Jio Celebration Offer 2018
Islands That are Mysteriously Ruined By Creatures
Learn Free Ethical Hacking Tutorials
MS Dhoni-Full Biography
Tips to Gain Weight in Just 20 Days
5 Amazing Toothpaste Beauty Hacks - You Must Try
Unknown and Amazing facts about Technology
How to Get Rid of dandruff - 100% working Home Remedies
Join us on Pinterest

Saturday, September 8, 2018

// // Leave a Comment

Reliance Jio Cadbury Dairy Milk Offer | Get 1 GB Data Free!!!

MyJio Cadbury offer


Jio Cadbury offer-Newsworldfactors
Reliance Jio is once more providing free data to their users by simply uploading a cadbury wrapper picture, as a free gift. Don’t throw the cadbury wrapper in trash barrel next time once you get a dairy milk, simply click a photograph by going into  MyJio app and avail your free one GB data. Isn’t amazing? don't Got it? ne'er mind, I have further explained all steps below...Keep Reading

How to Get MyJio Cadbury offer

  1. Firstly, Update your MyJio App
  2. Login/Skip Login with Jio Sim
  3. On dashboard,A Banner image of Cadburry offer are shown.
  4. Click on the Cadbury Banner from the Dashboard
  5. Now Click on Participate now Button
  6. Take a snap of Cadbury dairy Milk wrapper from your camera and upload it.
  7. That’s it! you may get a successful Message. Congratulations you have got unlocked one GB data.
  8. Now click on "KEEP one GB" option and you will get 1GB 4G data within 7-8 Days in your Account

You can conjointly gift Your data of 1GB to PRATHAM FOUNDATION.

MyJio Cadbury offer Trick

If you do not have an empty cadbury chocolate wrapper, don't fret, I have used Cadbury dairy Milk photos available on Google photos and it worked for me, you can conjointly try and Comment below your experience.
Read More
// // Leave a Comment

Jio Announces Celebration offer | Get 8GB 4G Data Free!!!

Jio Celebration offer 2018


Jio  Celebration offer 2018- Newsworldfactors

Reliance Jio has completed its 2 year industrial run in  "India" on September fifth. To celebrate its 2nd-anniversary  the Company has introduced a proposal referred to as Jio Celebrations pack.

As a part of the new Celebration Pack offer, Jio is giving 2GB of data per day to its subscribers for fully free. they're going to  deliver 2GB of high-speed daily data to you to celebrate its anniversary. In alternative words, Jio is providing 8GB of data for a span of 4 days.You don't have need to redee, a code or recharge a pack to induce this provide. Company can automatically provide this data in your My Plans Section, in my jio app.

To check if you have got received the free data or not, visit the MyJio app on your smartphone. In the app, open the My Plans section, wherever you'll get the list of all the plans activated on your SIM. If you will are entitled to the free data, the Jio Celebrations Pack can seem below your main plan. Notably, this offer might vary from user to user and telecom circle to circle. 

Terms and Conditions:

There are 2 Vouchers of eight GB High Speed data (2GB/day for four days in september month and 2gb/day for four days in october), where the primary voucher would be credited this month (maximum by twentieth September, 2018) and therefore the second voucher are going to be attributable in october 2018 (Date isn't Fixed). The voucher are going to be automatically applied on your existing plan and you'll be able to check usage by visiting “My plans” section in MyJio.

One more thing, Jio is not sending Message alerts regarding this offer to their customers, So you have to check My jio app to get info about this offer.

Write in the commment Section whether you have got this amazing offer or not...Thank you
Read More

Thursday, September 6, 2018

// // Leave a Comment

Top 10 Expensive Watches of the world

Top 10 Expensive Watches of the World


In this article i am exposing Some Most Expensive Watches of the world. Have A Look...

Split Seconds Patek-Philippe Reference 1436 

Top 10 Expensive Watches of the world
This is a really long name, and we can only hope it lasts for just as long, cause this $214,000 watch, is a whole lot of fancy, and with cool features that would put inspector gadget to shame.

