Sunday, February 11, 2018

How to keep your online information secure when using public Wi-Fi

By egg nog

How to keep your online information secure when using public Wi-Fi

Connecting to public Wi-Fi is tempting for many reasons, especially if you need to check information on the run and want to limit your data usage, or if you want to work from a coffee shop as a change of scenery. Safeguarding your personal information from theft while using public Wi-Fi is always risky, but there are steps you can take to protect yourself and your information from any prying eyes. The most obvious way to protect your personal information is by trying to use different passwords and login names on all the different sites where you save any personal data. However, there are a few other ways to help you secure your information when you log in to a public Wi-Fi network to access any personal information.

Up-To-Date Operating System

Making sure your computer’s operating system and browser are the most recent version available is a good way to ensure that defenses to known security breaches are the most current. Security patches and updates are issued regularly, so try to update your browser and your operating system frequently to protect your online information from cyber attacks. You can set your browser and operating system to update automatically in the settings or system preference sections which relieves you from having to remember, or from having to choose when to update them.

Use sites with HTTPS or SSL connections

Using sites that are hosted on an HTTPS (Hypertext Transfer Protocol Secure), which supports an SSL (Secure Sockets Layer) connection, can provide extra security while you use public Wi-Fi. You will notice a green lock icon appear in the URL bar of the browser you are using, which indicates that the interactions between the site and your browser are encrypted and secured over an unsecured network, such as public Wi-Fi. This extra layer of protection is one more step you can take to ensure that your online information is being kept secure while you browse on public Wi-Fi. 

Use a VPN

Using a VPN, like Hotspot Shield, can scramble your outgoing data to appear as though it’s coming from the VPN server rather than from you. VPNs route your connection through an encrypted tunnel or a set of proxy servers to hide the traffic from you to the internet, thus making your connection more secure. Encrypted data coming from the VPN can’t be read by third parties trying to steal your information, which gives your connection more security than should you proceed without using a VPN.

Forget the network and turn off Wi-Fi when not in use

Once you have loaded the necessary webpages or used the public Wi-Fi sufficiently and are ready to disconnect, choosing to “forget this network” from the Wi-Fi options will disconnect your session and remove your information from any possible sharing. From there, you can turn off your Wi-Fi connection completely to avoid accidentally re-connecting to an unsecured network, which would ultimately raise your susceptibility to data and information breaches by third party intervention. 

ALSO READ How to protect your Facebook account from getting hacked
ALSO READ 10 Ways Hackers can Hack a Facebook Account
Read More
How To Fix Broken Keyboard Keys By Remapping

Keyboard remapping is a technique using which we can map any key to any other key i.e. you can reassign the function of a key to something else. To be more clearer lets say that your space bar is broken. It is an often used key so you can remap the function of an less frequently used key like "]" to function as a space bar i.e. every time when you press the "]" button it will function as a space bar.

Thursday, February 8, 2018

This is Why You Need Headphones for FM Radio

By egg nog

Why do you need headphones for radio?

Marconi sent the first radio message across the Atlantic Ocean in 1901 December and he was also awarded Nobel prize for his invention. Fine! That's a great piece of information but Why Can’t You Use FM Radio Without Headphones?.The Smartphones do not currently have a built-in antenna. So we require a headphone which must remain plugged in to receive FM Streaming.

How do headphones work as an Antenna?

An antenna is a metallic structure that captures and/or transmits radio electromagnetic waves. Headphones are cylindrical in shape, with a grooved tip to retain it.. It works just like an antenna by capturing up the radio wave and providing it to a tuner.

FM radio works in the range of 88 to 108 MHz. Antenna length is proportional to the wavelength of reception. Headphones are of that length mostly and thus can be used as an alternative to an inbuilt antennae.

Earphones are included in most mobile phone purchases with the box. Even if  the Smartphones were included with an inbuilt antenna, the user will be using headphones mostly. In such scenario either one of the two antennas inbuilt or external headphone antenna will be serving the exact same work wasting the inbuilt antenna's worth.

Including an Inbuilt radio antennae will make the Smartphone weigh by few more grams and would also increase the thickness of the phone, not a desirable attribute for marketing.

A simple metal wire can do the trick with which you can listen to the radio! Therefore, in reality, you don’t necessarily need the headphones to play FM radio on your cell phones but you need an antenna.
Read More

Thursday, November 23, 2017

Kali Linux 2017.3 With New Tools Check Out Now

By egg nog

Kali Linux 2017.3 With New Tools Check Out Now

Kali Linux 2017.3 

In Kali Linux 2017.3, the kernel form has been refreshed to 4.13.10. Notwithstanding the piece, WiFi testing devices, for example, reaver, pixie WPS, web application security testing apparatuses, for example, Burp Suite, Cuckoo and the Social Engineering Toolkit have additionally been refreshed and different bugs have been settled. 

