Image
Apparently, to people enamored of the ‘old school’ of hackers, like Steven Levy or Clifford Stoll, there is a big difference. Indeed, to the ‘old style’ MIT/Stanford hackers, they resent the bestowal of their honored title on ‘those people’ by the media… to many people, ‘hacker’ is reserved for a class of people in the 60s, a certain ‘breed’ of programmer who launched the ‘computer revolution,’ but just can’t seem to be found around any more… according to these ‘old school’ hackers, hacking meant a willingness to make technology accessible and open, a certain ‘love affair’ with the computer which meant “they would rather code than sleep.” It meant a desire to create beauty with computers, to liberate information, to decentralize access to communication…

But what about the ‘new’ hackers? Many of the ‘old’ hackers think they don’t deserve the name, preferring to call them ‘computer criminals,’ ‘vandals,’ ‘crackers,’ ‘miscreants,’ or in a purely generational swipe, ‘juvenile delinquents.’ The media uses the word ‘hacker’ to refer to young, clever computer users who use their modems to break into systems without authorization, much as depicted in the movie War Games. And the old school hackers resent this. Many of the new hackers aren’t good programmers; they are just people without ethics who have no reservations about swiping passwords, codes, software, and other information and trading them with their friends. They may be good at exploiting security holes in systems, but all they succeed in doing (say people like Stoll) is destroying the trust on which open networks are built.
Image

I am interested, needless to say, in the generational aspect to this battle over the name ‘hacker’. Most of the old hackers of the 60s are of course now living in the 90s – Baby Boomers who, like their ex-hippie friends, went from ‘freak’ to ‘straight,’ finding jobs in computer security firms and corporate software conglomerates. And like other counterculturalists from the 60s, they just can’t seem to figure out this Generation X forming the counterculture of the 90s… where’s the openness? The idealism? These “juvenile delinquents” just don’t live up to the high moral standards of the 60s nostalgiacs like Levy and Stoll. But then, Levy rants about those great hackers who founded Apple Computer and launched the PC revolution – those same ex-phreaks, Jobs and Wozniak, who actually allowed their company to patent their system hardware and software!

The “cyberpunks” of the 90s, it seems, just don’t live up to what people like Stoll and Levy expect of them. And all the old ‘hackers’ go to great pains to define themselves apart from the new breed of ‘hackers,’ always groaning in angst when the label continues to be applied to them. I would argue that the hackers of the 90s are not so different from the hackers of the 60s, that indeed, the same exploratory, antiauthoritarian, liberatory impulses are at work; it is simply that the hackers of the 60s do not understand the situation in which we live, and this is probably because they read 60s hippie lit rather than 90s cyberpunk SF… the ‘old hackers’ are simply too comfortable to be afflicted… they don’t understand why the new ‘hacker’ does what he does.

According to Levy, the differences between the old and new hackers are stark and clear. The first group strove to create, the second strives to destroy and tamper, he says. The first group loved control over their computers, but the second group loves the power computers gives them over people. The first group was always seeking to improve and simplify; the second group only exploits and manipulates. The first group did what they did because of a feeling of truth and beauty in their activities; the second group hacks for profit and status. The first group was communal and closely knit, always sharing openly their new hacks and discoveries; the second, he says, is paranoid, isolated, and secretive. For Levy, the old hackers were computer wizards, but the new hackers are computer terrorists, always searching for new forms of electronic vandalism or maliciousness without thought of the consequences.

But where Levy sees differences, I see some curious similarities. Old-style MIT ‘hackers’ were rather well-known for getting around locks of both the physical and electronic variety. Is there such a difference between the righteous anger of the MIT hacker toward the IBM ‘priesthood’ who kept him away from the massive mainframe, and the 90s hacker who feels righteous anger over being prevented access from huge commercial databases without an expensive account? The old MIT hackers were also known for their exploration of the phone system, and exploring ‘hacks’ to make calls to unsuspecting places for free. Indeed, many of the early hackers were phone phreaks, plain and simple, ripping off service from the phone company (THE company, AT & T, alias Ma Bell, back then), which they resented for its refusal to share the technical information about telephony.

The 60s hackers were known for their desire for liberating information. They openly shared source code; members of the Homebrew Computer Club also openly shared with each other the flaws of various machines, and ‘hacks’ to get around their lack of performance. Since Levy seems to think that software piracy should not be a crime (since he thinks source code should not be copyrighted), his problem with the ‘new hackers’ does not appear to be piracy. Neither does it appear to be the open sharing of some admittedly dangerous ‘real-world’ information taken straight from books like the Anarchist Cookbook on how to make bombs and drugs. Rather, it seems to focus around the malicious misdeeds of a small minority, dedicated to spreading Trojan horses, logic bombs, viruses, worms, and other destructive programs…

In actuality, the majority of viruses (such as the Christmas virus) are harmless. They eat up small fractions of CPU space and are designed, rather than to wipe clean someone’s hard drive, to just display a message at a given time. They are, in short, pranks – something that Levy also points out the old MIT hackers were overfond of. They were known for playing complex tricks on people, and were masters of “social engineering” – the art of manipulating technocrats by being a good bullshit artist – just as the 90s hackers are… their elaborate games and pranks often being ways to demonstrate their superiority to the faculty, administrators, or other “know-it-alls” who they felt got in their way of their access to computers…

In “invading” corporate voicemail systems, the modern 90s hackers are no different than the 60s MIT hackers mapping out the labyrinths of the MIT underground tunnel system. They do it for the same reasons: because they are told not to, because the conduits often lead to surprising places, because the activity is basically harmless even though it is declared unauthorized or even illegal, and because it gives them a feeling of mastery and control over a complex problem. The simple fact is, most of the 90s hackers are not wantonly malicious or destructive. Indeed, many subscribe to an updated 90s Hacker Ethic, declaring that they will not “hack” personal privacy or the personal computer user, instead declaring that their “targets” will be large, unresponsive corporations or bureaucratic government organizations…

But the main reason for the difference between the 60s and 90s hackers is that the GenXers are a “post-punk” generation, hence the term, “cyberpunk.” Their music has a little more edge and anger and a little less idealism. They’ve seen the death of rock n’roll, and watched Michael Bolton and Whitney Houston try and revive its corpse. Their world is a little more multicultural and complicated, and less black-and-white. And it is one in which, while computers can be used to create beauty, they are also being used to destroy freedom and autonomy… hence control over computers is an act of self-defense, not just power-hunger. Hacking, for some of the new ‘hackers,’ is more than just a game, or a means to get goodies without paying for them. As with the older generation, it has become a way of life, a means of defining themselves as a subculture…

Many of them are quite deliberately ‘nonviolent’ in their ambitions. They will not lock others out from their accounts, damage or change data without permission, or do anything to jeopardize system viability. Instead, they enter computer systems to 1) look around and see what’s there (if someone breaks into your house, looks at the posters on your wall, then locks the door on the way out, have they committed a crime?) 2) see where else they can go from where they are (what connections can be pursued?) and 3) take advantage of any unique abilities of the machine that they’ve accessed. MIT’s hackers did all of these things and more with the various mainframes they were ‘forbidden’ to access and explore… they questioned the right of technocrats to limit access, and openly transgressed their arbitrary limitations based on invoked mantras of the preciousness of computer time.