The Rolex Submarine 

Top 10 Expensive Watches of the world
Lots of people own Rolex's. Some real, some fake, and some worth $234,000. Yep, you heard right. This particular Rolex is self-winding and made of stainless steel. Misplacing this would give new pain to the term “lost time”.

Ulysse Nardin Triple Jack Minute Repeater

Top 10 Expensive Watches of the world
This watch’s unusual design costs more than a Ferrari, but definitely doesn’t possess as much…power. It’s pretty basic, but it’s so rare which makes it so exorbitantly expensive. If you like seeing three man hammering a bunch of bells every time you look at your wrist, why not pay $340,000 for it?

Jaeger – LeCoultre Gyro tourbillion

Top 10 Expensive Watches of the world
This $400,000 piece of time keeping machinery is, in essence, an anti-gravity device that you can wear. It features something called tourbillions which prevents gravity from affecting its accuracy.


Richard Mille Tourbillion

Top 10 Expensive Watches of the world
Some watches look like, well, watches, and others look like the lovechild of the terminator and something from alien. This $525,000 slice of the future is so advanced, we can’t tell which parts tell the time, and which ones are the door to a mystic abyss.


AP Royal Oak Grande Complication

Top 10 Expensive Watches of the world
With a retail price of $742,900, you could just buy a couple of houses. Or you can go with this dazzling watch that comes with these unique features, a minute repeater, split seconds chronograph and perpetual calendar. Ya thats totally worth it! Cause it not your average watch you can buy on a street corner. It’s for those shot callas that got no time to waste.


Patek-Philippe Ref 5016P

Patek-Philippe Ref 5016P
This platinum masterpiece costs a beastly $762,000, and requires regular adjustments, but if you have the money to buy it, that clearly shouldn’t be a problem. It’s a moon-phase, perpetual calendar piece of art that we don’t even think Bill Gates would buy. he can afford it, but he probably wouldn't buy it.

Vacheron Tour de I’iIe

Vacheron Tour de I’iIe
Vacheron happens to be the oldest manufacturer of watches in the world, and is the owner of the most complicated serial wrist watch ever created. It’s worth a whopping $1,250,000, almost as much as a Bugatti. Except…a lot smaller. And a lot easier to misplace.

The Patek Caliber 89 

Top 10 Expensive Watches of the world
When did you last buy a watch, and what did you pay? Was it close to $5,120,000? This one-of-a-kind piece is the most complicated watch in the world, with 33 complications. At the end of the day, you just want to know the time, but would you pay 5 million bucks for that? Well, Apparently, some fancy people Do!

The Breguet Marie Antoinette

Top 10 Expensive Watches of the world
This watch is estimated to be worth 30 million dollars, it was stolen by master-thief Naaman Diller in 1983, and found in 2007, 3 years after Naaman Diller passed away of old age. It took Breguet and Marie Antoinette 44 years to construct the original, but both of them passed away before its completion
Read More

Monday, September 3, 2018

// // Leave a Comment

Rekha- A Versatile Lady

Rekha Bollywood Actress
This is the story of an actress.. ..whose life was stuffed with success, sex and controversies. Bhanu Rekha Ganeshan. and that we call her Rekha. 70's sex-symbol Rekha's childhood.. ..was conjointly stuffed with controversies. Her father was the superstar of Tamil movie industry. Gemini Ganeshan. And her mother was an actress in Telegu films. Pushpavali. it was also heard that once Rekha was born.. ..her parents weren't married yet. And for years, Gemini Ganeshan.. ..didn't accept Rekha. once Rekha became a star.. ..she expressed her anger towards her father within the media.

Rekha got entry within the movie industry rather simply. Her film 'Sawan Bhadon' was successful at the box-office. however tons of individuals within the film industry did not like her. Rekha conjointly aforesaid in an interview, that.. ..people used to call her The anomaly of the movie industry. Because, that was the time when.. ..Rekha looked dark and plump. Like each sensation, Rekha was anticipating the proper turn. And, that turn came in her life when.. ..she worked with Amitabh Bachchan within the film 'Do Anjaane'.

