secure your wallet for you. You can have as many wallets and bitcoin addresses (where you receive money from others) as you like. What’s more, you can use Bitcoin software on top of Tor to prevent anyone from tracking your IP address – total anonymity guaranteed!
Total Bitcoins:
At this very moment, 10.71 million Bitcoins are in existence, which is like 207.929 million USD worth!
In fact, the Canadian government is working on their own crypto-currency, named MintChip. (a glance:)
Mintchip, In one day, more than 45,000 transactions of a total of BTC 2.5 million (worth of USD48.5
million) is handled by the bitcoin network.
Spend Bitcoins:
Spending Bitcoins is a bit easier. You can send Bitcoins to a person, buy goods, or donate to non-profit foundations who accept it, such as Wikileaks, P2P Foundation, Operation Anonymous, Free Software Foundation, Archive.org.
You can send Bitcoins to anyone once you know their bitcoin address.
For merchandise, you can buy products from merchants that accept Bitcoins. Example – BitcoinDeals.
Share:

BitCoin History (What You Need To Know)

He is said to be from Japan but his mail ID was from Germany, plus the bitcoin software was not available
in Japanese. He developed the system and the Bitcoin software (that is used to run the system) in 2009 but disappeared into thin air in 2010. The other developers of the system stopped hearing from him in 2010, and plenty of speculation turned up about his real identity. Some even suggested that his name was just a mashup of popular Japanese companies — SAmsung TOSHIba NAKAmichi MOTOrola. But what he created was definitely the fantasy of every tech guy in the world.
2007, Satoshi Nakamoto
According to legend, Satoshi Nakamoto began working on the Bitcoin concept in 2007. While he is on record as living in Japan, it is speculated that Nakamoto may be a collective pseudonym for more than one person.
August 2008, An interesting patent application
Three individuals, Neal Kin, Vladimir Oksman, and Charles Bry file an application for an encryption patent application. All three individuals deny having any connection to Satoshi Nakamoto, the alleged originat or of the Bitcoin concept. The three also register the site Bitcoin.org in the same month, over on anonymousspeech.com – which allows people to buy domain names anonymously.
October 2008, The White paper is published
Despite the above, Satoshi Nakamoto releases his white paper, revealing his idea for a purely peer-to-peer version of electronic cash to the world. In his vision, he manages to solve the problem of money being copied, providing a vital foundation for Bitcoin to grow legitimately.
November 9, 2008, The Bitcoin Project hits SourceForge
The Bitcoin project is registered on SourceForge.net, a community collaboration website focused on the development and distribution of open source software.
January 3, 2009, The Genesis Block is mined
The first block, nicknamed ‘Genesis’ is launched allowing the initial ‘mining’ of Bitcoins to take place.
Later that month, the first transaction takes place between Satoshi and Hal Finney, a developer and
cryptographic activist.
January 9, 2009, Version 0.1 is released
Version 0.1 of Bitcoin is released. Compiled with Microsoft Visual Studio for Windows, it lacks a command line interface and is so complete that it furthers speculation that it was developed by more than one person (or by an academic with little programming experience and a great deal of theoretical know how).
It includes a Bitcoin generation system that would create a total of 21 million Bitcoins through the year 2040.
January 12, 2009, The first Bitcoin transaction
The first transaction of Bitcoin currency, in block 170, takes place between Satoshi and Hal Finney, a developer and cryptographic activist.
October 5,2009, An exchange rate is established
Bitcoin receives an equivalent value in traditional currencies. The New Liberty Standard established the value of a Bitcoin at $1 = 1,309 BTC. The equation was derived so as to include the cost of electricity to run the computer that created the Bitcoins in the first place.
Hong Kong's First Bitcoin Counter Opens To The Public
October 12, 2009, #bitcoin-dev hits freenode IRC
The #bitcoin-dev channel is registered on freenode IRC, a discussion network for free and open source
development communities.
December 16, 2009, Version 0.2 is released
Version 0.2 of Bitcoin is released.
December 30, 2009, The difficulty increases
The first difficulty increase occurs at 06:11:04 GMT.
February 6,2010, A currency exchange is born
The world’s first Bitcoin market is established by the now defunct dwdollar.
February 18, 2010, Encryption patent is published
The encryption patent application that was filed on August 15, 2008 by Neal Kin, Vladimir Oksman, and
Charles Bry was published.
May 22, 2010, 10,000 BTC spent on pizza
A programmer living in Florida named Laslo Hanyecz sends 10,000BTC to a volunteer in England, who
spent about $25 to order Hanyecz a pizza from Papa John’s. Today that pizza is valued at £1,961,034 and
stands as a major milestone in Bitcoin’s history.
July 7, 2010, Version 0.3 released
Version 0.3 of Bitcoin is released.
July 11, 2010, Slashdot drives surge in Bitcoin users.
Mention of Bitcoin v0.3 on slashdot brings in a large number of new Bitcoin users.
July 12, 2010, Bitcoin value increases tenfold
Over a five day period beginning on July 12, the exchange value of Bitcoin increases ten times from
US$0.008/BTC to US$0.080/BTC.
July 17, 2010, MtGox is established
The MtGox Bitcoin currency exchange market is established by Jed McCaleb.
July 18, 2010, OpenGL GPU hash farm and ArtForz
ArtForz establishes an OpenGL GPU hash farm and generates his first Bitcoin block.
August 15,2010, Exploit generates 184 billion Bitcoins
Bitcoin is hacked. A vulnerability in how the system verifies the value of Bitcoin is discovered, leading to
the generation of 184 billion Bitcoins. The value of the currency – from a high of $0.80 to $1 in June drops
through the floor.
September 14, 2010, An offer for CUDA
An offer is made by jgarzik, in the name of the Bitcoin Store, to puddinpop to open source their Windowsbased
CUDA client. The offer was in the form of 10,000 BTC which, at the time, was valued at around
US$600 to US$650.
September 14, 2010, Block 79,764
Split allocation of the generation reward used to mine Block 79,764.
September 18, 2010, CUDA becomes open-source
Under the MIT license, puddinpop releases the source of their Windows-based CUDA client, open sourced
by the Bitcoin Store, following a contribution by jgarzik.
September 18, 2010, Slush's Pool mines its first block
Bitcoin Pooled Mining (operated by slush), a method by which several users work collectively to mine
Bitcoins and share in the benefits, mines its first block.
September 29, 2010, Another exploit discovered
A microtransactions exploit is discovered by kermit, precipitating the release of Version 0.3.13.
October 2010
Financial task force issues warning
Bitcoin goes under the spotlight. After the hack in August – and a subsequent discovery of other
vulnerabilities in the blockchain in September – an inter-governmental group publishes a report on money
laundering using new payment methods. Bitcoin, it suggested could help people finance terrorist groups.
OpenCL miner released
The first public version of an OpenCL miner is released.
October 7, 2010, Stalled Bitcoin value begins climb
The Bitcoin exchange rate, stalled at US$0.06/BTC for several months, begins to climb.
October 10, 2010, MtGox switches to Liberty Reserve
MtGox changes its main funding option from PayPal to Liberty Reserve.
October 16, 2010, First escrow transaction takes place
Bitcoin Forum members Diablo-D3 and nanotube conduct the first recorded escrow trade of Bitcoins with
theymos as escrow.
October 17, 2010, #bitcoin-otc trading channel opens
The #bitcoin-otc trading channel is registered on freenode IRC as a marketplace for over-the-counter
trading of Bitcoins.
October 28, 2010, First ever short sale
Facilitated by #bitcoin-otc, the first recorded short sale of Bitcoins is initiated in the form of a 100 BTC
loan from nanotube to kiba.
November 6,2010
Bitcoin reaches $1 million. Based on the number of Bitcoins in circulation at the time, the valuation leads
to a surge in Bitcoin value to $0.50/BTC
December 7, 2010, Bitcoind compiled for Nokia N900
Bitcoin Forum member doublec compiles Bitcoind, which was written for the Nokia N900 mobile
computer.
December 8, 2010, First mobile Bitcoin transaction
The first portable-to-portable transaction of Bitcoins occurs when ribuck sends doublec 0.42 BTC using
Bitcoind.
December 9, 2010, First call option contract sold
The first call option contract for Bitcoins is sold on the #bitcoin-otc market. The transaction occurs between
nanotube and sgomick.
December 9, 2010, Difficulty increases
The generation difficulty exceeds 10,000