Indeed, the 90s hackers pay a lot of homage to the first generation. They have borrowed much of their jargon and certainly many of their ideas. Their modus operandi , the PC, would not be available to them were it not for the way the 60s hackers challenged the IBM/corporate computer model and made personal computing a reality… their style, their use of handles, their love for late-night junk food, are all testaments to the durability and transmission of 60s Hacker culture. So why are the biographers of the 60s hackers so antagonistic and hostile to the new 90s hackers? Do they sense some sort of betrayal of the original Hacker Ethic and its imperatives? Is it just the classic refusal to pass a torch onto a new generation?

Breaking into the root node of a UNIX network or the system manager account of a VAX network takes nimble thinking and clever programming. It often takes a knowledge of various loopholes in the system, and clever tricks that can be done with its coding. It often requires unorthodox uses of standard applications. In short, it requires hacking in the oldest and best senses of the term. In doing it, many 90s hackers seek to expand their knowledge of the system and its capabilities, not to sabotage the efforts of others or wreck the system. Phreaks, in ‘hacking’ the phone system, are simply acting in the centuries-old tradition of American radicals who have always challenged the ways in which corporate and governmental structures prevent people from free association with their peers… challenging the notion that “to reach out and touch someone” should be a costly privilege rather than a right.

Someday, the old and new ‘hackers’ may sit down, and discuss their commonalities rather than their differences. They may realize that they share an alienation from the existing system. They might find out that they have motivations and principles in common. Most importantly, they might stop competing with each other for a mantle or title. The old hackers might see the ways in which their countercultural visions failed to take account of new realities, and they might provide a sense of communal vision and purpose for the often backstabbing and self-aggrandizing new hackers. If they were to actually team up, it might be mean what Bruce Sterling calls “the End of the Amateurs.” And the beginning of “Computer Lib?” by Steve Mizrach (aka Seeker1)

Image

Below is a List of Top 10  Free Android Medical Applications for Doctors and Medical Students.

1. Medscape

Download From Google Play Store

Medscape is the leading medical resource most used by physicians, medical students, nurses and other healthcare professionals for clinical information.
Used by over 2 million registered users.

APP FEATURES:


MEDICAL NEWS FROM MEDSCAPE NEWS
– Medical news and critical alerts available in 34 specialty areas (updated daily). Select the specialties you want to follow. 
– Search our entire Medscape News and MEDLINE databases right in app. 
– Ability to save and email articles, share articles on Facebook, and read offline. No Internet connection required.
CLINICAL REFERENCE FROM MEDSCAPE REFERENCE
Drugs:
– Prescribing & safety information for 8,000+ brand & generic drugs, OTC drugs, and herbals & supplements 
– Drug interaction checker (input up to 30 drugs, herbals and/or supplements at once) 
– Save commonly searched drugs to a personalized ‘saved’ list for easy access 
– Special features include pill images, detailed drug pricing, pregnancy & lactation guidelines, and more

2. Epocrates

Download From Google Play Store

More than 1 million active members, including 50% of U.S. physicians, rely on Epocrates to enable better patient care by delivering the right information, right when it’s needed.
Healthcare professionals worldwide use Epocrates routinely to:
-Review drug prescribing and safety information for thousands of brand, generic, and OTC drugs
-Check for potentially harmful drug-drug interactions among up to 30 drugs at a time
-Select national and regional healthcare insurance formularies for drug coverage information
-Identify pills by imprint code and physical characteristics
-Perform dozens of calculations, such as BMI and GFR
-Access timely medical news and research information
Disease information, alternative medications, lab guides and more clinical tools and content are available by upgrading to an Epocrates Essentials subscription.

3. Skyscape

Download From Google Play Store

The Skyscape Medical Resources app is used by more than 2.5 million healthcare professionals (HCPs) to access the medical resources they know and trust at the point of care. This valuable decision-support tool helps physicians, nurses, students and other HCPs find the right answers, right away.

EVERYTHING YOU NEED IN ONE APP
• The free Skyscape app comes loaded with a valuable package of medical resources, including drug information, medical calculators and clinical information on over 850 topics.
• You can purchase any of more than 600 premium resources in 35 medical specialties and access all of them from within this one convenient app. 
• Robust features include SmartLink™, Skyscape’s proprietary cross-reference functionality; medical calculators; algorithms; interactive images; flowcharts; and frequent content updates.
INCLUDED FOR FREE
• RxDrugs: Comprehensive information on thousands of brands and generics, with interactions (including multi-drug analyzer tool), pill images and over 400 integrated dosing calculators. This resource also includes formulary information covering 5,000 health plans in all 50 US states.
• Archimedes: Medical calculator with more than 200 interactive tools, organized by specialty.
• Outlines in Clinical Medicine: Evidence-based clinical information on hundreds of diseases and symptom-related topics, presented in convenient outline format.
• MedAlert™: In-context and specialty-focused journal summaries, trial results, breaking clinical news, drug alerts and other information, fully integrated with the app’s global search and SmartLink.

4.Quick LabRef

Download From Google Play Store

Quick LabRef for Android (Quick Clinical Laboratory Values Reference) provides quick look at the up-to-date information on the most commonly used clinical laboratory values and other useful relevant information such as lab data in Microbiology, Physiology / Pathophysiology, Toxicology and etc. Normal values reference are provided in both Conventional Units (CU) and, whenever available, in units of the “Sistème International” (SI).

5. Calculate by QxMD

Download From Google Play Store

Essential tools in General Practice, Internal Medicine, Cardiology, Surgery, Obstetrics, Nephrology, Hematology, Orthopedics, Pediatrics, Gastroenterology, Neurology, Neurosurgery, Respirology, and more.