Rekha and Amitabh Bachchan's pair was successful.. ..and they dominated the box-office. whether or not it was 'Mr. Natwarlal' or 'Muqaddar Ka Sikandar'.. ..and, who can ever forget the contentious film 'Silsila'.  Amitabh Bachchan came as a golden chapter in Rekha's life.. ..which Rekha still cherishes.

When Rekha was asked in an interview.. ..whether she beloved Amitabh Bachchan, she replied.. ...there's no one during this world that does not love Amitabh. Rekha and Amitabh Bachchan's so called affair.. ..made the headlines for years. And even these days, in each award scenario.. ..the media's focus is usually on Amitabh and Rekha. Although, Rekha received the status of a glamour lady in films. But, a movie changed her life forever. which film was 'Ghar', released in 1978. And, Rekha contend a rape victim during this film. And, the music of this film... ..portrayed Rekha's image differently. 'Ghar' was the film, after which.. ..the critics finally accepted Rekha as an actor. film reporters gossiped plenty regarding Rekha's personal life.. ..in their movie magazines. And, this conjointly troubled Rekha a lot. But, once doing a movie like 'Khoobsurat'.. ..it quietened those critics additionally.

Rekha was mounting new heights of success.. ..but, controversies weren't leaving her alone. after her so called affair with Amitabh Bachchan.. ..she married businessman Mukesh Agarwal. And, few years of her wedding.. ..Mukesh hanged himself with Rekha's veil. Passing through stages of happiness and sorrow.. ..Rekha was obtaining a fastness in the movie industry. And a novel chance came in her life, that completely modified her image. That film was Muzaffar Ali's 'Umrao Jaan'. Where, Rekha play the character of a dancer. And, throughout an interview Rekha aforesaid.. ..when she was given the script of 'Umrao Jaan'.. ..she might see her own image within the character. after 'Umrao Jaan', every alternative film-maker.. ..wanted to visualize Rekha in the role of a dancer. But, Rekha's one in all those actresses.. ..who forayed in parallel cinema similarly. In films like Shyam Benegal's 'Kalyug' and Girish Karnad's 'Utsav'.. ..her characters are persistent.

In the 80's Rekha was conjointly referred to as a action heroine. Some gave her the title of lady Amitabh. Her films like 'Phool Bany Angaray' or.. ..'Khoon Bhari Maang', Rekha showed her action skills additionally. there were rumours about Rekha's wedding.. ..with her close friend Vinod Mehra. But, years later Rekha cleared in an interview.. ..that Vinod Mehra was simply a friend, they ne'er got married. With ever-changing time, where famed heroines faded away.. ..Rekha treaded ahead. whether or not it absolutely was 'Koi Mil Gaya' or 'Krrish'.. ..or Shyam Benegal's 'Zubeidaa'. The Hindi movie industry liked see each single role of Rekha.

She fought controversies all her life.. ..and Rekha created a special image for herself. Even today, clad in a 'Kanjivaram sarii'.. ..Rekha appears like an angel. She is an honourable inspiration for all trendy actresses.
Read More

Sunday, September 2, 2018

// // Leave a Comment

Impact of Cambridge Analytics Data Scandal On Facebook

Impact of Cambridge Analytics Data Scandal On Facebook


Impact of Cambridge Analytics Data Scandal On Facebook

Facebook's market capitalisation lost over $100 billion in a day. Investors had looked like Facebook's only friends. Many younger users had deserted the social network years ago for alternatives like Snapchat. Regulators are investigating the company after the massive data leaked to Cambridge Analytica. Politicians are angry that Russian disinformation may have sowed division ahead of the US 2016 election. Juckerberg said- "We didn't take a broad enough view of our responsibility, and that was a big mistake and it was my mistake. And I'm sorry. But nothing had lost....is the friendship of investors who had bid this stock up to an all-time high".

Facebook shares had bottomed out in March after the Cambridge Analytica scandal first erupted, but since then they've gone on a very nice rally. That meant the shares were extended, and perhaps overextended, leading into this earnings season. It's important to remember that Facebook shares are still higher than where they started the year. So investors were clearly spooked by these results, but they're hardly panicking yet. Facebook makes its money from advertising. Growth is partly faltering as it tries to find new places to put ads in front of eyeballs. But advertisers seem unlikely to desert the network just yet.

