Posts

Showing posts from November 5, 2017

THE TOP OPERATING SYSTEMS FOR SECURITY DEVELOPMENT WHICH OR BASED ON KALI LINUX by sunilkumar choudari

Image
HI FRIENDS HERE THE TOP OPERATING SYSTEMS FOR SECURITY DEVELOPMENT WHICH OR BASED ON KALI LINUX : This is the time for operating systems beginer  platform based hacking tools by:- editor: suraj vishwakarma author: sunilkumar choudari 1- Kali Linux   Kali Linux is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on GitHub. by:- editor: suraj vishwakarma author: sunilkumar choudari 2-BackBox: Backbox is a linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. BackBox is a lightweight OS and requires less hardware capacity. The power of this distribut

WHAT IS BIOS HOW DOES IT WORKS IN YOUR COMPUTER.?

Image
WHAT IS BIOS HOW DOES IT WORKS IN YOUR COMPUTER.? -BY SUNILKUMAR CHOUDARI The word BIOS stands for Basic Input and Output. A BIOS is a lot more than the name suggests. It is one of the main components without which the operating system cannot function properly. Ever since the days of DOS (Disk Operating System), BIOS is present ( even prior to the structured DOS created by Microsoft which we know very well). Even though you do not see the BIOS quite often, it is a very important for your computer to function. BIOS is a firmware, in short. It is stored on a chip on a part of the computer motherboard and is basically, a set of instructions that run to help load the operating system. You OS would fail to load, if not for the BIOS ! You can see the BIOS instructions everytime you turn on your computer. These instructions are there to check if there are any faults in Processor or RAM of your computer. Some other functions in BIOS. Ø   It checks each and

many of the IOT devices are infecting through world by ROOP OR REAPER.

Image
many of the IOT devices are infecting through world by ROOP OR REAPER. -by sunilkumar choudari Researchers discovered a new Botnet called, IoTroop or Reaper, which is rapidly infecting millions of IoT devices across the world. IoT (Internet of Things) Botnets are internet-connected smart devices that get infected with the same malware and is controlled by attackers from a remote location Check point researcher  who named it as IoTroop said that even though there are some technical aspects to Mirai- which caused a widespread DDoS attack in 2016, this is an entirely new and sophisticated campaign which can create far more potential damage than Mirai. Check Point’s Intrusion Prevention System (IPS) first noticed it in September when there was an increasing number of attempts to exploit a combination of vulnerabilities found in various IoT devices by hackers. The malware has already infected one million IoT devices and is evolving day by day targeting vulnerabilities found

Have you ever wondered how actually the Wi-Fi in an airplane works? —Sunilkumar Choudari

Image
Traveling in the airplane has been a phone-free zone for a lot of years. We have to turn off our electronic devices and rely instead on movies and in-flight magazines for fun. But times have changed. Airplanes have tried to make flying a little more enjoyable by offering us in-flight wireless internet, but have you ever wondered how exactly does Wi-Fi work when you are on an airplane? When Wi-Fi first became a thing in the airplane in the early to mid-2000s, it usually worked by transmitting an internet connection to a transponder attached to the plane using satellites, similar to how folks in rural areas without cable DSL or fiber infrastructure use satellite dishes to get online. Even in the present days, those old systems are still in use. There is a system named air-to-ground transmission or also called as ATG. These are similar to cell phone towers. These have the benefit of being a cheaper than satellite internet, but they work over land, and there are few disadvant