“We recommend medical users try the free Calculate by QxMD first…”
-from iMedicalApps review “The best free Medical Calculator apps for the iPhone”
‘Calculate’ is focused on highlighting tools which are actually useful in clinical practice and serve to impact diagnosis, treatment or determining prognosis.
Helping you make decisions, not just calculate numbers…
Features
• Developed by a collaboration of clinician experts from diverse backgrounds
• Converts recent research publications into practical handheld tools – knowledge translation at its best
• Automatically adapts to your self-described clinical practice
• Unique ‘Question Flow’ technology gets you answers, fast
• Detailed references with Pubmed integration
• Comprehensive and insightful results
• Elegant design and intuitive interface
• SI and Conventional units
More than 150 Unique calculators and Decision Support tools
While too extensive to list them all, here is a small sampling of included content:
Reduce and predict perioperative complications
• WHO Surgical Safety Checklist
• Predictive models for cardiac surgery and coronary angiography
Guide treatment
• Determine cardiovascular risk and guide lipid treatment using the Framingham and Reynolds Risk Scores
• Use the CHADS2 score to guide treatment in atrial fibrillation
• Better understand the risk of bleeding from anticoagulation in atrial fibrillation
• ACS using the TIMI risk score
• Burns with rule of 9s and Parkland formula
• Hypernatremia (calculate water deficit)
Determine Prognosis
• Heart failure
• Lymphoma
• Myelodysplastic Syndrome
• Myeloma
• Glomerulonephritis
• Hemodialysis
• COPD
• TIA
• Pancreatitis
Dose
• Chemotherapy based on Body Surface Area
• Carboplatin based on AUC
• tPA in acute stroke
• Phenytoin in renal failure and hypoalbuminemia
Calculate
• Ideal body weight, BMI and BSA
• Due date and gestational age
• Extensive formula used in echocardiogropathy and invasive hemodynamic monitoring
• Kt/V in dialysis patients
• eGFR with CKD-Epi, Cockcroft-Gault, and MDRD
• A-a gradient
Classify
• Angina (CCS)
• Congestive heart failure (NYHA)
Manage
• Head, neck, ankle and knee injuries
• DVT and PE
• Pulmonary nodules
Stage
• Lung cancer
• Renal cell carcinoma
Understand
• TTKG (transtubular potassium gradient) in hypokalemia and hyperkalemia
• Dermatomes
Diagnose
• Heparin Induced Thrombocytopenia
• Infective Endocarditis
• ARDS
• Autoimmune Hepatitis

6.Speed Anatomy Quiz Free

Download From Google Play Store

How fast can you point to your liver, gall bladder or incisor? Do you know the difference between the auricle and the utricle? Speed Anatomy is an addictive game that tests your speed and challenges your knowledge of human anatomy! It is the most fun anatomy quiz out there. Don’t use boring flashcards when you could use Speed Anatomy!

-Contains close to 300 labeled parts from all the main regions of the body.
-Earn points for precision and speed.
-A magnifying glass appears when holding your finger on an image allowing you to achieve more precision and higher scores.
This games is fun for everyone plus it makes life easy for those tackling anatomy for high school, university or even medical school. Practice mode allows you to learn specific regions without doing all the previous levels.
Contains 28 levels including an overview of bones, muscles, arteries, veins, respiratory system and digestive system also more detailed levels covering bones, lungs, pharynx, larynx, nasal cavity,oral cavity, dentition, liver, pancreas, brain, auditory system and visual system.
Also try Speed Bones MD, Speed Muscles MD and Speed Angiology MD for more in depth levels of bones, muscles and the circulatory system in the best anatomy quiz format!

7.Prognosis : Your Diagnosis

Download From Google Play Store

– Top medical app with over 1,500,000 downloads ! 
– Featured in Discover Magazine as ‘Dr House for Doctors’ 
– Winner of the prize for the Best Health App at the World Summit Awards for Mobile Apps, 2012 
– Selected as “One of the five best apps for Doctors” by the Royal College of Surgeons of England (RCSE)
Want to get the gist of a clinical case study in 2-3 minutes? Try Prognosis : Your Diagnosis – The first and only free Android game that lets you investigate, deduce and diagnose complex clinical cases within minutes with our fun, interactive cartoon-style narrative.
Prognosis is specially designed for Doctors, Medical students and Nurses and each case helps to learn or recall two or three key clinical points that can be applied in your practice.
The cases also provide excellent preparation for the USMLE Step 2 CS, COMLEX, NCLEX, CCRN and MCAT exams, as well as other board examinations and professional licensure tests.
You can use it while waiting for coffee or on the bus, quickly complete a case, learn something new and make the maximum use of your time.
The content is modeled on real life patients, has been checked by a panel of expert medical specialists and is based on current management guidelines.
A new case is added each week. The app will let you know as new cases are added

8.Visual Anatomy Free

Download From Google Play Store

OVERVIEW: 
Visual Anatomy Free is an interactive reference, and education tool. Now it include a rotational organ 3D overview model!! It contains 58 high-resolution images and more than 300 feature points which can be interactively selected. Each feature has its own label and short description. The app also has search function which can be used as searching the labels of all feature points. 8 overview images from Gray’s anatomy. Full version has all 1247 images.
In additional, a quiz with 23 multi-choice questions also is included.
USES: 
This app’s primary use is as a learning tool but can also be used for any professional who needs the occasional reminder. Additionally, this app is ideal for physicians, educators or professionals, allowing them to visually show detailed areas to their patients or students – helping to educate or explain conditions, ailments and injuries.

FEATURES: 
•Support English and French (Français) languages.
•muscle description (ORIGIN, INSERTION, NERVE, ACTIONS).
•Tap and Zoom – Pinch zoom into and identify any region, bone or other feature by tapping on the screen. 
•Quiz mode – test yourself with an option to switch off the label of the feature point. 
•Quick Navigation – jump to a different system or organ by selecting the thumbnail. 
•Multi-choice quiz. 
•High-resolution images.
•Free periodic updates.
CONTENTS:
Organ 3D, Muscular System (anterior, posterior and lateral views), Skeletal System (anterior, posterior and lateral views), Circulation System,Body Region,Heart, Respiratory System, Digestive System, Urinary System, Nervous System, Female and male Reproductive Systems, Ear Structure, Nasal Cavity, Eye.
HOW TO USE:
The user is presented with a high-quality anatomy images. The user can zoom in to any area by tapping on the zoom in button and using the single finger panning function. The feature point (cross) can be selected by tapping on it. Detail button allows you to switch on/off the short description. For muscle section, detail button only show the description. Quiz mode button allows you to switch on/off the label and short description.

9. PubMed Mobile

Download From Google Play Store

Search PubMed database with over 21 million citations for biomedical articles and life science journals
Features
Keyword search with options
Save search query
Save citations
Email citations
View abstract
link to full article if available
Post a comment for an article to public
Write a note to yourself
View public comments for an article
search by PubMed ID, just enter the id in the search box
Pro version has more feature. Please give a try


10. Ob (Pregnancy) Wheel

Download From Google Play Store

Calculate dates of pregnancy:

-Last menstrual period (LMP)
-Estimated date of conception
-Weeks gestational age (WGA)
-WGA obtained by ultrasound
-Estimated due date (EDC)
-Adjust length of cycle and luteal phase
-Store multiple patients for easy retrieval

CREDIT GOES TO—- MEDICONET BLOGSPOT- Visit their blog for more medical articles and videos-That’s if you are a medical profession or a student

*Giggling* In 2030 we’ll have no privacy at all, the private thing you will have private will be your name; and that you will be forced to share too /0\

Rescuing an SD card with an Arduino

Create your own privacy cause right now you have none *Smirking*

Krypt3ia

Zlx kpkmn qp hbx ieandl bh hi lxjywy kx hbxbr bcjzwgy, lhnzix, jczsll, tnp cxmmvzw, tzhmsmv eblxtsalsitx yitkjljm cxr mxbzgpwz, aagpe gvx gy xscftmep, yfk vh Cekkhrym urofe bsesw, icm athg wvtvclzy vtuec, kbxiuvmxk fd Icdv ik tfrgjtimosg, tuh uutdwwneadjq kmlivbuprl njo dftve fm tl axgvvalh, fhf dvy ixremfz wk zlbgnw yi do gybsep.

