Minggu, 31 Juli 2016

Simple Trick to Make Google’s 2 Step Login Less Annoying

2FA (Two-factor authentication ) requires something you know (your password) plus something you have (usually your phone) to have access to your account. It is much safer than using just a password, and you should enable it on all of your accounts which support 2FA. However, the 2FA demonstrates a classic trade-off between convenience and security. Even though punching in the code to log in makes your account very secure, it is a pain to open your authentication app every single time and then type a number. You can use the Google’s new 2FA method to make using two-factor authentication far less annoying. To enable this feature for your

The post Simple Trick to Make Google’s 2 Step Login Less Annoying appeared first on Coding Security.


Simple Trick to Make Google’s 2 Step Login Less Annoying
read more

What is A Firewall and Reasons Why You Should Use it

We all heard about firewall at some point of time, what are they used for ? Do they stop viruses? Well actually, there is a great chance that you are now using a firewall,  if  your are running a modern OS on your computer, there is be one built in, or else your security suite will have a firewall. But what is this firewall for? Keep reading for reasons why you do, need it. What Is a Firewall? Lets start it with what a firewall actually is. You should understand that there are no sparks, no flames, no fuel of any kind of that stuff involved, A firewall

The post What is A Firewall and Reasons Why You Should Use it appeared first on Coding Security.


What is A Firewall and Reasons Why You Should Use it
read more

How To Set Password to Your BIOS and Why You Should Do It

With date breaches and unauthorized access of computers becoming common today, you can never have enough  security on your system. We’ve shown how to make sure your new PC secure, and every new setup there should include properly locking down your system. One way of achieving better safety to user computer is by the  addition of a password for the BIOS. This basic firmware runs right off your PC’s motherboard before you ever get into Windows.   You might want to lock the BIOS to prevent the unauthorized access (so someone can not get in and screw with settings, such as changing the boot order),

The post How To Set Password to Your BIOS and Why You Should Do It appeared first on Coding Security.


How To Set Password to Your BIOS and Why You Should Do It
read more

4 Tips to Make Your Browsing Safer

Browsing is our everyday activity and one has to be very careful while browsing as the number of online threats are increasing day by day. No one knows what hides beneath a link that pops-up. Here are some of the tips to make your browsing experience safe. Keep Your Browser Up-To-Date Always keep your browser up to date this is because when you update  your browser, you get access to new features and also new bug fixes. You can get better protection from malware and security flaws, thanks to the security fixes that are bundled with every new release you get. Don’t ever forget to

The post 4 Tips to Make Your Browsing Safer appeared first on Coding Security.


4 Tips to Make Your Browsing Safer
read more

What is the principle modeling in UML

Modeling has rich history in all the engineering disciplines. That experience suggests four basic principles of modeling. First principle of modeling: The choice of what models to create has a profound influence on how a problem is attacked and how a solution is shaped. Choose your models well. The right models will highlight the most nasty development problems. Wrong models will mislead you, causing you to focus on irrelevant issues. Second principle of modeling: Every model may be expressed at different levels of precision. Sometimes, a quick and simple executable model of the user interface is exactly what you need.

The post What is the principle modeling in UML appeared first on Coding Security.


What is the principle modeling in UML
read more

What is conceptual model in UML

First, let’s see what is the use of learning conceptual model of UML. To learn a new language, for example, let’s consider English, we learn the character set (a-z) first and then the words and then several rules to form sentences using those words. Similarly to learn using UML, we should learn the vocabulary and then rules for creating UML diagrams. The conceptual model of UML contains the UML’s vocabulary and rules. So, to understand using UML and to create using UML diagrams first we need to learn the conceptual model of UML. The conceptual model of UML contains the

The post What is conceptual model in UML appeared first on Coding Security.


What is conceptual model in UML
read more

How builder pattern works

Intent: Separate the construction of a complex object from its representation so that the same construction process can create different representations.   Motivation: A RTF (Rich Text Format) reader application should be able to convert a RTF document to several formats like: plain text or TeX representation or into a text widget which allows users to directly interact. The problem here is, the number of possible conversions is open ended. So, it should be easy to add a new conversion without modifying the reader. A solution to this problem is, the RTFReader class uses a TextConverter object that converts RTF

The post How builder pattern works appeared first on Coding Security.


How builder pattern works
read more

Pokemon Go Tips that Every Beginner Needs To Know

Pokemon GO is everywhere  and everyone is playing it. The game has become such a huge hit that it pushed the market value of Nintendo to the top. Just think about it. Many people are actually going outside to play this video game now. I ran into half a dozens of other Pokemon Go players yesterday who are wandering around my nearby Pokestops. This is just no like any other game we’ve ever played. But if you are just getting started, we have made a list of Pokemon GO tips you need to know to become the very best. Don’t Power Up

The post Pokemon Go Tips that Every Beginner Needs To Know appeared first on Coding Security.


Pokemon Go Tips that Every Beginner Needs To Know
read more

Researchers have made a prosthetic arm based off Luke Skywalker’s

US Department of Defence Advanced Research Projects Agency (DARPA)  funded a prosthetic arm that will be released for commercial use from beginning in late 2016. This LUKE arm, one of the world’s most advanced prosthetics made and was designed by Segway creator Dean Kamen and it is under development for over a decade. This LUKE arm is named after the Luke Skywalker’s famous star wars character everyone knows, and its banner feature is the control system. The LUKE arm uses electrodes placed in the residual limb to pick up the electrical signals from user’s muscles. When user flexes or tenses his arm, LUKE changes its own position according to the and

The post Researchers have made a prosthetic arm based off Luke Skywalker’s appeared first on Coding Security.


Researchers have made a prosthetic arm based off Luke Skywalker’s
read more

Sabtu, 30 Juli 2016

Snowden’s designed a phone case that warns if you’re being spied on

The notorious whistle-blower Edward Snowden helped design an open-source device  that works with smartphone and warns people when their smartphone’s antennae are transmitting any information. The goal here is to protect people from being digitally spied on by alerting users when their phone is receiving or sending data without their permission or knowledge. The device was designed by hacker Andrew “bunnie” Huang, will also have a  ‘kill switch’ so that users can easily cut power if their phone is being spied, something that both of them says is more secure than the airplane mode. An actual  prototype has not been built as of now, so there is no evidence that

The post Snowden’s designed a phone case that warns if you’re being spied on appeared first on Coding Security.