January 2011, Silk Road opens for business
The Silk Road, an illicit drugs marketplace is established, using Bitcoin as an untraceable way to buy and
sell drugs online.
January 2, 2011, Tonal Bitcoin standardizes its units
Tonal Bitcoin, designed for those who prefer the Tonal number system, standardizes its units.
February 2011, Bitcoin reaches parity with US dollar
Bitcoin reaches parity with the US dollar for the first time. By June each Bitcoin is worth $31 giving the
currency a market cap of $206 million.
February 14, 2011, Vehicle offered for Bitcoins
An Australian member of the Bitcoin Forum attempts to sell his 1984 Celica Supra for 3000 BTC, and
becomes the first person to offer a vehicle in exchange for Bitcoins.
February 25, 2011, WeUseCoins.com is created
WeUseCoins.com is registered and built into a Bitcoin resource and creates one of the most watched videos
on Bitcoin.
April 23, 2011, Bitcoin passes parity with Euro
On MtGox, the BTC/USD exchange rate reaches and passes parity with the Euro and the British Sterling
Pound. The value of Bitcoin money stock passes US$10 million.
June 13, 2011, Largest ever Bitcoin theft reported
The first major theft takes place. Bitcoin Forum founder allinvain reports having 25,000 BTC taken from
his digital wallet, which had an equivalent value of $375,000. In the same month, a major breach of security
sees the value of the currency go from $17.51 to $0.01 per Bitcoin.
June 2012, Coinbase is founded
Coinbase, a bitcoin wallet and platform, is founded in San Francisco, California.
November 15, 2012, WordPress.com accepts Bitcoin
WordPress.com announces that it accepts Bitcoins as a form of payment for users to purchase upgrades.
November 28, 2012, Halving Day
On Halving Day, Block 210,000 is the first with a block reward subsidy of 25 BTC.
March 18, 2013, FinCEN defines stance on Bitcoin
The US Financial Crimes Enforcement Network (FINCEN) issues some of the world’s first bitcoin
regulation in the form of a guidance report for persons administering, exchanging or using virtual currency.
This marked the beginning of an ongoing debate on how best to regulate bitcoin.
March 28, 2013, Market cap reaches $1 billion
Bitcoin market capitalisation reaches $1bn.
May 2, 2013, First Bitcoin ATM unveiled
The first Bitcoin ATM in the world is debuted in San Diego, California.
May 18, 2013, PrimeDice.com launches online casino
PrimeDice.com launches as an online casino platform that accepts Bitcoin wager
August 20,2013, Bitcoin ruled private money in Germany
Federal Judge Mazzant claims: “It is clear that Bitcoin can be used as money” and “It can be used to
purchase goods or services” in a case against Trendon Shavers, the so-called ‘Bernie Madoff of bitcoin’.
Bloomberg begins testing bitcoin data on its terminal. Although alternative tickers exist, endorsement from
Bloomberg gives bitcoin more institutional legitimacy.
November 2013, The US Senate holds its first hearings on the digital currency
Bitcoin price climbs to $700 in as the US Senate holds its first hearings on the digital currency. The Federal
Reserve chairman at the time, Ben Bernanke, gives his blessing to bitcoin. In his letter to the Senate
homeland security and government affairs committee, Bernanke states that bitcoin “may hold long-term
promise, particularly if the innovations promote a faster, more secure and more efficient payment system”.
December 2013, China's Central Bank bans Bitcoin transactions
China’s central bank bars financial institutions from handling bitcoin transactions. This ban was issued after
the People’s Bank of China said bitcoin is not a currency with “real meaning” and does not have the same
legal status as fiat currency. The ban reflects the risk bitcoin poses to China’s capital controls and financial
stability. Today China remains the world’s biggest bitcoin trader, with 80% of global bitcoin transactions
being processed in China.
January 2014, First insured bitcoin storage service
Bitcoin custodians Elliptic launch the world’s first insured bitcoin storage service for institutional clients.
All deposits are comprehensively insured by a Fortune 100 insurer and held in full reserve. This means
Elliptic never re-invests client assets; instead they secure them in deep cold storage. Overstock.com
becomes the first major online retailer to embrace bitcoin, accepting payments in the US. Overstock was
the first in what is now an expeditiously growing list of large businesses that accept bitcoin.
February 2014, HMRC classifies bitcoin as assets
HMRC classifies bitcoin as assets or private money, meaning that no VAT will be charged on the mining
or exchange of bitcoin. This is important as it is the world’s first and most progressive treatment of bitcoin,
positioning the UK government as the most forward thinking and comprehensive with regard to bitcoin
taxation.
June 2014, The illegal online marketplace
The US government auctions off more than 29,000 bitcoins seized from the Silk Road, the illegal online
marketplace. The sale and closure of the marketplace marks growing institutional understanding of the
potential use cases of bitcoin. Additionally, the closure and auction of the Silk Road has helped bitcoin gain
legitimacy as it demonstrates that bitcoin is not an easy way for online criminals to avoid the rule of law.
From this point onwards bitcoin can no longer be considered as a currency for criminals. The use of the
bitcoin blockchain means that the identity of users can often be established.
July 2014, Bit Licence’
The ‘Bit Licence’ edges towards reality as the New York State Department of Financial Services releases
the first draft of the agency’s proposed rules for regulating virtual currencies. The European Banking
Authority publishes its opinion on ‘virtual currencies’. Their analytical report recommends that EU
legislators consider declaring virtual currency exchanges as ‘obliged entities’ must comply with anti-money
laundering (AML) and counter-terrorist financing requirements.
The EBA report is important as it acts as a catalyst to launch bitcoin into the financial mainstream by
highlighting the fact that virtual currencies require a regulatory approach to strive for an international
coordination to achieve a successful regulatory regime. Also that month GABI (Global Advisors Bitcoin
Investment Fund) launches the world’s first regulated Bitcoin Investment fund. This is important to the
bitcoin ecosystem as the launch of this investment vehicle adds further legitimacy to bitcoin in addition to
allowing regulated investors a way to invest in bitcoin.
August 2014, HM Treasury’s positive outlook on bitcoin
The Chancellor of the Exchequer, George Osborne, demonstrates his and HM Treasury’s positive outlook
on bitcoin when he purchases £20 worth of bitcoin and announces HM Treasury’s Call for Information on
digital currencies, offering digital currency businesses the chance to comment on the risks and benefits and
potentially influence future government policy.
October 2014, TeraExchange
TeraExchange announces that the first bitcoin derivative transaction was executed on a regulated
exchange, adding a new hedging instrument to bitcoin and instilling credibility and institutional
confidence in the entire bitcoin community.
December 2014, Microsoft accept bitcoin
Tech giant Microsoft begins accepting bitcoin payments.
January 2015, NYSE
The New York Stock Exchange is a minority investor in Coinbase’s $75M funding round. The NYSE aims
to tap into the new asset class by bringing transparency, security and confidence to bitcoin.
March 2015, UK Treasury’s call
The results of the UK Treasury’s call for information on digital currency are announced.
Future predictions
There are several possible ways Bitcoin can go at this point, all of which point to a legitimate, widespread
adoption by large institutions through tighter regulation. Recently, New York’s BitLicense became the
world’s first digital currency-specific regulatory regime. It has been through a couple of rounds of
consultations and is expected to come into force in a couple of weeks.
The European Central Bank and European Banking authority have both released detailed reports on digital
currencies, and suggested regulation of the industry by the EU to further control price fluctuations. The
Winklevoss brothers, they of Facebook fame, are on the verge of launching their own exchange-traded fund
holding Bitcoins.
Bitcoin’s journey into the financial mainstream has already begun, with HM Treasury’s report on digital
currencies marking encouraging progress toward the predictions in this infographic. The report introduces
anti-money laundering, consumer protection and technical standardisation for digital currency companies
in the UK, which will encourage traditional financial services to engage more with digital currency
businesses and accelerate the integration of blockchain technology within financial services.
Share:

BitCoin (What You Need To Know)

Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto.
Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need
to give your real name. More merchants are beginning to accept them. You can buy webhosting services,
pizza or even m Buy on an Exchange. Bitcoins are stored in a “digital wallet,” which exists either in the
cloud or on a user’s computer. The wallet is a kind of virtual bank account that allows users to send or receive bitcoins, pay for goods or save their money. Unlike bank accounts, bitcoin wallets are not insured by the FDIC. Though each bitcoin transaction is recorded in a public log, names of buyers and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’ transactions private, it also lets them buy or sell anything without easily tracing it back to them. That’s why it has become the currency of choice for people online buying drugs or other illicit activities.

Exchange Bitcoins:
Several marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the largest bitcoin exchange.anicures.
Transfer:
People can send bitcoins to each other using mobile apps or their computers. It’s similar to sending cash digitally.
Mining:
People compete to “mine” bitcoins using computers to solve complex math puzzles. This is how bitcoins are created. Currently, a winner is rewarded with 25 bitcoins roughly every 10 minutes.

Symbol:



Ƀ is not a logo but a symbol: Unicode Character U+0243 can be used any Unicode text editor. This unicode character was originally used as a phonetic symbol to represent or transcribe the sound [Ī²]. Thus the context of this use does not allow any confusion with the Bitcoin currency.
Facts: The baht (sign: ฿; code: THB) is the currency of Thailand. Thailand’s population is 67 million people (vs. Bitcoin’s debated 1–4 million users) and they’re not really cool with the community trying to “steal” their sign.
Unit:     Unit Value in BTC
BTC                       1
mBTC                   0.001
uBTC                    0.000001
Satoshi                0.00000001
Share:

Cryptocurrency Technologies (What You Need To Known About Series 2)

What is Crypto Currency?
A cryptocurrency is a medium of exchange like normal currencies such as USD, but designed for the
purpose of exchanging digital information through a process made possible by certain principles of
cryptography. Cryptography is used to secure the transactions and to control the creation of new coins.

Why Crypto Currency?
Money exists to facilitate trade. Through the centuries trade has become incredibly complex everyone trades
with everyone worldwide. Trade is recorded in book keeping, this information is often isolated in closed to
the public. This is the reason why we use third parties and middlemen we trust to facilitate and approve our
transactions. Think governments, banks, accountants, notaries and the paper money in your wallet. We call
these trusted third parties. Cryptocurrency software enables a network of computers to maintain a collective
bookkeeping via the internet. This bookkeeping is neither closed nor in control of one party or a central
authority. Rather, it is public, and available in one digital ledger which is fully distributed across the
network. We call this the blockchain. In the blockchain all the transactions are logged, including
information on the time, date, participants and amount of every single transaction. Each node in the network
owns a full copy of the blockchain.

On the basis of complicated state-of-the-art mathematical principles the
transactions are verified by the cryptocurrency miners, whom maintain the ledger. The mathematical
principles also ensure that these nodes automatically and continuously agree about the current state of the
ledger and every transaction in it. If anyone attempts to corrupt transaction the nodes will not arrive at a
consensus and hence will refuse to incorporate the transaction in the blockchain. So every transaction is
public and thousands of nodes unanimously agreed that a transaction has occurred on date X at time Y. It’s
almost like there’s a notary present at every transaction. This way everyone have access to a shared single
source of truth. The ledger does not care wetter a cryptocurrency represents a certain amount of Euros or
Dollars, or anything else of value, or property for that matter. Users can decide for themselves what a unit
of cryptocurrency represents. A cryptocurrency like Bitcoin is divisible in to 100 million units and each
unit is both individually identifiable and programmable. This means that users can assign properties to each
unit, users can program a unit to represent a Euro cent, or a share in a company, a kilowatt our energy or
digital certificate of ownership. Because of if this cryptocurrencies and blockchain technology could be
used for more than simply money and payments.
Share:

Cryptocurrency Technologies (What You Need To Known About)

As the word suggests, cryptocurrencies make heavy use of cryptography. Cryptography provides a
mechanism for securely encoding the rules of a cryptocurrency system in the system itself. We can
use it to prevent tampering and equivocation, as well as to encode the rules for creation of new units
of the currency into a mathematical protocol. Before we can properly understand cryptocurrencies
then, we’ll need to delve into the cryptographic foundations that they rely upon.

Cryptography is a deep academic research field utilizing many advanced mathematical techniques
that are notoriously subtle and complicated to understand.
Share:

Monday 8 October 2018

Python (How to create a Host Checker) Complete Guide

Hello. Today we are going to make a Python up/down host checker "How to Make a Python host checker for Linux" that works on Linux only.

You are going to need:

– Python 3.4

– Internet Connection

– Computer with Windows or Linux

If you haven't got installed Python yet, download it from the following link:

https://www.python.org/downloads/

You can find some of the Python basics in my first tutorial at http://www.hacking-tutorial.com/hacking-tutorial/code-your-first-simple-sql-injection-checking-vulnerability-with-python/

Why Linux only?