Revelations

Some of you out there may be shocked and dismayed that the NSA and the FBI as well as other “customers” in the IC world have been collecting vast amounts of data from sources like Verizon (telco) and Google (internet) sources. Others already knew this but perhaps did not understand the sheer scope of the hoovering that has been going on. Myself, well I have had an inkling since I read the manuals for the NARUS STA-6400 system back in 2003 I think it was. That system was the progenitor of what we are seeing…

View original post 1,750 more words

Image
Hello Everyone , Today this part of the cryptography contain the most of the terms that will be used frequently in the upcoming tutorials so, for your ease I have made this Glossary or dictionary whatever you might say . Do refer this as a guide.

A5:The encryption algorithm used for GSM telephones. These telephones are mainly sold in Europe.

AES :Advanced Encryption Standard. A block cipher that was chosen through a competition of the world’s greatest cryptographers. It is approved for government use by NIST and is assumed to be good for the next 20 years before a replacement needs to be found. Also known as Rijndael (rine-doll) for the two people who created the algorithm.

Algorithm :A set of mathematical step-by-step rules, or a recipe, for the encryption and decryption of data.

ANSI :American National Standards Institute. An organization that evaluates and publishes standards for various industries, including the computer technology industry.

ANSI X9.17 :The standard for the exchanging (or sharing) of the key for the DES algorithm.

Application Encryption :A program that uses an algorithm to encrypt data. PGP is an example of an application that has encryption built-in.

Asymmetric Algorithm :An algorithm that produces two keys; a public key and a private key. The public key is shared with others and the private key is kept safe by the owner. The term “asymmetric” has to do with the fact that there are two different keys — it does not mean that the algorithm is lopsided.

Authentication :The process of making sure that a person is really who he says he is, or that a computer is really the computer it’s supposed to be. It’s like being asked for your driver’s license before you can cash a check. Computers use encrypted keys or encrypted communications to exchange proof of identity.

Back Door :Usually a design flaw in software that allows unauthorized access into a system by those who know the secret.

Block Cipher :An algorithm that encrypts data and cuts the data into small chunks and encrypts the
chunks one after another. The “chunk” is a block of data and the algorithm decides how large those chunks are. This term was not invented by Lucy in the “Peanuts” comic. (You blockhead, Charlie Brown!)

Blowfish :A symmetric block cipher invented by Bruce Schneier. Publicly available on the Internet.

Browser :Your Web browser such as Internet Explorer, Mozilla, Netscape, or Opera. All browsers now have the capability to exchange data with another computer via an encrypted link. Although this term is also applied to shoppers who are not actively purchasing goods in a particular shop, that has nothing to do with cryptography.

Brute Force Attack :It’s like trying to break into a building by all possible hard attack methods: picking the locks, breaking the windows, breaking down the doors with a sledge hammer, or using bombs. In cryptography, a brute force attack is used when the attacker knows nothing about the encryption. He will start with easy guesses first and then build up to sophisticated methods. Brute force attacks in cryptography usually entail using lots of computers that try to guess each portion of the key or the encrypted message.

CAST :A block cipher developed by Carlisle Adams and Stafford Tavares (CAST) and patented by Entrust. It is available for public use.

CERT :Computer Emergency Response Team. A special team that has been formed to deal with computer emergencies of all sorts. Some companies form their own teams and other companies rely upon commercial CERTs. There is also a central CERT at Carnegie Mellon University in Pennsylvania. That CERT sends out alerts and information about new computer attacks and fixes.

Certificate :(See Digital Certificate.)

Certificate Authority (CA) :A company or a specially built computer within a company that generates and controls Digital Certificates and the accompanying keys. This is also referred to sometimes as a “trusted third party” because it is supposed to be an unbiased yet powerful authority.

CHAP :Challenge Handshake Authentication Protocol. Largely used in Microsoft products, CHAP is a two-way password authentication scheme.

Checksum :A numeric value assigned to data to be used as an indicator of change made to the data. An algorithm changes the data into numbers, goes through a number of computations, and then assigns a single, long number as the checksum. If the checksum of the data you receive is not the same checksum as the person who sent it, then something got changed in transit. Also known as a “fingerprint,” checksums are used to check the integrity of data. Checksum is also what many people do with their checking accounts at the end of the month.

CIAC :Computer Incident Advisory Capability (pronounced “sigh-ack”). This is an organization formed by the Department of Energy to track and report on computer security problems.

Cipher :The word cipher is very often confused with the word “code.” A cipher is closer to an algorithm. It does not know the “semantics” of the text or data it is converting; as far as a cipher is concerned, it’s just a blender of sorts. It’s the part of the algorithm that replaces one letter with another character. (Also see Code.)

Cipher Block Chaining :Also known by cryptographers as CBC, this is like “shuffling” the encrypted blocks of data with one another to come up with different ciphertext. Using cipher block chaining makes it much harder for someone to try to break an algorithm.

Ciphertext :The encrypted form of data. Ciphertext does not have to be text, it can be any form of data including pictures and music.

Client :Usually a desktop computer or a laptop. This is opposed to “servers.” Servers provide data, services, and resources to the client computers. Just think of clients as customers in a restaurant and the servers as waiters, and you’ll get the meaning. Client can also refer to a software program that runs on a desktop computer or a laptop. This type of program is normally used when the server is sending a special type of information that can’t be understood by other programs.

Code :A code is just a set of rules to represent meaningful information in another way — this doesn’t necessarily imply secrecy. A code does deal with symantics and can tell the difference between a letter and a number. Morse code and programming code are two good examples.

Cracking :An action to try to break the security of a computer system, software program, algorithm, encrypted data, and so on. For instance, attackers will try to crack the key to encrypted data so they can decrypt it and see what it says. This has nothing to do with the eating of Maryland crabs, contrary to popular belief.

Cryptanalysis :The examination of encrypted data to try to discover how the data was encrypted. Cryptanalysts will try to find the key or some plaintext in the encrypted data so they can unlock it. In a way, this is similar to “cracking,” but it is usually done by well-meaning folks employed by the NSA. (And, yes, because they are in Maryland, many do eat crabs.)

Cryptography/Crypto :The art or science of finding ways to hide or change data. The main goal of cryptography is to maintain secrecy – it’s a way to transform plain data (pictures, music, text, software, and so on) from a recognizable form to an unrecognizable form and back again. Cryptography is also the technical field of creating methods of changing data into an unrecognizable form and then reversing the process to make it recognizable again.

DES :Data Encryption Standard. A popular symmetric key algorithm that was created in 1975. It is usually replaced now with 3DES, which is much stronger than the original algorithm.

Diffie-Hellman :An algorithm created by Whitfield Diffie, Martin Hellman, and Ralph Merkle to solve the problem of how to share a secret over an unsecured line without compromising the secret. This became the basis for public/private key exchange.

Digital Certificate :A computer file that contains information about a person or a computer, along with a public encryption key. Digital Certificates have a standard format for the information contained so it can be used in many different encryption programs. A Digital Certificate is issued by a Certificate Authority. The Digital Authority usually has strict regulations about who or what may receive a Digital Certificate. Identities are usually verified by the Certificate Authority, which implies a greater degree of trust.