Advertisers have, surprisingly to some, not pulled away from the website. We've seen even in this quarter, when there were a lot of bad results, advertisers spent $13bn on the website. That was up 40% from a year ago. So for now, it seems that Facebook is deemed to still be too big and important to pull away from. Facebook and Google still have this duopoly in terms of digital advertising. So if you want to be seen online, there isn't much of a choice still other than to spend on Facebook.

Advertisers might be pushed to leave Facebook if the bulk of users were to go elsewhere. But user numbers keep rising. The hashtag "#DeleteFacebook" movement after the Cambridge Analytica scandal failed to make an impact. And even people who never use Facebook are often avid users of Instagram, which Facebook owns. That said, last quarter user growth did slow. 

Facebook is mainly adding users in developing countries which don't have large digital advertising markets. North American users held steady. And European users actually dropped by a million as new privacy rules meant they had to consider data protection policies before logging in. That might be a sign of a longer term decline. Or it could be a blip, as people just didn't want to tick through all those pesky boxes. So, have we reached peak Facebook? The answer is clearly no.

The dramatic drop in Facebook's market cap marked the end of an era where Facebook was the bright young thing of the tech industry. But now as it starts to grapple with some big grown up problems, we see that it still remains by far the largest social network in the world
Read More
// // Leave a Comment

Biography of Nana Patekar

Biography of Nana Patekar
Nana Patekar
Nana Patekar's full name is Vishwanath Nana Patekar. He was born on January 1, 1951 in Raigad Murud-Janjir, Maharashtra. His father, Dinkar Patekar, was a textile merchant trader. Mother's name was Sanjana Bai Patekar. He completed the studies of Sir JJ Institute of Applied Arts. Very few people know that they often used to help the police in making sketches of criminals. Before coming to the film industry, he worked for the advertising agency. She came in films because Smita Patil had compelled her. He knew her from Pune. He took them to the famous producer Ravi Chopra. The film's name was 'Today's Voice'. He was given the role of a rapist. Nana Patekar felt this role very bad. They refused and gave them a better role.

If you come back to Nana Patekar's life and see, then his father had a small business of textile painting. His father used to enjoy watching his son's plays, Nana Patekar used to play drama in his village. He felt that his father loved his elder brother more than him. When he worked in a play called 'Valmiki', and his father came from far away to watch the drama, Nana Patekar got happy. When he was only 13 years old, his father had a big loss in business. Their entire property was sold. At the age of 13, she went to school in the morning and used to do laboring in the evening. He used to go to the lamps which was 8 km away from his house and used to paint the film posters. He used to get 35 rupees per month for this work.

Whenever her father said that the children have grown up and I do not have the money to feed them, Nana Patekar would have been crying. Sometimes Nana Patekar used to visit his friend's house at noon or night because he used to think that it is lunch time. Maybe his friend should give him food. He told his friend, 'I am hungry.' But still Nana Patekar did not quit acting. He worked under the direction of a famous artist, Vijaya Mehta. The role was very much appreciated, everyone knew that he would become a famous actor in the future.

When he got married to Neelkanti, he was doing theater. He earns Rs 750 a month while his wife was earning 2500 rupees per month because he was a banker. He always said, 'You work hard in the theater, I will earn money' and 'I am sure that one day you will earn a lot of money.'

They both fell in love and they got married only at the age of 27. He had a child. Due to some complications during the birth, that child died very soon. He had another son, his name is Malhar. Seeing his acting skills in 'Salaam Bombay', the film industry was approaching him. He was signed for the film 'Angar'. He also received an award for this film ... and he started to be seen as a hero in the film industry as well as the villain.

Whether Marathi or Hindi cinema, Nana Patekar has performed miracles everywhere with his performance. The film 'Krantivir' proved that the manner in which Nana Patekar speaks is spellbound to everyone. He is Amol Palekar's 'Somany Romani Ho Jai' .. .. Vidhu Vinod Chopra's 'Parinda' has done work in movies that he can adapt to every character.