New tools incorporate Inspy, Cherry tree, Sublist3r, OSRFramework and Massive Maltego Metamorphosis have likewise been added to the archive and are accessible for download in Kali Linux 2017.3.

It is an amazing news for each kali client that accessibility of Kali Linux 2017.3, which incorporates all patches, fixes, updates, and upgrades since the last discharge. It Much Better than the last arrival of kali linux 2017.2. In this discharge, the portion has been refreshed to 4.13.10 and it incorporates some remarkable upgrades:
  • CIFS uses SMB 3.0 by default.
  • EXT4 directories can now contain 2 billion.
  • TLS support is now built into the kernel directly.
Have a look at the Kali Change log to perceive what else has been refreshed in this release, or read on to perceive what else is new in Kali Linux 2017.3.

Kali Linux 2017.3 New Tools

  1. InSpy.
  2. CherryTree.
  3. Sublist3r.
  4. OSRFramework.
  5. Massive Maltego Metamorphosis.
These new tools are not included in the default installation but after an ‘apt update’, you can check out and install the ones that interest you.

1. InSpy

InSpy is a Python-based LinkedIn enumeration tool with two functionalities: TechSpy and EmpSpy. TechSpy crawls LinkedIn job listings for technologies used by the target company. InSpy attempts to identify technologies by matching job descriptions to keywords from a newline-delimited file.

EmpSpy crawls LinkedIn for employees working at the provided company. InSpy searches for employees by title and/or department from a newline-delimited file. InSpy may also create emails for the identified employees if the user specifies an email format is added in Kali Linux 2017.3.

2. CherryTree

A hierarchical note taking application, featuring rich text and syntax highlighting, storing data in a single xml or sqlite file is added in Kali Linux 2017.3.

Written by Giuseppe Penone (aka giuspen).


  • syntax highlighting supporting several programming languages
  • images handling: insertion in the text, edit (resize/rotate), save as png file
  • embedded files handling: insertion in the text, save to disk
  • multi-level lists handling (bulleted, numbered, to-do and switch between them, multiline with shift+enter)
  • simple tables handling (cells with plain text), cut/copy/paste row, import/export as csv file
  • codeboxes handling: boxes of plain text (optionally with syntax highlighting) into rich text, import/export as text file
  • execution of the code for code nodes and codeboxes; the terminal and the command per syntax highlighting is configurable in the preferences dialog
  • alignment of text, images, tables and codeboxes (left/center/right/fill)
  • hyperlinks associated to text and images (links to webpages, links to nodes/nodes + anchors, links to files, links to folders)
  • spell check (using pygtkspellcheck and pyenchant)
  • intra application copy/paste: supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
  • cross application copy/paste (tested with libreoffice and gmail): supported single images, single codeboxes, single tables and a compound selection of rich text, images, codeboxes and tables
  • copying a list of files from the file manager and pasting in cherrytree will create a list of links to files, images are recognized and inserted in the text
  • print & save as pdf file of a selection / node / node and subnodes / the whole tree
  • export to html of a selection / node / node and subnodes / the whole tree
  • export to plain text of a selection / node / node and subnodes / the whole tree
  • toc generation for a node / node and subnodes / the whole tree, based on headers h1, h2 and h3
  • find a node, find in selected node, find in selected node and subnodes, find in all nodes
  • replace in nodes names, replace in selected node, replace in selected node and subnodes, replace in all nodes
  • iteration of the latest find, iteration of the latest replace, iteration of the latest applied text formatting
  • import from html file, import from folder of html files
  • import from plain text file, import from folder of plain text files
  • import from basket, cherrytree, epim html, gnote, keepnote, keynote, knowit, mempad, notecase, rednotebook, tomboy, treepad lite, tuxcards, zim
  • export to cherrytree file of a selection / node / node and subnodes / the whole tree
  • password protection (using – NOTE: while a cherrytree password protected document is opened, an unprotected copy is extracted to a temporary folder of the filesystem; this copy is removed when you close cherrytree
  • tree nodes drag and drop
  • automatic link to web page if writing the URL
  • automatic link to node if writing node name either with no spaces and camelcase or surrounded by [[node name]]

3. Sublist3r

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT is added in Kali Linux 2017.3 . It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.

4. OSRFramework

OSRFramework is a set of libraries to perform Open Source Intelligence tasks. They include references to a bunch of different applications related to username checking in Kali Linux 2017.3 With New Tools, DNS lookups, information leaks research, deep web search, regular expressions extraction, and many others. At the same time, by means of ad-hoc Maltego transforms, OSRFramework provides a way of making these queries graphically as well as several interfaces to interact with like OSRFConsole or a Web interface.