We never recommend using 3rd party libraries, but, without them you cant normally ping on Windows. Like, if you use ping command on Linux, you get 1 if the host is up, and other numbers if it is down. That means, on Linux, when the ping target is not pinged successfully, the ping returns 1 (operation completed successfully), in another case, it gives you the error number. On Windows, this is more complicated. If you ping with ping command, you get operation completed successfully, even if the host is up or down. Howewer, I don’t think any of you actually use Windows for hacking.

Setting up


Before starting, please connect to the internet, and if you would have another computers up, that would be pretty nice. Get your local IPv4 address, think what ports do you want to scan.

Coding How to Make a Python host checker for Linux


Coding is the easy part. Begin from importing sys and socket, then, write the following code:
import os # Importing main libs

import sys

start = "" # Setting up variables

range1 = 0

range2 = 0

 

for carg in sys.argv: # Checking for arguments

    if carg == "-s":

        argnum = sys.argv.index(carg)

        argnum += 1

        start = sys.argv[argnum]

    elif carg == "-r1":

        argnum = sys.argv.index(carg)

        argnum += 1

        range1r = sys.argv[argnum]

        range1 = int(range1r)

    elif carg == "-r2":

        argnum = sys.argv.index(carg)

        argnum += 1

        range2r = sys.argv[argnum]

        range2 = int(range2r)

 

print ("[*] Host Scanner launched!") # Informs user about initialize

 

if start == "": # Checks if all the information is provided

    print ("[E] No host provided")

elif range1 == 0:

    print ("[E] No range1 provided")

elif range2 == 0:

    print ("[E] No range2 provided")

else:

    if range1 > range2:

        count = range1 - range2

    elif range1 < range2:

        count = range2 - range1

    for ccount in range(range1, range2): # Counts the IP range to ping

            target = start + "." + str(ccount)

            response = os.system("ping " + target + " 2>&1 >/dev/null") # Sets response to ping

            if response == 0: # Reads response, checks if it is 0

                err = 0 # sets err to 0

            else:

                err = 1 # sets err to 1

            if err == 0: # when err is equal to 0

                print ("[+] " + target + " is up!") # Informs user about hosts that are up

Code should look like this (comments are cut, do not worry):

How to Make a Python host checker for Linux

So, that is pretty easy. The end perimeters in th ping command supresses the commands output. So, save the file, run it from terminal and test this out!
Share:

DNS Addressing (How to on Windows)

Introduction

 

information   Information

This tutorial is to guide you, the user, in changing your DNS address to (hopefully) a better alternative.OpenDNS, one of said alternatives, will be used as our main example but there are many others out there. Now while OpenDNS is great, it isn't for everyone: The best way to find the best one for you is to consult the link in the tutorial for a list of alternatives and choose the best (testing one yourself first hand here is key).

OpenDNS is a free, powerful, and easy to use DNS alternative best suited for people in the US and London areas.

Here is a direct quote from their site:


Quote:

OpenDNS is the leading provider of free security and infrastructure services that make the Internet safer through integrated Web content filtering, anti-phishing and DNS. OpenDNS services enable consumers and network administrators to secure their networks from online threats, reduce costs and enforce Internet-use policies. OpenDNS is used today by millions of users and organizations around the world.



Now the question that you may ask is how this may benefit you? Well the default DNS server provided by ISPs tend to be slower than OpenDNS because of promotional offers included in said servers or the ISP doesn't have a good quality server to begin with (would Verizon please stand up?). This means that by using OpenDNS not only will your surfing be generally faster but any promotional offers that said ISP might try to spam you with or any phishing attacks will be blocked. To summarize, OpenDNS provides an all around better web experience PLUS its free so why not give it a try? Now with all good stories there are two sides. With the advantages that I have described, there are disadvantages. Now while I could myself describe what these are, I felt that a fellow member by the name of Charles Kane did it better than I could have with his scenario given. Please read this quote given and all credit goes to him for this part:


Quote:

1. Anyone can use OpenDNS safely.
2. Free optional registration with OpenDNS enables the control panel which allows you to use preset content filtering, whitelisting and blacklisting of websites.
3. OpenDNS claims surfing speed and stability improvements. Speed may be enhanced with the centralized caching of internet addresses. The benefits of this claim should be weighed against your location (OpenDNS has 8 servers in the US and one in London with one planned for Hong Kong), the quality of your own ISPs caching, and particularly whether your ISP is using any particular servers to provide improved speeds in the seving of content.

As an example, for an Australian, the OpenDNS resolvers are at least 12 hops away (roughly 200ms) and the local server a maximum 4 hops (about 40ms) so the benefits may be reduced. Speed improvements for sites cached by your ISPs servers, especially common sites, are likely to be insignificant as network latency dominates DNS resolution time. The Pacific Ocean is the problem.

High quality ISPs (such as many of those in Australia), especially those that provide additional benefits such as Akamai delivered content delivered from servers within the local network will also be a major consideration. Akamai delivered content may be particularly important with streaming video and audio and big downloads (including Microsoft Download and Microsoft Update).

OpenDNS may give the greatest benefits if you are with a crappy ISP, relatively close to OpenDNS servers, if you want the benefits of their user control panel (filtering), or mainly access addresses unlikely to be cached by your ISP. OpenDNS server provision in North America makes OpenDNS particularly attractive for North American users.



Now to setup OpenDNS (or your other alternative) is rather easy and can be accomplished in less than a couple of minutes...


 

Tip   Tip

You may also elect to sign up for an account at their website. It is also free and you will able to customize web site filtering and ad management....quite a handy control panel for your internet browsing experience (especially businesses that need content control).


 

Tip   Tip

If you feel that OpenDNS is not for you than please consult this comprehensive list PortForward.com - Free Help Setting up Your Router or Firewall to find one near you! Just replace the numbers given here with the numbers given for your DNS server of choice from that page or anywhere else; these steps still apply.


Here's How:
1. Open the Control Panel.

2. Open up Network and Internet and go to the Network and Sharing Center.
-pic1.png

3. Click on Change adapter settings on the left hand panel.
-pic2.png

4. This will bring up a list of adapters present on your computer. Most people will have a Local Area Connection while laptop users will add a Wireless Network Connection and possibly a Bluetooth Network Connection...go ahead andright click on Local Area Connection and click on Properties.
NOTE: These steps do not change if you are modifying the Wireless Network Connection instead
-pic3.png

5. If prompted by UAC, click on Yes.

6. Highlight Internet Protocol Version 4 (TCP/IPv4) and click on properties.
-pic4.png

7. In the properties window you will see a few radio boxes with both of them saying Obtain an IP/DNS Address Automatically....we will leave the IP address alone and will change the Obtain DNS....to use the following:
In the Preferred DNS server boxes enter this sequence: 208.67.222.222

In the Alternate DNS server boxes enter this sequence: 208.67.220.220

-pic5.png

8. Check the validate settings upon exit (Optional) check box, click OK, and then Close to finish. (See screenshot above)

9. Windows will check your settings (if you checked the option above) and you will be finished! Now start surfing to feel the effects of a quicker and more secure browsing experience!


Tip   Tip

For more info on OpenDNS don't hesitate to ask here or visit their website at OpenDNS | Providing A Safer And Faster Internet


 

Tip   Tip

If you happen to be managing a network under a router, this tip will save you some time. If you change therouter's DNS settings instead of each computer on the network than as long as each computer is set toObtain a DNS Address Automatically, your choice of a DNS server will be applied to all the computers. Please consult the manual of your router or their respective website to do this.