Snowden’s designed a phone case that warns if you’re being spied on
read more

WhatsApp Fails to Properly Delete Your Chats

One of the biggest social messaging service, WhatsApp fails to properly delete conversations of its users, thus allowing attackers and law enforcement a few avenues to recover those deleted chats, found iOS developer Jonathan Zdziarski. The main issue here is  the SQLite database, which many other applications like WhatsApp and many other more mobile apps use to store data on the users phone on which the app is installed. Jonathan  discovered that, whenever a user deletes his WhatsApp conversation, SQLite’s general mode of operation is to mark the data as ‘deleted’ and add it to “free list” of the database entries that can be re-written by

The post WhatsApp Fails to Properly Delete Your Chats appeared first on Coding Security.


WhatsApp Fails to Properly Delete Your Chats
read more

How to work with forms and form controls in HTML

A form is a collection of GUI controls like textboxes, checkboxes, radio buttons etc which allows the user to send data to the server. After entering the data into the form, a special program is used to process that data. Such programs are called as form handlers. Inserting a Form To insert a form into the web page, we can use the <form> tag. The syntax for the <form> tag is shown below: <form action=”url_to_send_data” method=”get/post”> The action attribute is used to specify the formal handler as a URL. Themethod attribute is used to specify how the data is sent

The post How to work with forms and form controls in HTML appeared first on Coding Security.


How to work with forms and form controls in HTML
read more

New Tool From Microsoft Brings iPhone Apps to Windows 10

Microsoft made several efforts to help developers to bring apps from other platforms to Windows 10, and yesterday the company introduced a new solution that is specifically aimed at people who want to run their iOS apps on their PCs and smartphones powered by the latest operating system. It is called App Analysis Tool, which is the new solution that is specifically developed to scan an iOS app easily and discover which parts of it might not be compatible with Windows 10, thus offering tips and instructions on how to do that in the most efficient way. The iOS developers just need the IPA file of their application, and once App Analysis

The post New Tool From Microsoft Brings iPhone Apps to Windows 10 appeared first on Coding Security.


New Tool From Microsoft Brings iPhone Apps to Windows 10
read more

What are character formatting essentials in HTML

In the last section we have learned different ways to format paragraphs of text. Now, we will learn different ways to format individual characters or words in text. Methods of Text control You can control the look and formatting of text in your documents using various means. The direct method of controlling the look of text like the <font> tag has been deprecated in favor of HTML 4.01 and XHTML. <font> tag: The <font> tag enables the developer to directly affect the size and color or the text. The attributes size and color of the <font> tag are used to

The post What are character formatting essentials in HTML appeared first on Coding Security.


What are character formatting essentials in HTML
read more

What is abstract factory pattern

Intent: Abstract factory provides an interface to create a family of related objects, without explicitly specifying their concrete classes.   Also Known As: Kit.   Motivation: Modularization is a big issue in today’s programming. Programmers are trying to avoid the idea of adding more code to the existing classes to encapsulate more general information. Let’s consider an example of user interface toolkit which supports multiple look-and-feel standards such as Motif and Presentation Manager. Different look-and-feels define different appearances and behaviors for user interface widgets like scrollbars, buttons, radio buttons etc… To be portable across different look-and-feels standards, an application should

The post What is abstract factory pattern appeared first on Coding Security.


What is abstract factory pattern
read more

Jumat, 29 Juli 2016

Search Suggestions Can Crash Chrome and Firefox Browsers

Security researchers from the Nightwatch Cybersecurity discovered a new way of crashing Firefox and Chromium browsers on mobile and desktop environments. This method relies on using search suggestions feature which both of these browsers support. The issue here is not a software bug, but a fault in design implementation which allows their attack to be executed. All browsers today have a search field or allow users to search through the URL address bar. Based on search engines supported inside the browser and search suggestions that can be shown as the user types his query. The experts at Nightwatch security said that if browser’s search engine provider does not protect

The post Search Suggestions Can Crash Chrome and Firefox Browsers appeared first on Coding Security.


Search Suggestions Can Crash Chrome and Firefox Browsers
read more

Here are the Basics of the XML syntax

This article explains about XML syntax. You will learn about elements, tags and attributes which are the fundamental parts in a XML document. The syntax of XML can be thought of at two distinct levels. First, there is the general low-level syntax that specifies rules to be followed by all XML documents. Second, there is the high-level syntax that is distinct for each XML document which can be specified by using either DTD (Document Type Definition) or XML Schema. They specify rules about which tags are allowed, what attributes are allowed with certain tags and in which order the tags

The post Here are the Basics of the XML syntax appeared first on Coding Security.


Here are the Basics of the XML syntax
read more

What is object oriented modeling

In software field, there are several ways to approach for building a model. The two most common ways are: from an algorithmic perspective and from anobject oriented perspective. The traditional view of software development takes an algorithmic perspective. In this approach, the main building block of all software is the procedure or function. This view leads the developers to focus on issues of control and the decomposition of larger algorithms into smaller ones. As requirements change, and the system grows, systems built with an algorithmic focus turn out to be very hard to maintain. The contemporary (another) view of software

The post What is object oriented modeling appeared first on Coding Security.


What is object oriented modeling
read more

How to pass parameter into java applet

In this article we will learn about passing parameters to applets using the param tag and retrieving the values of parameters using getParameter method.   Parameters specify extra information that can be passed to an applet from the HTML page. Parameters are specified using the HTML’s param tag.   Param Tag The <param> tag is a sub tag of the <applet> tag. The <param> tag contains two attributes: name and value which are used to specify the name of the parameter and the value of the parameter respectively. For example, the param tags for passing name and age parameters looks as shown below:

The post How to pass parameter into java applet appeared first on Coding Security.