Digital Signature :A checksum created by an algorithm, combined with a person’s public key, that is based on a block of data and the person’s private key. The result is a character-based string that is included with the data when it is sent. If the data has been changed en route, it will be reflected in a changed digital signature. A digital signature is used to guarantee that the data was sent by the person who claims to have sent it. In one sense it can be considered a type of notary stamp to prove authenticity.

Digital Signature Standard :This is also referred to as DSS and is the algorithm used to create digital signatures. DSS was developed by the NSA and approved by NIST.

ECC :Elliptical Curve Cryptosystem. A relatively new and unique form of encryption that uses mathematical curves over defined fields to create a public/private key pair.

Encipher/Encrypt :Changing plain data (plaintext) into an unreadable or unrecognizable form (ciphertext).

Exclusive Or :(See XOR.)

Export Control :Laws and regulations to prevent products or technologies from being exported from the United States when exportation of that information is not in the best interest of the country. The United States considers cryptography to be munition and therefore controls the export of some encryption methods and products.

FIPS :Federal Information Processing Standard. Rules and regulations adopted by the federal government for computer systems, computer security, and the implementation of cryptography.

FORTEZZA :A PCMCIA card that contains the SKIPJACK encryption algorithm. This is mainly used by government agencies and some law enforcement agencies to encrypt e-mail. This term is often confused with foccacia, which is actually a type of Italian bread and has nothing to do with cryptography.

GOST :A symmetric block algorithm developed in the former Soviet Union.

HASH :A type of checksum that produced a fixed string of characters from a section of data that is used as a “fingerprint” of the data. If the data has not been changed, you will always get the same hash; if it has changed by only one character, the hash will not be the same as the original.

IDEA :The International Data Encryption Algorithm was developed in Switzerland and is one of the algorithms that is used in PGP.

IETF :The Internet Engineering Task Force is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.

IKE :This stands for Internet Key Exchange and is used by the protocol IPsec (secure IP) for key management.

IP :Internet Protocol carries individual data packets on a network. It allows the packets to be routed through multiple networks until it reaches its destination.

Ipsec :A network security protocol that uses encryption to protect data as it is moving through the network.

ISAKMP :Internet Security Association Key Management Protocol was the basis for IKE and is still used in many networking environments. ISAKMP defines payloads for exchanging key generation and authentication data.

KDC :Stands for Key Distribution Center and is the basis of the Kerberos authentication system. It is a device or computer that allows two computers to encrypt the traffic flowing on the network between them. Not to be confused with KFC, which is fine to eat on a 4th of July picnic.

KEK :A Key Encryption Key is used to encrypt other keys such as session keys or data keys. A KEK does not encrypt any of the data itself, it just sets up the environment so that encryption can begin.

Kerberos :An authentication protocol, developed at MIT, that uses session keys. Available commercially and in the public domain.

Key :The data created by an algorithm that causes a cipher to begin the encryption and decryption process. Keys are associated with the algorithm that was used to create it.

Key Escrow :The storing of copies of encryption keys so they can be used if the original key is lost or corrupted. This is very difficult to do securely.

Key Fingerprint :A unique string of characters that is used to authenticate a key. This is done by creating a hash of the key. Usually used by PGP users to verify that the parties are using the correct keys for encrypting and decrypting communications.

Key Length :The size of a key represented in bits. The larger the number of bits, the stronger the key is.

Key Management :The process and procedures uses to safely store and distribute keys. It also makes sure that keys are sent out in a secure manner so they won’t be compromised.

Key Pair :A set of keys created by an asymmetric algorithm: the public key and the private key.

Key Recovery :A method of hiding parts of keys in different places so a key can be reassembled if the original key is lost or corrupted. Key recovery usually involves the use of multiple storage locations and multiple passphrases to complete the recovery process.

Key Splitting :A security measure that splits a key up amongst a number of people so no one person on his own can use the key. All members of the group must participate in order for the key to be used.

Keyring :A program or file that holds a set of keys.

LDAP :Lightweight Directory Access Protocol. A protocol used in databases to allow simple search and access operations for data that is usually hard to index — phone numbers, addresses, and now used for encryption keys.

MAC :Message Authentication Code. A one-way hash that uses a single key. The key is used to verify the hash.

MD2 :Message Digest #2. Developed by Ron Rivest, it’s a 128-bit one-way hash.

MD4 :Message Digest #4. Another one-way hash developed by Ron Rivest, but later found to be very weak. It was replaced with MD5.

MD5 :Message Digest #5 is an algorithm used to create a hash.

NIST :National Institute of Standards and Technologies is a government agency that establishes national standards.

Non-Repudiation :A process that, once completed, makes it extremely difficult for someone to deny that they were involved in the process. It’s a method of ensuring that someone sent a file or encrypted a file without “reasonable doubt” that they did so.

NSA :The National Security Agency is an intelligence agency responsible for intercepting communications and developing crypto systems for the security of national secrets. This agency employs the largest number of cryptographers in the world.

Oakley :A protocol for a session key exchange that is a hybrid of the Diffie-Hellman scheme.

One Time Pad :Also known as OTP, this is one of the older but most secure forms of encryption. A person creates a pad of completely random characters and then uses that pad to replace the characters in a message, one by one. If the pad is never used again, it is nearly impossible to break.

One Time Password :A security mechanism in which a password is only used one time and never again. These passwords are usually generated by a small card-like device that is synchronized with an authentication server.

One Way Hash :Also known as a one way function, this is the same as a message digest or a fingerprint. It’s called “one way” because the algorithm creates an encrypted string that cannot be decrypted. The encrypted string is used for comparison only.

PAP :Password Authentication Protocol. This protocol allows users to authenticate with one another but does not prevent unauthorized access.

PCMCIA :Stands for Personal Computer Memory Card International Association. It’s a plug-in slot for peripheral devices such as modems and wireless network access cards. There are also PCMCIA cards that store crypto functions and keys.

PGP :Short for Pretty Good Privacy, this is cryptographic protocol for encrypting e-mail. PGP uses RSA and IDEA algorithms and comes as a complete software package.

PKCS :Public Key Cryptography Standards. This is a standard for keys that was created by RSA and describes how public/private keys can interoperate with various algorithms.

PKI :Public Key Infrastructure. A system that uses public and private keys for encryption and decryption, but also checks to make sure that the correct keys are being used for any transaction.

Plaintext :Data that is in its original form and has not been decrypted. Also, it’s the data after decryption has taken place.

Private Key :One of a pair of keys created by an asymmetric algorithm that are mathematically linked to encrypt and decrypt data. This key belongs to one person (or computer) and is kept safely secret. (Also see Public Key.)

PRNG :Pseudo Random Number Generator. A process or algorithm that generates a random sequence of numbers. A good PRNG will make it nearly impossible to guess what the next number or numbers in a sequence might be. Used in key generation in algorithms.

Protocol :In computer technology, a protocol is an accepted set of rules for computer communications or the transference of data. A protocol goes into a detailed level of instructions for the behavior of any software, hardware, which ports to use, and so on.