Hope it helps,
Share:

Whatsapp (How to Create a Fake Account)

CREATE FAKE WHATSAPP


 

LETS MAKE A FAKE WHATSAPP ACCOUNT!


download this app named talk2

download
Download

This is a Philipiens app for chatting. We dont want to use it , but we need this app to get the international number.

STEPS

1. Download the app and verify the OTP

2.After verifying the OTP swipe onthe menu bar to get your number. It will be a number with +63. This is our number for fake whatsapp.

3.Now install whatsapp or change your number and enter the fake number excluding 63. Change the Indian code 91 to 63.

4.Click on the verify and wait for the whatsapp OTP . Within 5 seconds you will get the OTP.

5. Now enter the otp and start using this fake number whatsapp.

After this you can uninstall the app.

IF YOU FIND ANY DIFFICULTY FOR GETTING OTP, JUST CLEAR DATA OF THE APP AND TRY AGAIN.

ENJOY
Share:

How to Covering Tracks over Network (Hide Your Self From Them)

Covering Tracks over Network – Most important step of a Hack attack. Most Hackers know how to hack into networks as lots of tutorials are available over the internet regarding how to do information gathering, scanning or networks and vulnerability database. But you will hardly find anything likecovering your tracks over network.. that means most people know how to get into system but don’t know how to remove their tracks, so that they remain undetected. And if you are detectable then you are finished. You will be until and unless you don’t remove your tracks. So friends, lets learn how to cover your tracks over Network to remain undetectable in Hacker’s Guide.

How to cover tracks over Network :


Covering Tracks Using Reverse HTTP Shells :


In this type of attack, the attacker installs a reverse HTTP shell on the victim computer. This reverse HTTP shell is coded is such a way that it ask the commands from an external moderator who controls this reverse shell at regular intervals. So it looks like a normal traffic to an organization network perimeter security device like a firewall, as port 80 is usually opened.

Covering Tracks over Network - Hackers Guide

Once the attacker receives the request from the reverse HTTP shell, commands will be issued back that will be executed locally by the victim. This all is seen as HTTP request /response to the network devices. Once the commands get executed, results will be sent out in the next web request. These HTTP reverse shells can also be programmed to bypass any static authentication required by perimeter devices, like a firewall.

 

Covering Tracks using ICMP Tunnels :


Because HTTP reverse shells are so famous, some organizations keep a check on what is leaving their network in response to the client’s GET request. Some also check what comes as a reply to a GET request and most probably the attacker commands can be detected there. In lieu of this, some carry traffic via covert channels using ICMP packets. This is usually successful because organizations block only incoming ICMP packets and forgot about outgoing ICMP packets. Because of this configuration, an attacker uses ICMP packets to transfer TCP payloads.

Covering Tracks over Network - Hackers Guide

First the attacker configures the local client to connect with the victim client. The victim in turn encapsulates the TCP payload in an ICMP ECHO packet and forwards it to the proxy server. The proxy server in turn de-encapsulates the packet and extracts the TCP payload and send to attacker. To the network devices, it seems like a simple ICMP packet.

Various tools are available to do this. Some of them are given below:

  • Ptunnel

  • Loki

  • ICMPShell

  • PingChat

  • ICMPCmd


_357c1652_ using TCP Parameters :


How about distributing the attacker’s payload via the normal TCP packet instead of the encapsulating protocol? This method is well known and even today can be used to bypass IDS/IPS. The attacker can distribute the payload via the unset parameters of the TCP packet.

Covering Tracks over Network - Hackers Guide

Some of the interesting fields in TCP packet that can be used to transfer the content are:

  • IP Identification: This attack is very simple to conduct. It requires an established session between the two sides. From one side the payload is transferred bitwise in the IPID field.


  • TCP initial acknowledgement sequence number: This is a tricky method. This method uses a bounce server whose whole purpose is to receives the packet from the client and send it to the attacker machine. Below are the steps that are used in this method



    • Client generates a TCP SYN packet with a spoofed source address of the receiving server and destination address of the bounce server. Let’s say the initial sequence number is ISNA, which holds the character to be transmitted.


    • Bounce server receives the packet and responds SYN-ACK OR RESET, based on whether the port is closed or not. An interesting point is that it does send a reply, but to where? Yes, it sends the reply to the receiving server because it receives a spoofed source address. It replies with a SYNB, ACK(ISNA+1).


    • Receiving server receives this and recovers the character from sequence number field.



  • TCP initial sequence number: This method does not even require am established connection as is required in the IP identification method. A SYN packet is sent with an ISNa (initial sequence number) containing the payload (bit). Even though if it gets a RESET in reply, the content is already been extracted by the other side.

Share:

Kick User(s) Off From Wifi

WiFi Kill allows you to boot people off your WiFi connection. What you need:


  1. Connect to the target WiFi network with your Android phone.

  2. Open WiFi Kill app.

  3. Click the ON button

  4. The app will now scan the network for PC's

  5. Press the check box next to any computer you want to boot off the internet, and their internet connection will no longer work until you uncheck it!


Tags:
Share:

Base64 (Complete Guide For Images Encryption)

Base64 and image files


For those who don’t know base64 it’s an encoding format for any data. In that case with the images we can simply say, that base64 equals to text (string) representation of the image itself. In most cases you’ve image tags with src attribute pointing to the http source of the image.

Overview of the problem


Let’s say we’ve a HTML document with 100 images into. That’s a rare case I agree, but sometimes it happens. You’ve to preload the thumbnails of an image gallery where only one image is displayed in a bigger size. As I mentioned before the progressive JPEG suits better for a large image but for the thumbnails you’ve to use baseline JPEGs.

Note: In fact the technique with base64 representation of the images is not well known. I think that’s because there are not so much examples with pages with more than 100 images.

But anyway. We’ve the HTML document with 100 images (100 <img> tags). That means directly 101 requests/responses from the server. In my tests on my localhost, which is supposed to be fast enough, that case loaded 2 MB with a simple small JPEG for the image, loaded 100 times, and approximately 3 seconds. Which yet again on the localhost is extreamly slow. The image is on my machine, the server is here… what else?

How to put the images inline?


The other way to do that is to put all you images in you HTML document. Than the first and more important rule for optimization (see more here), to make fewer requests is done. You now have only one request. And with the response you’ve all 100 images. That’s good when you’ve different images, cause every repeatable element in your CSS should be made with HTTP request once and than repeated with the CSS. In other way you risk the size of the document transfered in the web.

The results


The second case with the inline images and the only one request is giving me an average response time of 900ms. The size of the document is bigger, yes. I had 5KB for the HTML with no base64 images, and then the size increased to 45KB. That’s 9 times more. But however 45KB is nothing for the web, instead of all those 2 MB in the previous test.

How to make your images to strings?


Speaking in PHP terminology there is a function called base64_encode, which with a combination of file_get_contents(imagefile), make the files a base64 string.

Is there any issue?