How to pass parameter into java applet
read more

List of Top Malware Threat for Q2 2016 Is Here

Since the last three months, Locky ransomware has topped the charts of all malware families, according to the quarterly report from security vendor Proofpoint. Locky is in dominant position and it is no surprise to anyone following infosec sector. This ransomware family was distributed and created by one of the largest cyber-crime syndicates in the world, the very same people behind the famous Dridex banking trojan, which is one of the most commonly encountered malware threats. Just to understand what happened in second quarter, you need the bigger picture of this entire year. 2016 started huge, with Locky appearing on the scene for the first time and slowly

The post List of Top Malware Threat for Q2 2016 Is Here appeared first on Coding Security.


List of Top Malware Threat for Q2 2016 Is Here
read more

Kamis, 28 Juli 2016

Bitcoin is Not Anonymous anymore, EU Wants To Track Cryptocurrency Users

The European Commission wants to take away anonymity from the virtual currencies by taking the user registers on a database so that they can be tracked. This proposal would provide EU with a huge record that contains the real-world identities of all the people who use cryptocurrencies and also the addresses of the virtual wallets where the money is held. Forms of Cryptocurrencies like Bitcoin can not be traced, thus making them a very popular choice for the cyber-criminals to fund their illegal activities. Most of the Ransomware attacks, for example, demand payments in the form of Bitcoin because it just leaves no identifiable paper trail to

The post Bitcoin is Not Anonymous anymore, EU Wants To Track Cryptocurrency Users appeared first on Coding Security.


Bitcoin is Not Anonymous anymore, EU Wants To Track Cryptocurrency Users
read more

What is factory method pattern

Intent: Defines an interface for creating an object, but lets subclasses decide which class to instantiate. Factory Method lets a class defer instantiation to subclasses.   Also Known As: Virtual Constructor   Motivation: Take into consideration a framework for desktop applications. Such applications are meant to work with documents. A framework for desktop applications contains definitions for operations such as opening, creating and saving a document. The basic classes are abstract ones, named Application and Document, their clients having to create subclasses from them in order to define their own applications. For generating a drawing application, for example, they need

The post What is factory method pattern appeared first on Coding Security.


What is factory method pattern
read more

What are thread methods in java

In this article we will learn some of the thread methods like isAlive, join, suspend, resume, and stop along with sample Java programs.   isAlive() and join() Methods Even though threads are independent most of the time, there might some instances at which we want a certain thread to wait until all other threads complete their execution. In such situations we can use isAlive() and join()methods. Syntax of these methods is as follows: final boolean isAlive() final void join() throws InterruptedException final void join(long milliseconds) throws InterruptedException The isAlive() method can be used to find whether the thread is still running or

The post What are thread methods in java appeared first on Coding Security.


What are thread methods in java
read more

How to describe design patterns

The information in a design pattern’s documentation will be described as follows: Pattern name and classification: The pattern name specifies the essence of the pattern precisely. A good name is a key as it will become a part of our design vocabulary. Classification specifies the type of pattern.   Intent: A short statement that tells us what the pattern does and which design issue or problem the pattern addresses.   Also known as: Other well known names for the pattern, if any.   Motivation: A scenario that illustrates a design problem and how the class and object structures solve that

The post How to describe design patterns appeared first on Coding Security.


How to describe design patterns
read more

Rabu, 27 Juli 2016

US Standards Body Wants to Ban SMS-based Two Factor Authentication

The  US standards body is starting to move businesses away from using two factor authentication as a security measure in order to protect consumers. They say that the method is insecure and can be easily exploited by cybercriminals. The US National Institute for Standards and Technology (Nist) published Digital Authentication Guideline (DAG), which is a collection of guidelines designed to help the software developers build more secure apps, as well as enabling government agencies and enterprises to access and improve cybersecurity practices while securing their software and services. Generally, in order to access a banking service or any other account which contains valuable personal information offline, the user

The post US Standards Body Wants to Ban SMS-based Two Factor Authentication appeared first on Coding Security.


US Standards Body Wants to Ban SMS-based Two Factor Authentication
read more

Windows Disk Cleanup Utility can be used to Bypass UAC

Researchers recently found a new way to bypass the UAC(User Account Controls) in Windows that puts the devices at risk of being attacked. Researchers Matt Graeber and Matt Nelson said that this  unique method of bypassing the Windows UAC easily work under the survillence of security systems which avoid these types of scenarios. This new UAC bypass works fine on Windows 10 and unlike any other bypass methods. This does not raise ant red flag as the method does not rely on code injection techniques but uses an existing Windows scheduled task which is set up to run with highest privileges, said

The post Windows Disk Cleanup Utility can be used to Bypass UAC appeared first on Coding Security.


Windows Disk Cleanup Utility can be used to Bypass UAC
read more

HACK COMPUTER USING INTERCEPTER-NG (android)

INTERCEPTER-NG IS A MULTIFUNCTIONAL NETWORK TOOLKIT FOR VARIOUS TYPES OF IT SPECIALISTS. IT HAS FUNCTIONALITY OF SEVERAL FAMOUS SEPARATE TOOLS AND MORE OVER OFFERS A GOOD AND UNIQUE ALTERNATIVE OF WIRESHARK FOR ANDROID. NOW FOLLOW THE BELOW STEPS TO HACK COMPUTER, LAPTOP OR ANY OTHER DEVICE WHICH CONNECTED TO YOUR NETWORK. ARE YOU WANT TO DOWNLOAD WIFI HACKING APP ANDROID TRY THIS. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone

The post HACK COMPUTER USING INTERCEPTER-NG (android) appeared first on Coding Security.


HACK COMPUTER USING INTERCEPTER-NG (android)
read more

What is object class in java

In this article we will look at Object class which is the base class for all the classes in Java. We will learn about different methods in the Object class. In Java the base class or parent class or super class for all other classes is the Object class. This Object class provides the common functionality for all other objects.   Object Class Methods Following are different methods provided by the Object class: clone() method This method is used to create a new object which is same as the object being cloned. Syntax of this method is as follows: Object clone() equals() method This method is

The post What is object class in java appeared first on Coding Security.


What is object class in java
read more

What is prototype pattern?