There was a time when he became director of the film. The name of the movie was 'Prahar - The Last Attack' .. He also personally took army training for it. The film became very famous. There was a cartoon series called 'The Jungle Book' on Doordarshan. In it Nana Patekar gave his voice for the character of "Sher Khan". There is no role, hero, villain, or comedy .. It is impossible to do any role played by him for any other actor. He was also given National Award for films such as 'Parinda', 'Krantivir' and 'Agni Sasakshi' Nana Patekar's name will be taken with honor in Indian cinema history for his non-acting skills.
Read More

Saturday, September 1, 2018

// // Leave a Comment

Working of TCP/IP Protocols-Newsworldfactors

How Does TCP/IP Works?

In Previous 6 Lesson of this Ethical Hacking Learning Series We are Familiar
With Its basic concepts, Definitions and
Fundamental approaches, Now it's a time to Dive deeper and Deeper in this Ocean of Hacking.
In Previous Lesson we have discussed about TCP/IP Protocols, Now Let's Understand Working Procedure of TCP/IP Protocols.

Working of TCP/IP Protocols By Newsworldfactors


The TCP / IP protocol is operated with the aid of using stack. it's far the sum of all of the protocols which might be required to meet the transmission of informations between 2 units. (it is a path because of which informations are transferred from one system to another ).

While data is passed then it goes to its destination. There, the procedure is carried out within the contrary (the data first completes the physical layer and later the stack travels its way). Throughout this procedure, a complicated system of errors research is employed on both the source and the destination system. every layer of the stack can send the data from its adjoining layer. every layer is also linked to numerous protocols.

At each stage of the heap, these protocols do their job with very complexity, of which As a end result, special services are furnished to the user

>> What are Sniffers?

Working of TCP/IP Protocols By Newsworldfactors

Snifers are those devices that can monitor such processes. A snuffer is a device - either hardware or software - which can read every packet sent to the network. Snifers are usually used to isolate network problems, while invisible to the user, network performance is decreasing. Thus, sneakers can read all the activities that occur between the network-level protocols. Apart from this, as you can guess, sniffers can create a tremendous security threat.

Personal protocol

You have tested how the data is transmitted through TCP / IP using protocol stack. Now I want to zoom in to identify the main protocol that works within that stack. I will start with the network-level protocol

Network-level protocol

Working of TCP/IP Protocols By Newsworldfactors
Network protocols are those protocols that transparently attach the transportation process (or feature). This is invisible to the user unless the user employs utilities to monitor system processes.

Important Network-level protocols include: -

• Address Solution Protocol (ARP)

• Internet Control Message Protocol (ICMP)

• Internet Protocol (IP)

Transmission Control Protocol (TCP)


The Address Resolution Protocol

Working of TCP/IP Protocols By Newsworldfactors
Address solution Protocol (ARP) serves the vital purpose of mapping internet addresses in physical address. this is often necessary in routing information on the internet. Before sending any message (or alternative data), it is packed in Internet protocol's packet, or blocks of formatted data formatted for internet transportation. they need numerical internet (IP) address of each native and destination machines. Before this package might leave the initial computer, however, the hardware address of the recipient (destination) ought to be searched. (The hardware addresses are completely different from the internet address.) this is often where arp does its beginnings.

An arp request message is broadcast over the subnet. This request has been received by the router who responds with the requested hardware address. This answer has been caught by the initial machine and also the transfer process might begin. ARP's design includes a cache. to know the arp cash concept, contemplate this: -

Most modern hypertext markup language browsers (such as Netscape Navigator or Microsoft's internet Explorer) use a cache. this is often a section of the cache disk (or memory) that contains components of frequently viewed websites (like buttons, headers, and general graphics). this can be logical due to when you come back to those pages, these tidbits mustn't be reloaded from a remote machine. It should be in your native cache then they should load quicker similarly, arp implementation includes a cache. during this approach, the hardware address of the remote machines or network is remembered, and this memory prevents the necessity for consequent arp operations to run on them. It saves time and network resources.