Yes there is. First you cannot have your image files in a remote server, cause file_get_contents must read only from the local filesystem. Than if you process all those files before returning them to the client, where’s the point? You lose all that time you’ve spent with the technique.

The reasonable solution


I think this technique is good for cases like the one described at the beggining. You’ve a page with more than 100 images. Then you’ve the base64 representation already. Let say you have it in your database as string and don’t need to convert it everytime you return the image. That may happen on upload of the image and the image enters the database with its base64 representation, and it’s done.
Share:

Vulnerability Assessment (Short Guide)

Vulnerability assessment is a methodology that acknowledges and classifies the security bugs in a pc, network, or infrastructure.

Some type of automated scanning product is used to look at the ports and companies on a vary of IP addresses. Most of those merchandise can even check for the kind of working system and utility software program operating and the variations, patch ranges, consumer accounts, and companies which can be additionally operating.

These findings are matched up with related flaws within the product’s database. The remaining consequence is a giant assortment of reviews that current a record of every system’s flaws and corresponding countermeasures to lower the related risk. Essentially, the software states, “Here is a record of your bugs and right here is a record of issues it’s good to do to repair them.

The drawback with simply relying upon this outcomes is that it was generated by an automatic software that has a arduous time placing its findings into the right context of the given atmosphere

For instance, many of those instruments current an alert of “High” for vulnerabilities that don’t have a extremely possible risk related to them. The instruments additionally can not perceive how a small flaw can be utilized in a giant organized . Vulnerability evaluation is nice for recognizing the foundational security points inside an atmosphere, however many occasions, it takes an moral hacker to essentially check and qualify the extent of threat particular vulnerabilities pose.
Share:

Google dorks (Specific File(s))

Depends entirely on what you are looking for, here are some:


"favorite links" Keyword(s)


"favorite links"


"favorite sites" Keyword(s)


"favorite sites"


"Keyword(s) sites"


"Keyword(s) website"


"Keyword(s)"


"list * Keyword(s) * sites"


"list * Keyword(s)"


"list of Keyword(s) sites"


"list of Keyword(s)"


"recommended links" Keyword(s)


"recommended links"


"recommended sites" Keyword(s)


"recommended sites"


directory * Keyword(s)


intitle:directory "Keyword(s)"


inurl:directory "Keyword(s)"


Keyword(s)


Keyword(s) * directory


Keyword(s) catalog


Keyword(s) directory


Keyword(s) sites


Keyword(s) websites |Keyword(s)


Keyword(s) websites

Share:

Full-stack Web Developer (Complete Guide)

Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. You can count on a full-stack web developer to design, code, implement and maintain a fully functional modern interactive website on his/her own (not just a static website with a few pages).

Full-stack Web Developer


With the ever evolvement of the almighty World Wide Web, new job functions are created virtually every day. Just a few years ago, you only needed a web designer to create the visual design in Photoshop and/or Dreamweaver and a web developer to code the front-end/back-end scripts and the website was ready to go. At that time, websites were charged based on the number of “pages” (a concept borrowed from print design).

Fast forward to the present, we now have (not a exhaustive list) :

  • visual designer

  • web designer

  • UI designer

  • UX designer

  • interaction designer

  • art director

  • front-end developer

  • back-end developer

  • web developer

  • mobile developer

  • database developer

  • database administrator

  • web master

  • web server administrator

  • SEO specialist

  • web analyst

  • web security professional

  • quality assurance tester

  • project manager

  • growth hacker



Several roles may be taken up by the same individual depending on the size of the company and the resources. Very large and profitable companies may gather experts from each field in their teams with a view to create the best-ever-possible web products of the world.

But normally, in the down-to-earth company, the web designer/developer distinction still applies. The web designer will be responsible for the visual/web/UI/UX/interaction design while the web developer will do the front-end coding/back-end coding/database administration/server setup/debugging/etc. However, problems always occur in areas when the two have to work together yet only either one takes responsible. Factors like miscommunications/false assumptions of job role and scope/misunderstanding of the technology/etc. will render the end product a subpar one.

This is where a full-stack web developer can fill the gap. A full-stack web developer masters the best of both worlds (or to a minimum understands both worlds). (S)He will be able to steer the web projects in the right direction utilizing the best practices and latest advancements in the technology. (S)He will design and code the whole web project themselves or supervise others to perform the tasks by overlooking the whole process from scratch to finish.

When websites and web applications become more and more interactive and sophisticated, understanding the technical capabilities of the systems and having an eye for artistic/usability judgement are critical to the success. So it is natural for web professionals to evolve to full-stack web developers in due course.
Designers will become more like programmers as programming becomes more like design.

However, designing and coding are two distinct skills that require different regions of the brain to master . The right brain is for visual and creativity and the left brain is for structure and organization. Designers are predominately right-brainers while coder left-brainers. So there is still only a handful of full-stack web developer on the market .

Benefits of Being a Full-Stack Web Developer



  1. You can build a professional website from scratches for your employer.

  2. You can be a competent member in cross-functional Agile teamswhere you can perform both front-end and back-end development. As Agile project management is fast becoming the norm for web application development and UI/UX is gaining in importance for the success or failure of any web application, you will be seen as a valuable team member contributing to the success of projects.

  3. You can start your own website design and development business.

  4. You can build your own websites and monetize them through Adsense, affiliate marketing, selling your own products and more. The best of this is the flexibility of earning extra money alongside your regular job. There are many great examples of web developers turning this business into a career and quitting their regular jobs.

    • as an example, you can utilize your knowledge in web development to help others to select the most suitable website hosting plan with an earning of US$85 per referral.

      • Click here to join the A2 Hosting affiliate program for freeFor a limited time, you will get US$10 upon signing up (there is a earning threshold of US$100 (i.e. 2 referrals) before they will send you the money). You will need to have a website to be eligible for the program.

      • Don’t worry if you don’t have a website, you can get unlimited hosting for a monthly fee as low as US$3.89 (with use of coupon code: WHTPRIME, please activate the discount here and click “Web Hosting” on the menu bar).





Share:

URL Rewriting (Complete Guide)

Original URL:
Eg:http://example.com/followers.php?id=techyganga

Rewriting URL
Eg:http://example.com/9lessons/followers



.htaccess Code
RewriteEngine On

RewriteRule ^([a-zA-Z0-9_-]+)/\followers$ followers.php?id=$1

RewriteRule ^([a-zA-Z0-9_-]+)/\following$ following.php?id=$1
Share:

SigPloit Framework (What You Need To Know)WYNTK

SigPloit Framework – Telecom Vulnerability Testing for SS7, GTP (3G), Diameter(4G), and SIP Made Easy


 

SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use.

What is SigPloit


As described on GitHub, SigPloit is a framework intended for telecom security specialists. Researchers can use SigPloit for penetration testing of telecom networks in order to find known vulnerabilities in signaling protocols.

The stated purpose of the framework is security testing of all existing protocols that are used in telecom operators’ infrastructure, including SS7, GTP (3G), Diameter (4G), and even SIP for IMS and VoLTE, which is used at the access level and for encapsulating SS7 messages in SIP-T. According to the documentation, SigPloit uses testing results to provide network-specific recommendations on how to improve security.