Intent: To specify the kinds of objects to create using a prototypical instance, and create new objects by copying this prototype.   Motivation: A prototype is a template of any object before the actual object is constructed. In java also, it holds the same meaning. Prototype design pattern is used in scenarios where application needs to create a number of instances of a class, which has almost same state or differs very little. In this design pattern, an instance of actual object (i.e. prototype) is created on starting, and thereafter whenever a new instance is required, this prototype is cloned

The post What is prototype pattern? appeared first on Coding Security.


What is prototype pattern?
read more

Programming in OOP : Types of inheritance

In this article we will look at different types of inheritance and what types of inheritance are supported in Java. There are five types of inheritance based on how many base classes and derived classes are there in the inheritance relationship. They are as follows: Simple inheritance Multi-level inheritance Multiple inheritance Hierarchical inheritance Hybrid inheritance Let’s look at each one of these five types of inheritance in more detail.   Simple inheritance: This is the most frequently used and most simple of the five types of inheritance. In this type of inheritance there is a single derived class which inherits

The post Programming in OOP : Types of inheritance appeared first on Coding Security.


Programming in OOP : Types of inheritance
read more

5 Linux Distros You Can Run On Raspberry Pi

Rasbian is the most common Linux distro that is used, but here are some other Linux distros you can try onyour PI. 1. Fedora All the Fedora users have  two options to choose on their Raspberry Pi. First one is the standard Fedora, whose team developed an ARM image which is actively maintained alongside their standard 32-bit and 64-bit versions. This version is designed especially for the Raspberry Pi 2. If you are using older versions of PI  Pidora which is a Fedora Remix is available for you to try out. 2. Gentoo Gento is a Linux distro which demands that you compile the code, rather than

The post 5 Linux Distros You Can Run On Raspberry Pi appeared first on Coding Security.


5 Linux Distros You Can Run On Raspberry Pi
read more

WifiKill – disable internet for network loggers

What is WifiKill? WifiKill is an android application that helps you to disable other people’s Wi-Fi internet connections on the same network. It is a kind of hacking process in which you are hacking other person’s internet connection and trying to disable it. This app is specifically developed for the Android smartphone users. You can easily become a hacker as WifiKill literally falls in the category of hacking and this application is capable of searching for the user information in the Wi-Fi modem. WifiKill v2.3.2 is an amazing app through which you can get a wi-fi connection in full speed by

The post WifiKill – disable internet for network loggers appeared first on Coding Security.


WifiKill – disable internet for network loggers
read more

Tutorial-How to use zANTI2 for hacking

Zanti 2 is a android application which is made up for network penetration testing. What Zanti 2 can do? Scan the whole network show alive host in the network scan port through Nmap for port Scanning Scan Service on each port and find vulnerability. Perform Brute force attack Perform Shellshock etc vulnerability MITM: Man In The Middle Attack Session Hijacking SSL Striping Sniffing packets Replace image Redirect URL and IP Intercept and modified live download.   For Demonstration : Before install Zanti your Phone must be rooted .. In case your phone is not rooted search in the site you

The post Tutorial-How to use zANTI2 for hacking appeared first on Coding Security.


Tutorial-How to use zANTI2 for hacking
read more

Selasa, 26 Juli 2016

KickassTorrents Community Site Return Online Admins Vow to Bounce Back

The arrest of Artem Vaulin the leader of KickassTorrents (KAT) in Poland by the United States’ Justice Department last week was an internet sensation. The website KAT was shut down but now it is slowly coming back to life. The admins of KAT and also thousands of its members have regrouped to resurrect their community by launching the katcr.co website and vowed to bounce back soon. Torrent Freak quoted KAT forum admin, Black “We should remember that Kickass Torrents is not just about uploading, but the heart and soul of KickassTorrents is our members, they are family and family is important as we know. Nothing can take that away

The post KickassTorrents Community Site Return Online Admins Vow to Bounce Back appeared first on Coding Security.


KickassTorrents Community Site Return Online Admins Vow to Bounce Back
read more

How to perform recursion in java

This article explains about recursion in Java. We will learn what is recursion and how to use recursion to write effective Java programs. Recursion is a famous way to solve problems with less lines of code. Many programmers prefer recursion over iteration as less amount of code is required to solve problems using recursion. A method calling itself in its definition (body) is known as recursion. For implementing recursion, we need to follow the below requirements: There should be a base case where the recursion terminates and returns a value. The value of the parameter(s) should change in the recursive

The post How to perform recursion in java appeared first on Coding Security.


How to perform recursion in java
read more

How does MVC works with design patterns

The Model/View/Controller set of classes are used to build user interfaces in Smalltalk-80. MVC consists of three kinds of objects. Model is the application object. View is the representation of the model and the Controller specifies how the user interface (View) reacts to the user input. Before MVC, these three objects (Model, View and Controller) used to be coupled together. MVC decouples model and view objects using the subscribe/notify protocol. Whenever the data in the model changes, it has to notify the associated views. In response, each view gets a chance to update itself. This allows add or create views

The post How does MVC works with design patterns appeared first on Coding Security.


How does MVC works with design patterns
read more

How to perform type conversion and type casting in java

In this article you will learn about Java type conversion and casting with appropriate examples. Converting a value from one type to another type (data type) is known as type conversion. Type conversion is of types based on how the conversion is performed: 1)Implicit conversion (also known as automatic conversion or coercion), 2)Explicit conversion (also known as type casting). Implicit Conversion or Coercion This type of conversion is performed automatically by Java due to performance reasons. Implicit conversion is not performed at all times. There are two rules to be satisfied for the conversion to take place. They are: The

The post How to perform type conversion and type casting in java appeared first on Coding Security.


How to perform type conversion and type casting in java
read more

Senin, 25 Juli 2016

US Government is Paying $2 Million for Automatic Hacking System

In this year’s DEF CON security conference which is scheduled to be held in Las Vegas on August, the Defense Advanced Research Projects Agency (DARPA) is giving away a grand total of $4 million to all the seven teams participating in the Cyber Grand Challenge (CGC). The Cyber Grand Challenge was started in 2014. It is a classic Capture The Flag(CTF) competition, but with a kink. Here instead of making two teams of security researchers battle against each other in an attempt to hack or protect a device or network, the CGC will have seven teams that battle using automated computer programs which are built

The post US Government is Paying $2 Million for Automatic Hacking System appeared first on Coding Security.