Are you able to guess what forms of security risks may be enclosed in maintaining such an arp cache? At this stage, it's not significantly important. However, address caching (not solely in the arp but altogether cases) truly creates a unique security risk.

 If such address location entries are stored, then it makes it simple for a cracker to create a connection to the remote machine, that claims to meet one of the cached addresses.

The Internet Control Message Protocol (ICMP)

Working of TCP/IP Protocols By Newsworldfactors
The Internet control Message Protocol handles error and keep an eye on the messages that are passed between 2 (or more) computers or hosts throughout the transfer process. It permits those hosts to share that information. during this respect, ICMP is essential for diagnosing of network issues. examples of diagnostic info gathered through ICMP include

• When a host is down

• When a gateway is full or inoperable

• Other failures on a network

>> What is Ping?

The Most Widely illustrious ICMP implementation involves a network utility called Ping. Ping is commonly used to confirm whether or not a remote machine is alive. Ping's technique of operation is simple: once the user pings a remote machine, packets are forwarded from the user's machine to the remote host. These packets are then echoed back to the user's machine. If no echoed packets are received at the user's end, the ping program sometimes generates an error message indicating that the remote host is down.

The Internet Protocol

IP belongs to the network layer. the internet Protocol provides packet delivery for all protocols among the TCP/IP suite. Thus, IP is the heart of the unimaginable process by which information traverses the internet.

>>What is IP Datagram

An ip datagram consists of many elements. the primary part, the header, is composed of miscellaneous data, as well as originating and destination ip address. Together, these components form a whole header. The remaining portion of a datagram contains whatever data is then being sent.

The wonderful issue concerning ip is this: If ip datagrams encounter networks that need smaller packages, the datagrams bust apart to accommodate the recipient network. Thus, these datagrams will fragment throughout a journey and later be reassembled properly (even if they do not arrive within the same sequence in which they were sent) at their destination. Even additional data is contained within an ip datagram. a number of that data could include identification of the protocol being used, a header checksum, and a time-tolive specification. This specification is a numeric value. whereas the datagram is traveling the void, this numeric value is consistently being decremented. once that value finally reaches a zero state, the datagram dies. many varieties of packets have time-to-live limitations. Some network utilities (such as Traceroute) utilize the time-to-live field as a marker in diagnostic routines. In closing, IP's function can be reduced to this: providing packet delivery over the net. As you can see, that packet delivery is complex in its implementation.

The Transmission Control Protocol


The Transmission Control Protocol is the chief protocol utilized on the net. It facilitates such mission-critical tasks as file transfers and remote sessions. TCP accomplishes these tasks through a Way Known as reliable data transfer. during this respect, TCP differs from different protocols among the suite. In unreliable delivery, you have no guarantee that the information will arrive in a good state. In distinction, TCP provides what's sometimes mentioned as reliable stream delivery. This reliable stream delivery ensures that the information arrives within the same sequence and state during which it had been sent. The TCP system depends on a virtual circuit that's established between the requesting machine and its target. This circuit is opened via a three-part method, typically stated as the Three-Part Handshake.

After the circuit is open, information will simultaneously travel in each directions. This ends up in what's typically called a full-duplex transmission path. Full-duplex transmission permits information to passing through each machines at the same time. during this way, while a file transfer (or different remote session) is underway, any errors that arise may be forwarded to the requesting machine. TCP conjointly provides intensive error-checking capabilities. for every block of information sent, a numeric value is generated. the 2 machines establish every transferred block using this numeric value. for each block successfully transferred, the receiving host sends a message to the sender that the transfer was clean. Conversely, if the transfer is unsuccessful, 2 things could occur:

• The requesting machine receives error information

• The requesting machine receives nothing


When an error is received, the information is retransmitted unless the error is fatal, in which case the transmission is sometimes halted. A typical example of a fatal error would be if the connection is dropped. Thus, the transfer is halted for no packets.

Similarly, if no confirmation is received among a given period, the data is additionally retransmitted. This process is continual as persistently as necessary to finish the transfer or remote session. you've got examined how the information is transported once a connect request is made.