SiGploit is developed on several versions


Note: In order to test SS7 attacks, you need to have an SS7 access or you can test in the virtual lab with the provided server sides of the attacks, the used values are provided.

Version 1: SS7


SiGploit will initially start with SS7 vulnerabilities providing the messages used to test the below attacking scenarios A- Location Tracking B- Call and SMS Interception C- Fraud

Version 2: GTP


This Version will focus on the data roaming attacks that occur on the IPX/GRX interconnects.

Version 3: Diameter


This Version will focus on the attacks occurring on the LTE roaming interconnects using Diameter as the signaling protocol.

Version 4: SIP


This is Version will be concerned with SIP as the signaling protocol used in the access layer for voice over LTE(VoLTE) and IMS infrastructure. Also, SIP will be used to encapsulate SS7 messages (ISUP) to be relayed over VoIP providers to SS7 networks taking advantage of SIP-T protocol, a protocol extension for SIP to provide intercompatability between VoIP and SS7 networks

Version 5: Reporting


This last Version will introduce the reporting feature. A comprehensive report with the tests done along with the recommendations provided for each vulnerability that has been exploited.
BETA Version of SiGploit will have the Location Tracking attacks of the SS7 phase 1

Installation and requirements


The requirements for this project are:
1) Python 2.7
2) Java version 1.7 +

To run use
python bin/SiGploit.py

Download Sigploit
Share:

Computer Strain (Save you eyes and Future)

No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer screen. Your eye savior, f.lux is here. First things first, what is f.lux and why do you need it?


 


Why do you need f.lux ?


Decreasing the brightness is not that attractive an option, because the blue light emissions from your screen is still significant enough to well up your eyes with water and completely ruin your sleepy state. It is proven that exposure to blue light significantly aids in keeping you awake for a longer time in the night.

To get to the science behind it, here’s why. Most of us don’t know this, but there is another kind of receptor cells beside rods and cones in our retina. It’s called Melanopsin. The discovery was made about 15 years ago. Melanopsin is sensitive to narrow band of blue light in 460-480 nm range. Melanopsis works different functions for different creatures, but that’s another story.

There are two things I’d like to recommend to your reading list to get more information about melanopsin and effect of blue light on sleep:

1) Internal Time by Til Roennberg

2) Research Papers and articles – link

What is f.lux what does it do?


f.lux is a desktop applet for Windows, Linux, Mac, iPhone, iPad and iPod touch which limits the glow of your screen. Instead, it replaces that with a warm tone. There is no problem for your eyes not to feel comfortable on the screen in the morning. The daylight is sufficient and doesn’t let your eyes feel the glow that the screen throws. But say at 11 PM while you are, say trying to work late after sneaking on your father or wife, you power up your computer and you get instantly taken back by the brightness!

You can reduce the brightness and contrast to a certain extent, but there is a limit to which you can go without compromising your experience. f.lux comes to rescue here. It automatically switches to a warm tone at night and goes back to a brighter shade in the morning.

Don’t worry as it uses only 3.86MB of RAM approximately, is completely free, has no CPU load and works like a charm without any user interference. The working is also fairly simple. You can also customize the way it works, especially how warm you want your screen to be at night.

How to use f.lux to save your eyes?


It does the work by calculating your present location (through google maps)and works according to the sunrise/sunset cycle. The f.lux indicator applet automatically manages the color temperature of your screen based on your latitude and longitude, or if you are in the US, your zip code.



 

In the preferences panel, you can set your preferred night-time color temperature and see a preview, as well as seeing the current color temperature.

 





You can even pause the applet if you want to:



You can download f.lux for windows here and for Mac here.
For iPhone, iPad and iPod Touch you need to jailbreak your device in order to install it. You can follow the instructions here.

To install f.lux on Linux (Ubuntu) open up the terminal and copy paste the following commands one by one.



If you are having an error in adding the ppa (the first command), follow this link to troubleshoot it.

The Linux GUI of the f.lux applet doesn’t provide as much customizing options as that of the other platforms, so if you are interested in adding features to it, you could do it on its open source code on GitHub.

If you have any other query regarding f.lux, comment your queries below. Do share your experiences.
Share:

How to Change your Site from HTTP to HTTPS Complete guide

HTTP to HTTPS


Scenario :


You want to force people coming to your site to use HTTPS. Either for the entire site or a small sub-section of it.


Note


Using mod_rewrite to do this isn't the recommended behavior. 



Fix :



RewriteEngine On
# This will enable the Rewrite capabilities

RewriteCond %{HTTPS} !=on
# This checks to make sure the connection is not already HTTPS

RewriteRule ^/?(.*) https://%{SERVER_NAME}/$1 [R,L]
# This rule will redirect users from their original location, to the same location but using HTTPS.
# i.e. http://www.example.com/foo/ to https://www.example.com/foo/
# The leading slash is made optional so that this will work either in httpd.conf
# or .htaccess context


Entire site (.htaccess) :


Note: While the rules you need are the same as above (because the rule above doesn't depend on any of the quirks of rewrite in .htaccess), you will need to ensure that you place this in a .htaccess file in the root of the site you want to apply it against, and to make sure you have the appropriate AllowOverride configuration in your httpd.conf


Specific Directory


Either put the above solution in a .htaccess file in the directory to be affected, or put the URI prefix in the regex itself.




RewriteEngine On
# This will enable the Rewrite capabilities

RewriteCond %{HTTPS} !=on
# This checks to make sure the connection is not already HTTPS

RewriteRule ^/?secure/(.*) https://%{SERVER_NAME}/secure/$1 [R,L]
# This rule will redirect all users who are using any part of /secure/ to the same location but using HTTPS.
# i.e. http://www.example.com/secure/ to https://www.example.com/secure/
# This means if you dont want to force HTTPS for all directories you can force it for a specific sub-section of the site.

 
Share:

Complete A-Z Kali Linux Commands

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaƫl Hertzog are the core developers.

Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners). Kali Linux can run natively when installed on a computer’s hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits.

Here below we are listing A-Z Kali Linux commands which will help you to ease of flow in work.

 























