US Government is Paying $2 Million for Automatic Hacking System
read more

110 Dangerous Servers Found on Tor Network

Two scientists from Northeastern University did an experiment on Tor Network, including 1,500 honeypot servers which revealed that more than 110 Tor Hidden Services Directories (HSDirs) are probing the fellow Tor relays and even attempting to exploit their security weaknesses. This experiment, took place from February 12, 2016, to April 24, 2016, and was started to test the how trustable the fellow Tor servers are, and especially, HSDirs, which is a complex term defining a Tor server that is hosting a Dark Web (.onion ) website. To detect the presence of any abnormal traffic, the researchers introduced honeypots, which functioned as real-life Tor servers, known as HOnions. These servers are introduced gradually into

The post 110 Dangerous Servers Found on Tor Network appeared first on Coding Security.


110 Dangerous Servers Found on Tor Network
read more

Top 5 Information Security Certifications For 2016

According to the U.S. Labor Department’s Bureau of Labor Statistics, the demand for job market for information-security analysts, and cybersecurity professionals, is set to increase 36.5 percent by 2022, with about 27,400 jobs being added. The demand for the security and IT professionals is very high and continues to increase in future. Employers will be looking for certifications from the candidates as a measure of their hard work , dedication and excellence. If you are looking to pursue career in the information security, here are the top 5 information security certifications that are considered to be leaders in the infosec industry today. When

The post Top 5 Information Security Certifications For 2016 appeared first on Coding Security.


Top 5 Information Security Certifications For 2016
read more

What is java’s virtual Machine? How it is useful in executing java code

In this article we will look at Java Virtual Machine (JVM) which provides the run-time engine for bytecode generated by the Java compiler. We will look at JVM architecture and more. Before learning about JVM it is important to know about JDK (Java Development Kit) and JRE (Java Runtime Environment). Below figure shows the relationship between JDK, JRE, and JVM: JDK provides programmers with a set of tools (like javac, debugger, javap, appletviewer etc..) for developing Java programs. JDK includes JRE. JRE provides the run-time engine JVM along with the class libraries which contains the predefined functionality. Using JDK programmers

The post What is java’s virtual Machine? How it is useful in executing java code appeared first on Coding Security.


What is java’s virtual Machine? How it is useful in executing java code
read more

Scientists Made The World’s Smallest Hard Disk With 500x More Storage Space than Best Hard Drive

Scientists from Netherlands have successfully written data at the smallest scale ever. Scientists managed to  manipulate chlorine atoms one at a time and stored a kilobyte of data in what is now being called as the world’s ‘smallest hard disk’. These researchers took their inspiration from the famous physicist Richard Feynman – who once in 1959 envisioned that one day in future we could arrange individual atoms to store information. These scientists actually coded a part of Feynman’s speech on this topic into their latest ‘atomic kilobyte’. According to the team of researchers from the Kavli Institute of Nanoscience located at Delft University, the data written at this

The post Scientists Made The World’s Smallest Hard Disk With 500x More Storage Space than Best Hard Drive appeared first on Coding Security.


Scientists Made The World’s Smallest Hard Disk With 500x More Storage Space than Best Hard Drive
read more

Minggu, 24 Juli 2016

4 Ways To Hack A WhatsApp Account and How To Protect Yourself From Being Hacked

Whatsapp is now the mainstream chat application for many people, here are the ways hackers can hack Whatsapp account and spy on your messages. Follow the secure measures to make your account strong and safe.   1.Hack Whatsapp Account from OTP SMS We all know that Without confirming Whatsapp Number by OTP SMS, we can not use it. In this scenario, a hacker only has to get the access to your SMS messages from any spyware app. How Can you Protect yourself from this Whatsapp SMS Hack Use a good antivirus in your mobile phone. Lock your phone from Pattern lock or PIN. Turn off

The post 4 Ways To Hack A WhatsApp Account and How To Protect Yourself From Being Hacked appeared first on Coding Security.


4 Ways To Hack A WhatsApp Account and How To Protect Yourself From Being Hacked
read more

Advanced Tips To Protect Yourself From Hackers

HACKER TRICKS AND PREVENTION TECHNIQUES In TV series and movies we see hackers being involved in many situations. We see  them apply their computer knowledge in order to perform the hacker tricks that saved the day. Hackers are considered as heros with only a keyboard and a mouse as weapons. However, the prevention of hacker attacks and protecting the innocent from hacker attacks is very hard, and complex, in the real life. Hollywood usually has a tendency to oversimplify things so that the general public can easily understand them. But, only a very small percentage of the population have enough skills to perform these kind of demonstrations. If you want to be

The post Advanced Tips To Protect Yourself From Hackers appeared first on Coding Security.


Advanced Tips To Protect Yourself From Hackers
read more

How to work with graphics in AWT

In this article we will look at how to work with graphics in AWT. We will look at various AWT classes that help us with creating graphics in our applications.   Graphics Class In GUI applications, we can use Graphics class of java.awt package to create various graphics like lines, rectangles, circles, polygons etc. Let’s look at some of the methods available in the Graphics class: void drawLine(int startX, startY, endX, endY) – Used to draw a line between twi points. void drawRect(int startX, int startY, int width, int height) – Used to draw a rectangle starting from the top left corner with

The post How to work with graphics in AWT appeared first on Coding Security.


How to work with graphics in AWT
read more

What is inner Anonymous class in java

In this article we will learn about inner classes and how can they be used to simplify event handling process along with sample Java programs.   An inner class is a class which is defined inside another class. The inner class can access all the members of an outer class, but vice-versa is not true. Themouse event handling program which was simplified using adapter classes can further be simplified using inner classes. Following is a Java program which handles the mouse click event using inner class and adapter class: import javax.swing.*; import java.awt.*; import java.awt.event.*; public class MyApplet extends JApplet

The post What is inner Anonymous class in java appeared first on Coding Security.