It is time to Discover what happens when that request reaches its destination. When one machine requests a affiliation to another, it specifies a selected destination. This destination is expressed as the internet (IP) address and the hardware address of the target machine. The requesting machine specifies the application it's making an attempt to achieve the destination. This involves 2 elements:

• A program referred to as inetd

• A system supported Ports

Inetd: The Mother of All Daemon's


What are Daemon?

Working of TCP/IP Protocols By Newsworldfactors
Daemons are programs that unceasingly listen for alternative processes (in this case, the process listened for is a connection request). Daemons loosely check, terminate and stay resident (TSR) programs within the Microsoft platform. These programs stay alive in the slightest degree of  times, perpetually listening for a selected event. when that event finally happens, the TSR undertakes some action. inetd is a very special daemon. it's been called many things, including the super-server or grandfather of all processes. this is often because inetd is that the main daemon running on a UNIX machine. it's additionally an inventive tool. common sense tells you that running a dozen or additional daemon processes could eat up machine resources. therefore instead of doing this, why not create one daemon that might listen for all the others? that's what inetd does. It listens for connection requests from the void.

When it receives such missive of invitation, it evaluates it. This analysis seeks to determine one thing only: What service does the requesting machine want? like, does it need FTP? If so, inetd starts the FTP server process. The FTP server will then process the request from the void. At that time, a file transfer will begin. This all happens within the space of a second or so.

Note:- inetd is not just for UNIX anymore. to Illustrate, hummingbird Communications has developed (as part of its Exceed five product line) a version of inetd to be used on any platform that runs Microsoft Windows or OS/2. There are non- business versions of inetd, written by students and alternative software system enthusiasts.

In general, inetd is started at boot time and remains resident (in a listening state) till the machine is turned off or till the root operator expressly terminates that process. The behavior of inetd is usually controlled from a file known as inetd.conf, placed within the /etc directory on most UNIX platforms. The inetd.conf file is employed to specify what services will be called by inetd. Such services may include FTP, Telnet, SMTP, TFTP, Finger, Systat, Netstat, or the other processes that you just specify.


The Ports

Many TCP/IP programs are often initiated over the net. Most of these are client/server bound Programs. As a connection request is received, inetd starts a server program, which communicates with the requesting client machine. To facilitate this technique, each application (FTP or Telnet, as example) is appointed a unique address. This address is called as Port. Once any association request is created thereto port, the corresponding application is launched (inetd is the program that launches it). There are thousands of ports on the common internet server. For purposes of convenience and efficiency, a daily framework has been developed for port assignment. (In different words, although a supervisor can bind services to the ports of his or her choice, services are typically bound to recognized ports. These are usually Known  as Wellknown ports.)
Read More

Tuesday, August 28, 2018

// // Leave a Comment

What is TCP/IP | Ethical Hacking Tutorials | Part 6

What's TCP/IP?



TCP / IP refers to 2 network protocols (or strategies of records transport) used in the world of Digital life. they're Transmission control Protocol and internet Protocol respectively. Such networks are associated with massive collections of protocols, protocols, or protocol suites. they may be together called TCP / IP suites. in the TCP / IP suite, the moujood protocols work collectively to offer records transportation over the internet. In different phrases, these protocols provides nearly all of the services available for modern internet surfers.

Some of them are included in the services:-

• Broadcast of email

• Record switch

• Usenet news delivery

• Getting Administration to the World Wide Web

There are  2 kinds of protocols inside the TCP / IP suite:-

• Network-level protocols
• App-level protocols


Network-level protocol

level protocols control discrete mechanics of information switching. these protocols are commonly invisible to the customers and are operated deeper under the surface of the device. as an example, IP protocol enables packet delivery of data despatched between users and far off machines. It does this on a variety of facts basis, specifically the IP address of 2 machines. based on this and other data, the IP ensures that the information will attain the preferred destination. Due to which this manner, IP data interacts with different network-level protocols engaged in this transfer.