Public Key:One of a pair of keys created by an asymmetric algorithm that are mathematically linked to encrypt and decrypt data. This key can be shared with anyone and everyone without fear that it will give any clues as to what the private key might be. (Also see Private Key.)

RADIUS :Remote Authentication Dial-In User Service. A protocol developed to help secure remote access to networks by persons, computers, and other networks. Originally developed to secure modem banks, it is now used to secure remote network connections.

RC2 :Rivest’s Cipher #2 or Ron’s Cipher #2. Named after Ron Rivest, this is a block cipher that uses a 40-bit key that is considered very weak.

RC4 :Rivest’s Cipher #4. This is a stream cipher that is widely used in commercial products and especially in e-commerce transactions.

Reusable Passphrase :A passphrase that can be used over and over, with no limitations. Most passphrases are reusable.

Revocation :The retraction or cancellation of a certificate and its associated keys.

RNG :Random Number Generator. An algorithm or cryptographic device that can create true random numbers. True random numbers are often generated by physical and natural events that cannot be predicted and occur randomly.

RSA :Stands for Rivest, Shamir, Adelman, which are the last names of the three men who created the RSA algorithm and the RSA company (RSA Data Security). The RSA algorithm creates public/private keys and can be used to create a digital signature (among other activities).

Salt :Random data that is mixed in with a password to help foil dictionary attacks on passwords.

Secret Key :The key created by a symmetric algorithm. This key is used to both encrypt and decrypt data.

Seed :A random value that is added to an algorithm to help begin the generation of a pseudo random number. (See PRNG.) This is not to be confused with the seed generation used in tennis tournaments.

Server :Usually a large and powerful computer used to store and disseminate large amounts of data and/or services to desktop computers and laptops on a network (clients). Servers are also used for storage and important applications.

Session Key :A key that is only used for a short period of time: a session. The key is normally used to encrypt data between two machines only and is thrown away when the session is complete.

SHA-1 :Secure Hash Algorithm #1. An algorithm used to create a one-way hash. It’s similar to MD4.

SHTTP :Secure HyperText Transfer Protocol. This is a change to the regular HTTP, which is used to display Web pages. HTTP adds cryptological services to HTTP for the encrypted transmission of sensitive data over the Web.

SKIP :Secure Key Interchange Protocol. This protocol is used in the IPsec headers. The headers contain information about keys that are being exchanged over the network. The header contains information such as what type of key is included, its destination and source, and the application associated with it.

SKIPJACK:A block cipher developed by NSA and often used in hardware crypto devices.

S/MIME :Secure Multipart Internet Message Extensions. This protocol is added to e-mail programs so e-mail can be encrypted and the contents kept secret.

SMTP :Simple Mail Transfer Protocol. The protocol used to transmit e-mail between servers. SMTP traffic is not encrypted.

Snake Oil:A derogatory term used to describe marketing language that is deceptive and misleading, often stating that the encryption or crypto device does more than it is able to do.

Sniffing :A method of listening in on network traffic and capturing it. A special sniffer program is run on a computer on the network and captures and stores the information it was told to save. Very similar to eavesdropping. Hackers use these programs to capture UserIDs, passwords, encryption keys, and other important data.

SSL :Secure Sockets Layer. A cryptologic protocol that is added to data at the socket layer so a secure, encrypted link can be established and maintained. This protocol is often added to applications and is primarily used to protect Web communications.

Stream Cipher :A symmetric key cipher that encrypts data bit by bit rather than cutting the date into chunks like a block cipher does.

Symmetric Algorithm :An algorithm that creates a single key to both encrypt and decrypt data. This is sometimes called a “secret key” algorithm because the key is never supposed to be made available to the public and must be kept secret.

TACACS+ :Terminal Access Controller Access Control System. Does the title somehow give you an idea that this protocol is used to control access to something? It is. It was developed by Cisco and is used to authenticate and authorize remote access by persons or machines.

TCP/IP :Transmission Control Protocol/Internet Protocol. A suite of protocols used for networking that has become the de facto standard. Even networks that use other networking protocols will include TCP/IP so other networks can communicate with them.

TLS :Transport Layer Security. This is a draft version of a new security protocol to replace SSL.

Token :A hardware device that is used to authenticate its owner to computers and applications on a network. A token can be a one-time password generator, a physical device that plugs into a socket, a smart card that is run through a reader, or another similar device.

Triple DES :Also known as 3DES, this algorithm is basically the same as DES except that it encrypts each block of data three times instead of once.

Twofish :A new symmetric algorithm that was one of the runners up to become the new AES algorithm for government use. It is freely available on the Internet.

Validity :The level of confidence a person has that a key actually belongs to the person who presented it.

Verification:Comparing a digital signature created with a private key to its public key. This proves that the information was sent by the person who actually digitally signed the data.

VPN :Virtual Private Network. A VPN provides an encrypted link on an otherwise unprotected network such as the Internet. It allows remote computers or networks at a distance to connect to another and protect their communications with encryption.

Web of Trust :The scheme used by PGP where individuals “sign” other people’s public keys to give an indication of the key’s validity.

X.509 :A public key certification specification as part of a directory system that stores and distributes public keys.

XOR :Stands for eXclusive Or; it is a mathematical function of comparing bits from the data to random bits created by the algorithm. It’s used to indicate whether the bits of the two strings match