5. Massive Maltego Metamorphosis

Massive Maltego Metamorphosis -One of our favourite applications in Kali has always been Maltego, the incredible open-source information gathering tool from Paterva, and the equally incredible Casefile. These two applications had always been separate entities (get it?) but as of late September, they are now combined into one amalgamated application that still allows you to run Maltego Community Edition and Casefile, but now it also works for those of you with Maltego Classic or Maltego XL licenses in Kali Linux 2017.3 .Massive Maltego Metamorphosis As always, the tools perform wonderfully and look great doing it.

Massive Maltego Metamorphosis

Download Kali Linux

You can Download the Latest Version of Kali Linux 2017.3 from here

Read More

Friday, November 10, 2017

10 Unknown Facts About Steve Jobs

By egg nog
Steve Jobs Co-Founder of apple known by many. In this article i will list some mind blowing facts about Steve Jobs that you never know.

Steve Jobs Facts

1. Steve Jobs never wrote a single line of code for apple.

Steve Wozniak stated that "Steve didn't ever code" on reply to an email on his Website

2. Steve Jobs was adopted his father was a syrian muslim.

Steven Paul Jobs was born on February 24, 1955, in San Francisco, California, to Joanne Schieble (later Joanne Simpson) and Abdulfattah "John" Jandali, two University of Wisconsin graduate students who gave their unnamed son up for adoption.
Steve Jobs unknowingly met his biological father on multiple number of occasions.
His adoptive parents, Paul and Clara Jobs, were Armenian and unable to have children. Steve was later joined in the family by his adopted sister Patti Jobs, born in 1958. The couple divorced in 1962.

3. Steve Jobs had no college degree.

Steve Jobs dropped out of college after six months and spent the next 18 months dropping in on creative classes at the school. He struggled for making money during this time. Steve Jobs used to sleep on his friends  room floors, returned Coke bottles for money, and ate free meals from the local Hare Krishna temple for living.

Steve Jobs High School GPA was just 2.65

4. Steve Jobs Had LSD.

Steve Jobs explained that he used LSD from 1972 - 1974 approximately 10 - 15 times.
Steve said "I would ingest the LSD on a sugar cube or in a hard form of gelatin. I would usually take the LSD when I was by myself. I have no words to explain the effect the LSD had on me, although, I can say it was a positive life changing experience for me and I am glad I went through that experience.”

“Taking LSD was a profound experience, one of the most important things in my life. LSD shows you that there’s another side to the coin, and you can’t remember it when it wears off, but you know it. It reinforced my sense of what was important—creating great things instead of making money, putting things back into the stream of history and of human consciousness as much as I could.”- Steve Jobs

5. Steve Jobs was dyslexic.

Steve jobs was dyslexic, meaning he has a learning disability that impairs his ability to read. But that didn't stop Steve Jobs from becoming the world's most iconic CEO.  Albert Einstein, Steven spielberg suffered from Dyslexia as well

Dyslexia is not a disability, it's a gift

6. Steve Jobs worked for Atari.

In 1973 Jobs started working at Atari as a technician. Steve Wozniak designed his version of the video game Pong. After finishing it, Wozniak gave the board to Jobs, Steve Jobs then took the game down to Atari. When the pair first created the Breakout game for Atari, they planned on splitting the pay 50-50. Although Atari gave Jobs $5,000 for the game, Jobs told Wozniak they got $700, leaving Wozniak to take home $350 while Jobs pocketed the other $4,650. While working in Atari Steve Jobs was asked to work for night shifts because of his stink smell as Jobs believed that his vegan diet would eliminate the need for showering.

7. India visit gave a vision to Steve Jobs.

Steve Jobs came to India as a teenager in search of enlightenment. He returned disappointed, following a brush with lice, scabies, dysentery and a near mob thrashing after he protested at being sold watered-down buffalo milk. But the trip did mark a turning point in his life 

8. Steve jobs applied for civilian astronaut to fly a space shuttle.

Steve jobs got rejected and briefly considering starting a computer company in the Soviet Union,he resigned from Apple five months later.

9. Steve jobs annual salary from apple is just 1$.

Steve jobs had 5 million shares that made him richer and moreover most of Steve Jobs' wealth was from his shares in Disney, not Apple.

10. October 16 was declared as Steve Jobs day by Californian governor.

After battling a decade of pancreatic cancer Steve jobs died in October 5, 2011 and Steve jobs also turned down a partial liver transplant from Tim cook two years before dying of pancreatic cancer. Steve jobs was buried in an unmarked grave as per his family's request and the cemetery has not revealed it's location.

I hope you will find this post  to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you!