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































Kali Linux commandsFunction
A
 apropos Search Help manual pages (man -k)
 apt-get Search for and install software packages (Debian)
 aptitude Search for and install software packages (Debian)
 aspell Spell Checker
 awk Find and Replace text, database sort/validate/index
B
 basename Strip directory and suffix from filenames
 bash GNU Bourne-Again Shell
 bc Arbitrary precision calculator language
 bg Send to background
 break Exit from a loop
 builtin Run a shell builtin
 bzip2 Compress or decompress named files
C
 cal Display a calendar
 case Conditionally perform a command
 cat Concatenate and print (display) the content of files
 cd Change Directory
 cfdisk Partition table manipulator for Linux
 chgrp Change group ownership
 chmod Change access permissions
 chown Change file owner and group
 chroot Run a command with a different root directory
 chkconfig System services (runlevel)
 cksum Print CRC checksum and byte counts
 clear Clear terminal screen
 cmp Compare two files
 comm Compare two sorted files line by line
 command Run a command – ignoring shell functions
 continue Resume the next iteration of a loop
 cp Copy one or more files to another location
 cron Daemon to execute scheduled commands
 crontab Schedule a command to run at a later time
 csplit Split a file into context-determined pieces
 cut Divide a file into several parts
D
 date Display or change the date and time
 dc Desk Calculator
 dd Convert and copy a file, write disk headers, boot records
 ddrescue Data recovery tool
 declare Declare variables and give them attributes
 df Display free disk space
 diff Display the differences between two files
 diff3 Show differences among three files
 dig DNS lookup
 dir Briefly list directory contents
 dircolors Colour setup for `ls’
 dirname Convert a full pathname to just a path
 dirs Display list of remembered directories
 dmesg Print kernel &amp; driver messages
 du Estimate file space usage
E
 echo Display message on screen
 egrep Search files for lines that match an extended expression
 eject Eject removable media
 enable Enable and disable builtin shell commands
 env Environment variables
 ethtool Ethernet card settings
 eval Evaluate several commands/arguments
 exec Execute a command
 exit Exit the shell
 expect Automate arbitrary applications accessed over a terminal
 expand Convert tabs to spaces
 export Set an environment variable
 expr Evaluate expressions
F
 false Do nothing, unsuccessfully
 fdformat Low-level format a floppy disk
 fdisk Partition table manipulator for Linux
 fg Send job to foreground
 fgrep Search files for lines that match a fixed string
 file Determine file type
 find Search for files that meet a desired criteria
 fmt Reformat paragraph text
 fold Wrap text to fit a specified width
 for Expand words, and execute commands
 format Format disks or tapes
 free Display memory usage
 fsck File system consistency check and repair
 ftp File Transfer Protocol
 function Define Function Macros
 fuser Identify/kill the process that is accessing a file
G
 gawk Find and Replace text within files
 getopts Parse positional parameters
 grep Search files for lines that match a given pattern
 groupadd Add a user security group
 groupdel Delete a group
 groupmod Modify a group
 groups Print group names a user is in
 gzip Compress or decompress named files
H
 hash Remember the full pathname of a name argument
 head Output the first part of files
 help Display help for a built-in command
 history Command History
 hostname Print or set system name
I
 iconv Convert the character set of a file
 id Print user and group id’s
 if Conditionally perform a command
 ifconfig Configure a network interface
 ifdown Stop a network interface
 ifup Start a network interface up
 import Capture an X server screen and save the image to file
 install Copy files and set attributes
J
 jobs List active jobs
 join Join lines on a common field
K
 kill Stop a process from running
 killall Kill processes by name
L
 less Display output one screen at a time
 let Perform arithmetic on shell variables
 ln Create a symbolic link to a file
 local Create variables
locate Find files
 logname Print current login name
 logout Exit a login shell
 look Display lines beginning with a given string
 lpc Line printer control program
 lpr Off line print
 lprint Print a file
 lprintd Abort a print job
 lprintq List the print queue
 lprm Remove jobs from the print queue
 ls List information about files
 lsof List open files
M
 make Recompile a group of programs
 man Help manual
 mkdir Create new folders
 mkfifo Make FIFOs (named pipes)
 mkisofs Create an hybrid ISO9660/JOLIET/HFS filesystem
 mknod Make block or character special files
 more Display output one screen at a time
 mount Mount a file system
 mtools Manipulate MS-DOS files
 mtr Network diagnostics (traceroute/ping)
 mv Move or rename files or directories
 mmv Mass Move and rename files
N
 netstat Networking information
 nice Set the priority of a command or job
 nl Number lines and write files
 nohup Run a command immune to hangups
 notify-send Send desktop notifications
 nslookup Query Internet name servers interactively
O
 open Open a file in its default application
 op Operator access
P
 passwd Modify a user password
 paste Merge lines of files
 pathchk Check file name portability
 ping Test a network connection
 pkill Stop processes from running
 popd Restore the previous value of the current directory
 pr Prepare files for printing
 printcap Printer capability database
 printenv Print environment variables
 printf Format and print data
 ps Process status
 pushd Save and then change the current directory
 pwd Print Working Directory
Q
 quota Display disk usage and limits
 quotacheck Scan a file system for disk usage
 quotactl Set disk quotas
R
 ram ram disk device
 rcp Copy files between two machines
 read Read a line from standard input
 readarray Read from stdin into an array variable
 readonly Mark variables/functions as readonly
 reboot Reboot the system
 rename Rename files
 renice Alter priority of running processes
 remsync Synchronize remote files via email
 return Exit a shell function
 rev Reverse lines of a file
 rm Remove files
 rmdir Remove folders
 rsync Remote file copy (Synchronize file trees)
S
 screen Multiplex terminal, run remote shells via ssh
 scp Secure copy (remote file copy)
 sdiff Merge two files interactively
 sed Stream Editor
 select Accept keyboard input
 seq Print numeric sequences
 set Manipulate shell variables and functions
 sftp Secure File Transfer Program
 shift Shift positional parameters
 shopt Shell Options
 shutdown Shutdown or restart linux
 sleep Delay for a specified time
 slocate Find files
 sort Sort text files
 source Run commands from a file
 split Split a file into fixed-size pieces
 ssh Secure Shell client (remote login program)
 strace Trace system calls and signals
 su Substitute user identity
 sudo Execute a command as another user
 sum Print a checksum for a file
 suspend Suspend execution of this shell
 symlink Make a new name for a file
 sync Synchronize data on disk with memory
T
 tail Output the last part of file
 tar Tape Archiver
 tee Redirect output to multiple files
 test Evaluate a conditional expression
 time Measure Program running time
 times User and system times
 touch Change file timestamps
 top List processes running on the system
 traceroute Trace Route to Host
 trap Run a command when a signal is set(bourne)
 tr Translate, squeeze, and/or delete characters
 true Do nothing, successfully
 tsort Topological sort
 tty Print filename of terminal on stdin
 type Describe a command
U
 ulimit Limit user resources
 umask Users file creation mask
 umount Unmount a device
 unalias Remove an alias
 uname Print system information
 unexpand Convert spaces to tabs
 uniq Uniquify files
 units Convert units from one scale to another
 unset Remove variable or function names
 unshar Unpack shell archive scripts
 until Execute commands (until error)
 uptime Show uptime
 useradd Create new user account
 usermod Modify user account
 users List users currently logged in
 uuencode Encode a binary file
 uudecode Decode a file created by uuencode
V
 v Verbosely list directory contents (`ls -l -b’)
 vdir Verbosely list directory contents (`ls -l -b’)
 vi Text Editor
 vmstat Report virtual memory statistics
W
 wait Wait for a process to complete
 watch Execute/display a program periodically
 wc Print byte, word, and line counts
 whereis Search the user’s $path, man pages and source files for a program
 which Search the user’s $path for a program file
 while Execute commands
 who Print all usernames currently logged in
 whoami Print the current user id and name (`id -un’)
 wget Retrieve web pages or files via HTTP, HTTPS or FTP
 write Send a message to another user
X
 xargs Execute utility, passing constructed argument lists
 xdg-open Open a file or URL in the user’s preferred application
Y
 yes  Print a string until interrupted


 

 
Share:

Sample Text

Copyright © Promoting Unique Content | Powered by Blogger Design by ronangelo | Blogger Theme by NewBloggerThemes.com