What is inner Anonymous class in java
read more

How to work with AWT controls in java

In this article we will look at how to create and work with various AWT controls available in the java.awt package along with sample code.   We can add and remove controls to a Container like Applet and Frame using the following methods available in the Container class: Component add(Component ref) Component remove(Component ref)   Label A label is a GUI control which can be used to display static text. Label can be created using the Label class and its constructors which are listed below: Label() Label(String str) Label(String str, int how) The parameter how specifies the text alignment. Valid values are

The post How to work with AWT controls in java appeared first on Coding Security.


How to work with AWT controls in java
read more

Sabtu, 23 Juli 2016

Here is How To Install Chrome On Kali Linux Without Errors

If you are someone who wants to use Kali Linux as your main operating system, the most common issue you face initially in lacking of a good browser. The default browser in Kali Linux is iceweasel which is a forked version of Firefox. To have a better browsing experience, you might want to install Chrome on Kali Linux. Install Chrome on Kali Linux 2.0 Sana Frst of all, download google chrome if you are running a 32 bit computer, then download 32 bit or if it is 64 bit then download the 64 bit file   after downloading, copy the file to your

The post Here is How To Install Chrome On Kali Linux Without Errors appeared first on Coding Security.


Here is How To Install Chrome On Kali Linux Without Errors
read more

Tor Makes Internet Of Things (IoT) Secure Than Ever

The Guardian Project, who is a Tor Project contributor, has developed a way to protect  all the devices from refrigerators  and toasters to HVAC systems and lawnsprinklers, from waking up to the order of a hacker and leaking your sensitive data or help the hacker to execute other cyber attacks. The contributor achieved this  by integrating the Tor security into the Internet of Things(IoT). Using the help of Home Assistant, which is a open source platform built on Python, the Guardian Project Director Nathan Freitas successfully created the “Tor Onion Service Configuration” for this scalable system. This platform, runs on devices which include Raspberry Pi, can control and

The post Tor Makes Internet Of Things (IoT) Secure Than Ever appeared first on Coding Security.


Tor Makes Internet Of Things (IoT) Secure Than Ever
read more

How to work with Swing Controls in java

In this article we will look at some of the swing controls available in javax.swing package along with sample Java code for each control.   Labels The JLabel class is used to display a label i.e., static text. A JLabel object can be created using any one of the following constructors: JLabel(Icon icon) JLabel(String str) JLabel(String str, Icon icon, int align) In the above constructors icon is used to specify an image to be displayed as a label. Icon is a predefined interface which is implemented by the ImageIconclass. str is used to specify the text to be displayed in the label and align is

The post How to work with Swing Controls in java appeared first on Coding Security.


How to work with Swing Controls in java
read more

How form processing is done in PHP

This article explains about form processing in PHP. Users enter various data in a HTML form through different HTML controls. We will see how to process that data in a PHP script. One of the applications of PHP is processing the data provided by the users in (X)HTML forms. PHP provides two implicit arrays $_GET and $_POST which are global variables and are accessible anywhere in a PHP script. The array $_GET is used when the attribute method of the form tag is set toGET and the array $_POST is used when the attribute method of the form tag is

The post How form processing is done in PHP appeared first on Coding Security.


How form processing is done in PHP
read more

Introduction to Abstract window tool kit in java

In this article we will look at a brief introduction to AWT which is a package used for creating GUIs and is a foundation for more advanced classes.   AWT (Abstract Window Toolkit) was Java’s first GUI framework, which was introduced in Java 1.0. It is used to create GUIs (Graphical User Interfaces). Although programmers use more advanced frameworks like Swings and JavaFX, it is important to know that they are built on top of AWT.   AWT Classes The AWT framework contains many classes and interfaces using which we can create GUIs. The AWT package is java.awt. Some of the

The post Introduction to Abstract window tool kit in java appeared first on Coding Security.


Introduction to Abstract window tool kit in java
read more

Anonymous Launches DDoS Attack Against Rio Court That Blocked WhatsApp

The Anonymous hacker group’s Brazil branch launched a DDoS attack against the website of the Rio court (tjrj.jus.br) which banned the usage of WhatsApp across the country. This particular attack was meant to be a warning shot, and only lasted for a few hours. The court website was back online at 15:00, local time. Anonymous hacker group took credit for the attack through a post on their Official Facebook page, the place where they have explained the reason for their doings. Yesterday, this court in Rio ordered the country’s five major ISPs Claro, Nextel, TIM, Oi, and Vivo,to block WhatsApp across Brazil. Many times in past Whatsapp-related problems are thrown

The post Anonymous Launches DDoS Attack Against Rio Court That Blocked WhatsApp appeared first on Coding Security.


Anonymous Launches DDoS Attack Against Rio Court That Blocked WhatsApp
read more

Jumat, 22 Juli 2016

What are operators in javascript

JavaScript supports most of the traditional operators, which are grouped depending on their functionality, as follows: Arithmetic Operators Assignment Operators Relational Operators Logical Operators Bitwise Operators   Arithmetic Operators  Following are the arithmetic operators in JavaScript: + – * / % ++ — – (unary) + (unary)   Assignment Operators  Following are the assignment operators in JavaScript: += -= *= /= %= <<= >>= >>>= &= |= ^=   Relational Operators  Following are the relational operators in JavaScript: Operator Operation = = Equal to ! = Not equal to < Less than < = Less than or equal to >

The post What are operators in javascript appeared first on Coding Security.


What are operators in javascript
read more

What is UML and Design Patterns

According to Christopher Alexander, “Each pattern describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice.” Definition (In Software Development): Design patterns are repeatable or reusable solutions to commonly occurring problems in a certain context in software design.   Four essential elements of a design pattern: The four essential elements of a design pattern are: Pattern name: The pattern name provides a way to describe

The post What is UML and Design Patterns appeared first on Coding Security.


What is UML and Design Patterns
read more

What are adapter classes in java

In this article we will learn about adapter classes which are used to simplify the event handling process. Sample Java programs are also provided.   Adapter classes are a set of classes which can be used to simplify the event handling process. As we can see in the mouse event handling program here, even though we want to handle only one or two mouse events, we have to define all other remaining methods available in the listener interface(s). To remove the aforementioned disadvantage, we can use adapter classes and define only the required event handling method(s). Some of the adapter

The post What are adapter classes in java appeared first on Coding Security.