Image

List Of 105 Useful Websites

Posted: July 23, 2013 in Uncategorized

Image

1. screenr.com – Record movies of your desktop and send them straight to YouTube.
2. bounceapp.com – For capturing full length screenshots of web pages.
3. Goo. gl – Shorten long URLs and convert URLs into QR codes.
4. untiny.me – Find the original URLs that’s hiding behind a short URLs.
5. localti.me – Know more than just the local time of a city
6.copypastecharacter.com– Copy-paste special characters that aren’t on your keyboard.
7. topsy.com –A better search engine for twitter.
8. fb.me/AppStore –Search iOS apps without launching iTunes.
9. iconfinder.com –The best place to find icons of all sizes.
10. office.com –Download templates, clipart and images for your Office documents.
11. woorank.com –everything you wanted to know about a website.
12. virustotal.com –Scan any suspicious file or email attachment for viruses.
13. wolframalpha.com– Gets answers directly without searching .
14.printwhatyoulike.com– Print web pages without the clutter.
15. joliprint.com –Reformats news articles and blog content as a newspaper.
16. isnsfw.com – When you wish to share a NSFW page but with a warning.
17. eggtimer.com – A simple online timer for your daily needs.
18. coralcdn.org – If a site is down due to heavy traffic, try accessing it through coral CDN.
19. random.org – Pick random numbers, flip coins, and more.
20. mywot.com –Check the trust level of any website .
21. viewer.zoho.com –Preview PDFs and Presentations directly in the browser.
22. tubemogul.com –Simultaneously upload videos to YouTube and other video sites.
23. truveo.com – The best place for searching web videos.
24. scr.im – Share your email address online without worrying about spam.
25. spypig.com – Now get read receipts for your email.
26. sizeasy.com –Visualize and compare the size of any product.
27. whatfontis.com –quickly determine the font name from an image.
28. fontsquirrel.com –A good collection of fonts – free for personal and commercial use.
29. regex.info – Find data hidden in your photographs .
30. tineye.com – This is like an online version of Google Googles.
31. iwantmyname.com– Helps you search domains across allTLDs.
32. tabbloid.com –Your favorite blogs delivered as PDFs.
33. join. me – Share your screen with anyone over the web.
34. onlineocr.net –Recognize text from scanned PDFs and images – see other OCR tools.
35. flightstats.com –Track flight status at airports worldwide.
36. wetransfer.com –For sharing really big files online.
37. pastebin.com – A temporary onlineclipboard for your text and code snippets.
38.polishmywriting.com –Check your writing for spelling or grammatical errors.
39.awesomehighlighter.com– Easily highlight the important parts of a web page.
40. typewith.me –Work on the same document with multiple people.
41.whichdateworks.com –Planning an event? Find a date that works for all.
42. everytimezone.com– A less confusing view of the world time zones.
43. warrick.cs.odu.edu– You’ll need this when your bookmarked web pages are deleted.
44. gtmetrix.com – The perfect tool for measuring your site performance online.
45. imo.im – Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.
46.translate.google.com– Translate web pages,PDFs and Office documents.
47. youtube.com/leanback – Sit back and enjoy YouTube videos in full-screen mode.
48. similarsites.com –Discover new sites that are similar to what you like already.
49. wordle.net – Quicksummarize long pieces of text with tag clouds.
50. bubbl.us – Create mind-maps, brainstorm ideas in the browser.
51. kuler.adobe.com –Get color ideas, also extract colors from photographs.
52. followupthen.com– Setup quick reminders via email itself.
53. lmgtfy.com – When your friends are too lazy to use Google on their own.
54. tempalias.com –Generate temporary email aliases, better than disposable email.
55. pdfescape.com –Lets you can quickly edit PDFs in the browser itself.
56. faxzero.com – Send an online fax for free– see more fax services.
57. feedmyinbox.com –Get RSS feeds as an email newsletter.
58. isendr.com –Transfer files without uploading to a server.
59. tinychat.com –Setup a private chatroom in micro-seconds.
60. privnote.com –Create text notes that will self-destruct after being read.
61. flightaware.com –Live flight tracking service for airports worldwide.
62. boxoh.com – Track the status of any shipment on Google Maps – alternative.
63. chipin.com – When you need to raise funds online for an event or a cause.
64.downforeveryoneorjustme.com – Is your favorites really offline?
65. example.com – This website can be used as an example in documentation.
66.whoishostingthis.com –Find the web host of any website.
67. google.com/history– Found something on Google but can’t remember it now?
68.errorlevelanalysis.com– Find whether a photo is real or aphotoshopped one.
69. google.com/dictionary – Get word meanings, pronunciations and usage examples.
70.urbandictionary.com –Find definitions of slangs and informal words.
71. seatguru.com –Consult this site before choosing a seat for your next flight.
72. sxc.hu – Download stock images absolutely free.
73.download.com.np-Get all softwares.
74. wobzip.org – Unzip your compressed files online.
75. vocaroo.com –Record your voice with a click.
76. scribblemaps.com– Create custom Google Maps easily.
77. buzzfeed.com –Never miss another Internet meme or viral video.
78. alertful.com –Quickly setup email reminders for important events.
79.encrypted.google.com– Prevent your ISP and boss from reading your search queries.
80. formspring.me –You can ask or answer personal questions here.
81. snopes.com – Find if that email offer you received is real or just another scam.
82. typingweb.com –Master touch-typing with these practice sessions.
83. mailvu.com – Send video emails to anyone using your webcam.
84. ge.tt – Quickly send a file to someone,they can even preview it before downloading.
85. timerime.com –Create timelines with audio, video and images.
86. stupeflix.com –Make a movie out of your images, audio and video clips.
87. aviary.com/myna –An online audio editor that lets you record and remix audio clip.
88. noteflight.com –Print music sheets, write your own music online (review).
89.disposablewebpage.com– Create a temporary web page that self-destruct.
90. namemytune.com– When you need to find the name of a song.
91. homestyler.com –Design from scratch or re-model your home in3d.
92. snapask.com – Use email on your phone to find sports scores, read Wikipedia, etc.
93. teuxdeux.com – A beautiful to-do app that resembles a paper diary.
94. livestream.com –Broadcast events live over the web, including your desktop screen.
95. bing.com/images –Automatically find perfectly-sized wallpapers for mobiles.
96. historio.us –Preserve complete web pages with all the formatting.
97. dabbleboard.com –Your virtual whiteboard.
98. whisperbot.com –Send an email without using your own account.
99. sumopaint.com –An excellent layer-based online image editor.
100. lovelycharts.com– Create flowcharts, network diagrams, Sitemaps, etc.
101. nutshellmail.com– Get your Facebook and Twitter streams in your Inbox.
102.The Hype Machine -Web-based music discovery site based on the music posted to blogshttp://hypem.com/
103.SimpleWash -A site to help you clean up old content you may not want to show on your social media profiles anymore (currently Facebook only, Twitter is coming soon) SimpleWash™
104.ListenToYouTube.com -Converts YouTube videos to mp3sYouTube to MP3 Converter – Fast, Free – ListenToYouTube.com
105.PushBullet -Easily send notes, links, lists, files, etc. to your Android phonehttps://www.pushbullet.com/

Image

DoS vs DDoS

Posted: July 14, 2013 in Uncategorized

The Difference between DDoS and #DoS

#DoS
A DoS Attack is a Denial of Service attack.
This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP). The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others and blocking the website or whatever else is hosted there.

#DDoS
A DDoS Attack is a Distributed Denial of Service Attack.In most respects it is similar to a DoS attack but the results are much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.
Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion

Types of #DDoS Attacks

DDoS – Denial of Service

Volume Based Attacks – This type of attack includes UDP floods, ICMP floods, and other spoofed packet floods. The goal of this DDoS attack is to saturate the bandwidth of the attacked site. The magnitude of a volume-based attack is usually measured in Bits per second.
Protocol Attacks – This type of DDoS attack consumes the resources of either the servers themselves, or of intermediate communication equipment, such as routers, load balancers and even some firewalls. Some examples of protocol attacks include SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. Protocol attacks are usually measured in Packets per second.