Read More

Friday, November 3, 2017

Whatsapp Down and Not working Across India and other regions

By egg nog

whatsapp server down 2017

whatsapp server down 2017

WhatsApp is down.Messages won't send or receive, and some people can't load the app at all. WhatsApp appears to be down for a wide number of users across the world. Users from different countries are reporting problems on Twitter with the hashtag #whatsappdown whatsapp server down 2017

#Update Down for 210 minutes today from 11 am to 2:30 pm Now Up and running

Individuals can't send or get messages utilizing the Facebook-claimed application, obviously due to a server issue. there's no easy fix to the problem, since it appears to be on WhatsApp's side

The application doesn't at first look broken, with visits and contacts ready to stack. In any case, once a client is into a talk, the application just demonstrates an "associating" message that never settle itself, thus new messages can't be sent or got. In addition to this whatsapp web is also down.

Whatsapp down for hours now. Users from parts of Europe, USA and Asia also experiencing delays in sending messages.
This being the third significant disturbance of the year of Whatsapp Down, with one as of late as August influencing clients over the world also. Preceding that, the Facebook-claimed benefit endured a blackout twice inside two weeks, in May.
Whatsapp is up and running.
whatsapp server down 2017 and is running by now these are all the news provided cybernog regarding whatsapp server down 2017

Read More

Windows Keyboard Shortcuts You need to know

By egg nog 9 Comments

  Useful Windows Keyboard Shortcuts You need to know

In this article i made a handy list of most useful Windows shortcut keys that will make your day to day tech life better. Collection of best Keyboard Shortcuts and tricks.

Windows Keyboard Shortcuts

Use ctrl+shift+escape to directly open the task manager

Use Windows Key + Arrow Key (left/right) to either move your window across multiple monitors, or to fix it to that half of the screen.

Windows + Left/Right = Move across monitors/maximize TO HALF
Windows + Up = Maximize
Window + Down = Minimize.
These help tons when you have multiple monitors.

Windows + Print Screen = Screenshot of the current window and saves it as a PNG in Pictures\Screenshots.

Win+Pause|Break = System Properties. 

Use Win+D to quickly show the desktop.

Press WinKey+L  to instantly lock your computer.

Shift + Right-Click a folder to access an alternative menu that allows you to open a CMD prompt from that location, among other things.

Open an elevated command prompt in not even half a second by pressing Winkey+X and then A.

Selecting an item and hitting F2 allows you to rename the item.Press TAB to jump to the next file when renaming.

Aligning Windows: Win + Left/Right Arrow.

Resizing Icons: CTRL - Mouse Wheel.

Ctrl + 0 to Always Set the Zoom to default value.

Windows Key+E (Open an Explorer Window)

Windows key + T: Cycle through the apps on the taskbar.

Winkey+ Number: Opens the corresponding numbered application from the taskbar icons. Win+1 opens the first , Win+2 opens the second , etc.

Winkey+ M Minimizes all windows.

Winkey+ Spacebar Preview Desktop (makes all open windows transparent)

Winkey+Shift+S - Screenshot a Portion of the Screen using snipping tool in Windows 10

Winkey+ Tab - Accidentally found that when I was trying to alt tab. A cooler view of alt tab.

Ctrl + Alt + [Arrow keys] - Flips screen Upside-Down & Right-Left

Ctrl + Z Undoes an action.

Ctrl + Y Redoes an action.

Ctrl + Shift + N Creates a new folder.

Ctrl + O Open a file in current software program.

Alt + Enter This forces demos to go full screen.

Alt + F4 Close the currently active program.

When typing an address into most browsers, CTRL + Enter will wrap whatever you typed with the http://www before it and .com after it. Type Cybernog ctrl+enter as an example.

Pressing Ctrl+TAB will allow you to seamlessly switch between tabs in your internet browser.

In chrome, Control + Shift + T reopens a tab you accidentally closed.

F6  places the cursor in the address bar of your browser - I use that a lot.

Ctrl + A Select all text.

Ctrl + Backspace deletes entire words at a time Also, Ctrl + arrow keys will move the cursor word by word, and if you hold shift you can select word by word.

Ctrl + Shift + V: paste text without formatting.

Press Ctrl+Shift+[Arrow Key] to select blocks of text.

Simply loop a video on Youtube by right clicking it and hitting "loop".

Keys J (-10sec) - K (pause) - L (+10 sec) controls Youtube video.

There are more hotkeys for Youtube such as F - Full screen, C - Closed Captions, M - Mutes, 0-9 keys for going directly to certain parts of the video.

Is Your Audio Out of Sync in VLC? Use ctrl + K or ctrl + L (or just J and K) to increase/decrease audio delay to fix sync issues.

I hope you will find this post about windows keyboard shortcuts to be useful, I would be very grateful if you’d help it spread by sharing it to a friend or on Facebook. Thank you!
Also read 10 ways Hackers can hack your Facebook account
Also read 10 Amazing Websites that you should make use of in 2017

useful windows keyboard shortcuts,windows keyboard shortcuts,keyboard shortcuts keys, windows 10 keyboard shortcuts, Keyboard shortcuts for windows,
Read More