What are adapter classes in java
read more

Kamis, 21 Juli 2016

Things to do After Installing Kali Linux

Once you have installed Kali Linux on your computer, there are some things you should do. Here are some of those: Things to do After Installing Kali Linux 1-Fix Default Repository As the first task,  let us fix the default repository , type the below command in the terminal and press enter leafpad /etc/apt/sources.list after that, add the below lines in this file , and then save it ## Regular repositories deb http://ift.tt/16Fqw4e kali main non-free contrib deb http://ift.tt/16Fqwks kali/updates main contrib non-free ## Source repositories deb-src http://ift.tt/16Fqw4e kali main non-free contrib deb-src http://ift.tt/16Fqwks kali/updates main contrib non-free after updating the sources file

The post Things to do After Installing Kali Linux appeared first on Coding Security.


Things to do After Installing Kali Linux
read more

Here is How to Install and Run Kali Linux In VirtualBox

Kali Linux is the favorite OS for pentesters but it is not exactly for everyday use. Kali Linux can be overwhelming for daily use and for everyday browsing, Windows and Linux distro like Ubuntu are very famous. So, to use Kali Linux when needed is the choice we have. This can be done in 2 ways, by running Kali Linux in VirtualBox or by dual booting Kali with your choice of OS. How to How to dual boot Kali Linux with windows 10. A step-by-step tutorial. Here is How to Install and Run Kali Linux In VirtualBox In this tutorial we will

The post Here is How to Install and Run Kali Linux In VirtualBox appeared first on Coding Security.


Here is How to Install and Run Kali Linux In VirtualBox
read more

What is Delegation Event Model in java

In this article we will learn about using delegation event model i.e., how to implement event handling in Java programs.   Following are the basic steps in using delegation event model or for handling events in a Java program: Implement the appropriate listener interface. Register the listener with the source. Provide appropriate event handler to handle the event raised on the source.   Key Events Handling Following is a Java program which handles key events. In the program when the user types characters in the text field, they are displayed in a label below the text field. import javax.swing.*; import

The post What is Delegation Event Model in java appeared first on Coding Security.


What is Delegation Event Model in java
read more

What are event listener Interface in java

In this article we will learn about various event listener interfaces in Java along with the methods available in each of those listener interfaces. The event delegation model contains two main components. First are the event sources and second are the listeners. Most of the listener interfaces are available in the java.awt.event package. In Java, there are several event listener interfaces which are listed below:   ActionListener  This interface deals with the action events. Following is the event handling method available in the ActionListener interface: void actionPerformed(ActionEvent ae)   AdjustmentListener This interface deals with the adjustment event generated by the scroll

The post What are event listener Interface in java appeared first on Coding Security.


What are event listener Interface in java
read more

How event handling is performed in java

In this article we will learn what is event handling and how to handle events in Java programs using the delegation event model.   Definition: The process of handling events is known as event handling. Java uses “delegation event model” to process the events raised in a GUI program.   Delegation Event Model The delegation event model provides a consistent way of generating and processing events. In this model a source generates an event and sends it to one or more listeners. A listener waits until it receives an event and once it receives an event, processes the event and returns. The advantage

The post How event handling is performed in java appeared first on Coding Security.


How event handling is performed in java
read more

Feds Seize Kickass Torrents Domains, Arrest Owner

Kickass Torrents (also known as KickassTorrents or KAT) seems to be down. We had a little luck getting in loading, by trying both http://kat.cr and https://kat.cr, but in most of the cases the popular torrent site simply doesn’t work. Feds Seize Kickass Torrents Domains, Arrest Owner This outage came soon after the arrest of the 30-year-old Artem Vaulin, who is the alleged founder of KAT the person U.S. will seek to extradite. Artem was arrested in Poland and was charged with one count of conspiracy to the criminal copyright infringement, another count of conspiracy to commit money laundering, and another two counts of criminal copyright infringement. Criminal complaint filed in

The post Feds Seize Kickass Torrents Domains, Arrest Owner appeared first on Coding Security.


Feds Seize Kickass Torrents Domains, Arrest Owner
read more

Rabu, 20 Juli 2016

Here is How To Install Flash in Kali Linux 2.0

Kali Linux is an awesome OS for pentesting and made any fans over years. Since the default browser in the Kali is Ice weasel, which is a derivative of Firefox  it lacks the flash and java. Let’s keep java aside and try to install flash in you Kali computer. Also read: Here is How to Theme Up Your Kali Linux  How To Install Flash in Kali Linux 2.0 Step 1: Download Flash for Kali Linux Let us start the process by  downloading the  tar.gz for other linux from the website: .http://ift.tt/1iXcJMU Step 2: Extract the tar.gz File If you have finished downloading

The post Here is How To Install Flash in Kali Linux 2.0 appeared first on Coding Security.


Here is How To Install Flash in Kali Linux 2.0
read more

Here is How to Theme Up Your Kali Linux

Kali Linux is a great OS for pentesting but lets accept the truth, when it comes to bare looks, Kali looks lifeless. The Kali rolling may be an exception but even that looks boring over time. one way to make it look cool is to apply a theme on top of Kali, which we will be doing in this tutorial. Step 1: Downloading a Theme of your choice You can visit GNOME-Look website and download your theme. You must select GTK3 themes only, the link is here http://ift.tt/1mzSImk download your theme of choice which is gtk 3.x  and in tar.gz format. Step 2:Extraxting the Dowloaded

The post Here is How to Theme Up Your Kali Linux appeared first on Coding Security.


Here is How to Theme Up Your Kali Linux
read more

How the threads can be grouped in java

In this article we will learn what is a thread group? How to work with thread groups in Java along with example program.   A thread group is a collection of threads. A thread group allows the programmer to maintain a group of threads more effectively. To support thread groups Java provides a class named ThreadGroup available in java.langpackage.   Some of the constructors available in ThreadGroup class are: ThreadGroup(String group-name) ThreadGroup(ThreadGroup parent, String group-name)   After creating a thread group using one of the above constructors, we can add a thread to the thread group using one of the following Thread constructors: Thread(ThreadGroup ref,

The post How the threads can be grouped in java appeared first on Coding Security.