Application Layer Attacks –
Perhaps the most dangerous type of DDoS attack, application layer attacks are comprised of seemingly legitimate and innocent requests. The intent of these attacks is to crash the web server. SDome examples of application layer attacks include Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. The magnitude of this type of attack is measured in Requests per second.

image

Today I’ve just decided to converse/talk/blog; just decided to give it to you right quick. Just read through, may help a brother or a sister out there *Giggling* of course I will be blogging about technology {Programming} let’s not get sentimental here =)
I want to give my first five quick tips to everyone who is starting programming to kind of get a general sense of what it is {am so not keeping count, am writing this straight from the brain, if they are more or less, just embrace it *Grinning*}. I only knew about programming when I got hold of a programming e-book. Like most of you who got to hear about it and learn it in college, on my side that wasn’t the case. I had to learn it on my own. I didn’t like how I was being taught by most of the e-books as in they were teaching you certain computer programming languages but they weren’t teaching you the concept of what programming is in general(am so sure this happens in colleges too).
My first quick tip is this: don’t look at computer programming as a set of commands or functions, look at it as a problem solving tool, that’s all it is. You are just trying to solve a problem and you have a tool that allows you to solve a problem, that’s all it is, look at it as a problem solving tool and when you look at it that way then later on when you know let’s say five programming languages then you will be able to choose a specific one out of those five to solve each specific problem because different problems require different types of solutions. One type of problem needs more speed, another problem needs a different type of sorting algorithm and different programming languages have different functions for those. Some will work faster, some will work slower so once you look at it, just look at it as a problem solving tool.
Second tip is that: you shouldn’t mix; you should start with one programming language and stick with that. I would personally recommend you start from C++, that is what I did but you can really start from anything you want: you can start from visual basic, you can start from PHP, you can start from anything and C++ is just my preference. I think it’s good you start from that because it’s pretty challenging and you learn all the basics, all the fundamentals stuff like the pointers and everything else and that is good; for me it was good. For you it might be better to start from Java *Smiling* I don’t know but the bottom line is this-you have to start from one programming language and don’t incorporate everything else together cause that is just going to confuse you. You’ve got to learn the syntax of one programming language, learn all the functions of it and how it works, get a general sense of the whole thing. I’d say dedicate at least two years, *runs fingers through the hair* okay at least one year but I’d say two years, dedicate it to one programming language so you know it fully. Once you do that then you can move to another programming language. That’s what I did when I was finished with Java I moved on to PHP I think and it took me a month to learn, to just get a sense of how it works, just to learn how it function, tracks and how to make the variables plus all those small stuffs. The reason is because I already knew the concept of programming and besides I was already confortable with one programming language. The thing with programming is that all programming languages is that they share a lot of similarity, I mean there’s different syntaxes, there’s different functions in this and that but most of the stuff is very similar, so once you learn one language, learning another is not that difficult; so definitely do that.

image

Third is: Please keep your code clean. There is a tendency, when I was starting the program; there is this tendency to over complicate code because in a way you want to write a lot of code {you get excited ““OOo0oHH””I just want to with a lot of code}, it’s good in a way cause that means you’re passionate about it but what’s bad about it: you end up with a SPAGHETTI CODE. A spaghetti code is very difficult to understand at the end, when you write a code and you try to come back to maintain or debug or do whatever else you want with the code, it’s very difficult to do that. Try to keep it very clean, by clean I mean use understandable variable names but don’t make them too long, your function names once again don’t make them too long, it should be like this: when you’re looking at that page, you shouldn’t be scrolling to the right all the time, what I mean by that- it has to be short because sometimes you know you have this conditional statement which goes on and on, you have to break it down. If something is too long you have to break it down, if something is too complicated, you have to break it down. If you see something is getting way too complicated, you have to break it down, that’s rule thumb, you’ve got to think of another way to do it because if it’s really that complicated it: its to come back at you later on when you’re trying to debug it or connect it to another program or whatever else you are trying to do.
The other thing I’ve got to tell you {Fourth tip}, a lot of the beginners don’t test their code before moving on, what I mean by that is this: when you are writing a couple lines of code, please test it, please debug it, please makes sure it works{You will thank me later}. Here is what happens, you write a code, you think it works *smirking* you are confident that’s going to work because you think that’s what you wrote but there is so many times you write a code that you meant to do something but actually does something else. Later on you find that out and it takes you so long, it’s a tedious process. It’s a tedious process because you haven’t checked it when you wrote it so every time when you’re writing a couple lines of code just go over make sure it’s right, debug it, and test it. This is important especially when you are doing a huge project and it has like thousands line of code, at the end imagine there’s a little syntax problems or dialogical problem it’s going to very difficult to find later on. ~Write and test ~Write and Test ~Write and Test~ with experience you might write thirty or forty lines of code before testing, not that because you are confident, you are sure because you have done it so many times.
The very last tip is this, this is not really for beginner computer programmers, this is really for people who are trying to make a decision if they should get into programming or not, so here is my advice {this goes beyond the scope of programming, it relates to life in general} but I will say this if you don’t love programming, don’t get into it-Am neither being rude nor mean here, am just trying to save you money and time. Students drop out of colleges and universities, the reason being that they thought that programming; they heard from someone that computer programming/computer engineering brings you lots of money. Students drop out because they can handle it; the reason is because computer programming is not like in the movies where you type a couple of “things”, then break into their system and get all the money *Giggling*-It’s not like that I mean, it takes a lot of time to go over a code, to think about the problem, to plan it out then write a code, go over it and make sure the code is clean. It takes so much patient, it takes so much time, it’s overwhelming at times; you have to really love it. You have to really love, not programming but problem solving in general, you have to love it in order to enjoy programming, in order to get a job and not get sick of it after like *grinning* forty years you know, be able to constantly develop and that is only going to happen if you love it. As I say it goes for everything, money should be your reason.
I know I said I was going to give you five tips, and my last one is really important. When you read a problem don’t just jump into writing the code; it’s not right, I mean it’s always going to fail you and you always going to get mad at the end {I have done that; it’s not good}. When you’re reading a problem, try to understand the requirements {I know it sounds very cliché but you know this is true}, when you get to the problem try to understand the requirements, try to understand what it wants. Draw a chart, try to see the data flow where one thing flows and where it ends up, how does it change, you know try to connect them; try to see it on your mind. Try to plan it out, see it very clearly. Once you have the solution on your mind, you know exactly how to solve it, and then proceed to programming it. You see if you don’t do that it’s going to go back to messy code; because you are going to be solving it as you are writing it and that’s not good, you’re kind of winging it, that’s not good, that’s not planned. You have to plan it first because when it’s planned, then you’ll have a much clear code, much organized code and it will work and that’s really the most important thing.

image

image

1. BINDER – is a software
used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case – RAT or keylogger), the
application is also run when the actual binded file is run.thus Binder is used to for the following things
– To Hide Files (Key loggers, Rats , Viruses )
– To Bypass antivirus
detection.
          Download Here

2. CRYPTER – is a software
used to hide our viruses,
keyloggers or tools from
antiviruses so that they are not detected by antiviruses.
Thus, a crypter is a program that allow users to crypt the source code of their program.
Generally, antivirus work by splitting source code of
application and then search for certain string within source code. If antivirus detects any certain malicious strings, it either stops scan or deletes the file as virus from system.
Crypter simply assigns
hidden values to each
individual code within
source code. Thus, the source code becomes hidden. Hence, our crypted file becomes UD (undetactable ) or FUD* (fully undetectable )
*UD means undetected, so
only a few antivirus
programs detect it. FUD
means fully undetected, so no antivirus detects it
         Download Here

image

Remember that all the stuff is published here is only for educational purpose! 😛