How the threads can be grouped in java
read more

What are Daemon Threads in java

In this article we will learn what are daemon threads? and how to make thread as daemon thread along with example Java program.   A daemon thread is a thread which runs in the background. Example for daemon thread in Java is the garbage collector. In Java, thread can be divided into two categories: User threads Daemon threads   A user thread is a general thread which is created by the user. A daemon thread is also a user thread which is made as a daemon thread (background thread).   Difference between a user thread and a daemon thread is,

The post What are Daemon Threads in java appeared first on Coding Security.


What are Daemon Threads in java
read more

How to prioritize threads in java

In this article we will learn how to work with thread priorities when there are several threads competing for CPU time. Example code is also provided.   In a uni-processor system, when several threads are competing for the CPU, you might want a certain thread to get more CPU time (burst time) over the remaining threads. We can use thread priorities in such situation.   The thread class provides three final static variables (constants) namely: MIN_PRIORITY, NORM_PRIORITY, and MAX_PRIORITY whose values are 1, 5 and 10 respectively. Priority values can be in the range 1 to 10. 1 denotes minimum priority

The post How to prioritize threads in java appeared first on Coding Security.


How to prioritize threads in java
read more

Selasa, 19 Juli 2016

This is What Happens When You Challenge A Hacker to Hack You[video]

Challenging a hacker to hack into your account might be something you don’t want to do, because you will not like the results. Kevin Roose from Fusion dared two professional hackers to hack him in a couple of weeks. The only rule here is that they should not steel his money and also they should not release his private data to public. The hackers made combined use of Social engineering and malware and got access into Roose’s life. I could explain the whole conversation, but you would want to see the complete video. Here is it: Share your views on the post

The post This is What Happens When You Challenge A Hacker to Hack You[video] appeared first on Coding Security.


This is What Happens When You Challenge A Hacker to Hack You[video]
read more

Pokemon Go Makes Nintendo More Valuable than Sony

Pokemon Go became trending game in no time and we can see people walking on the streets like zombies, holding mobile phones in their hands. We can see the people who never stepped out of their house walking everywhere to find a Pokemon. Pokemon Go become a global sensation in no time, everyone you know is playing it, and this is more than Nintendo itself has ever expected. The living proof for this is the market value of Nintendo, which recently surpassed the one of Sony Corporation. The credit goes to Pokemon Go. According to a report from Bloomberg, Nintendo is now valued

The post Pokemon Go Makes Nintendo More Valuable than Sony appeared first on Coding Security.


Pokemon Go Makes Nintendo More Valuable than Sony
read more

WikiLeaks Servers Went Down, After Announcing Turkey Coup Leaks

While WikiLeaks was releasing the details of failed Turkish coup, they were hit by a DDoS attack which resulted in shutting down of their servers. WikiLeaks received the information from an anonymous source. Here is the complete story: Yesterday WikiLeaks started teasing its followers on Twitter about an upcoming leak that may contained 300,000 emails and also over 500,000 documents. WikiLeakssyas that these documents were leaked from AKP (In English: Justice and Development Party/ In Turkish: Adalet ve Kalkınma Partisi ), which is President’s party and also the current biggest political force in Turkey. WikiLeaks has announced this data dump just three days after

The post WikiLeaks Servers Went Down, After Announcing Turkey Coup Leaks appeared first on Coding Security.


WikiLeaks Servers Went Down, After Announcing Turkey Coup Leaks
read more

Here are some Layout Managers in java

In this article we will learn about what is a layout manager and what are the different layout managers available in Java.   A layout manager is one which automatically manages the arrangement of various of components in a container. Each container will have a default layout manager. Default layout managers for some of the container classes are given below: Panel – Flow Layout JPanel – Flow Layout Applet – Flow Layout JApplet – Border Layout Frame – Border Layout JFrame – Border Layout A layout manager is an instance of that class which implements the LayoutManager interface. The layout manager

The post Here are some Layout Managers in java appeared first on Coding Security.


Here are some Layout Managers in java
read more

How to perform event handling in javascript

The programming which allows computations based on the activities in a browser or by the activities performed by the user on the elements in a document is known as event-driven programming. An event is the specification (essentially an object created by the browser and JavaScript) of something significant has occurred. Examples of events areclick, submit, keyup etc. In JavaScript all the event names are specified in lowercase. An event handler (essentially a function) is a set of statements (code) that handles the event. Below table lists most commonly used events and their associated tag attributes: Event Tag Attribute blur onblur

The post How to perform event handling in javascript appeared first on Coding Security.


How to perform event handling in javascript
read more

Philippines Government Websites Hit by Massive DDoS Attacks, Suspects China

68 Philippine government websites faced DDoS attacks last week, according the announcement made by a member of the Philippines administration. According to the official announcement, these above mentioned attacks started on July 12, the same day the Permanent Court of Arbitration that is at The Hague in the Netherlands ruled for the Philippines against a conflict with the China. To be more specific, it is all concerned of several newly created islands in the West Philippine Sea which intruded into Philippine’s maritime territories. Philippines started claiming that China manufactured and claimed those islands just to expand its maritime territory into the area which was under the Philippine’s control.

The post Philippines Government Websites Hit by Massive DDoS Attacks, Suspects China appeared first on Coding Security.


Philippines Government Websites Hit by Massive DDoS Attacks, Suspects China
read more

what are control statements in javascript

Statements that are used to control the flow of execution in a script are known as control statements. Control statements are used along with compound statements (a set of statements enclosed in braces). Local variables are not allowed in a control construct (control statement + single/compound statement). Even though a variable is declared within a control construct, it is treated as a global variable.   Control Expressions The expressions upon which the flow of control depends are known as control expressions. These include primitive values, relational expressions and compound expressions. The result of evaluating a control expression is always a

The post what are control statements in javascript appeared first on Coding Security.


what are control statements in javascript
read more