App-level protocols

In comparison, App-level protocols are visible in for a few ranges ranges. for example, a person sees the file transfer Protocol (FTP). The person requests a connection to some other machine to transfer the file, the connection is established, and the transfer starts. throughout the transfer, a part of the exchange between the user's device and the remote machine is visible (mainly error messages and status reports of the  transfer done, as an instance, how much bytes of the record were moved at any second) TCP Refers to the gathering of IP protocols that gives conversation between machines (or different networks running TCP / IP) on the World wide web.

The History of TCP/IP


In 1969, the defense advanced research project agency (DARPA) starts the invention of a network by which research centers running on the research of this network could talk. Its primary issue became the capability to resist the nuclear assault of this network. In essence, if the Soviet Union released a nuclear attack, it was essential that the network communication facility stays intact. There were many other necessities within the layout of this network, the most important of which was: "It was to operate independently of any centralized control" therefore, if 1 machine was destroyed (or 10, or 100), then also the network was anticipated to live robust

primarily based at the research finished in 1962 and 1963, the prototype for this device emerged hastily. That prototype changed into referred to as ARPANET. ARPANET labored nicely, but it become challenge to periodic system accidents. other than this, long time growth of that network proved highly-priced. there was a protocol set which become greater reliable,

A search was launched for a greater reliable set of protocols; This discovery ended with the development of TCP / IP within the mid-1970s. TCP / IP had great advantages over other protocols. for example, TCP / IP was mild (it required much less network resources). and besides this, TCP / IP could be applied at a completely low cost in comparison to other alternatives available at that time. based on such functions, TCP / IP was become famous In 1983, TCP / IP was incorporated into Berkeley software program Distribution (BSD) Unix release 4.2. It was quickly unified in business forms of Unix, and TCP / IP was set up as an internet preferred type.

 but, TCP / IP is being re-evaluated. extra customers translate into more network loads. in order to reduce that network load and deliver more speed of information delivery, a few researchers have advised implementing TCP / IP via satellite transmission. regrettably, such researches has produced disappointing effects till now. TCP / IP is actually irrelevant for this implementation. nowadays, TCP / IP is used for lots of works, not only on the internet. for example, Intranet is mainly created using TCP / IP. In such an surroundings, TCP / IP can provide large advantages on different networking protocols. One such benefit is that TCP / IP works on diverse kinds of hardware and also on different systems.

As a result, using a TCP / IP can create a heterogeneous network fastly and without facing any difficulties. Such networks might also consist of Mac, IBM Compatibles, sun Spartusts, MIPS machine, and so on. every on them can communicate with their companions by using a common protocol suite.
Read More

Monday, August 27, 2018

// // Leave a Comment

Difference Between A Hacker and A Cracker

What is the Difference Between A hacker and a Cracker?

In this lesson, we will discuss about Difference between a hacker and a cracker.

Difference between a hacker and a cracker

Many articles were written about the distinction among hackers and crackers (specifically in the Digital world). Among them, the authors frequently attempt to correct public misconceptions. For decades, the yank media has simply used the word hacker while it means to a cracker. So the yankee public now believes that hacker is a person who can tear up the Digital machine. 

That is unfaithful and there's additionally the purpose for dissatisfaction for a number of our maximum proficient hackers. There are a few conventional assessments to decide the distinction among hackers and crackers. I offer them within the order of their recognition. Initially, I recommend to offer common definitions of every phrase. It will help  to understanding  the basis for the upcoming lessons of  this series. A few definitions are as follows:

Ø A hacker is someone inquisitive about the arcane and recondite workings of any computer operating system. Frequently, hackers are programmers. That's why, hackers achieves superior information of operating systems and programming languages. They're keen to understand about the holes inside the Particular machine and the this is the motive for his or her beginning. Hackers continuously want informations, they feel free to tell about  what they have looking for, and by no means intentionally misuse the information.

Ø A cracker is someone who breaks or violates device integrity of remote machines with malicious intentions. Crackers, on the way for taking  advantage of unauthorized access, ruins critical informations, wrongly affect the provider of legal users, or essentially create issues for others to acquire their dreams. Crackers can be effortlessly recognized in a way that their task is malicious.

These definitions are proper and may be utilized in wellknown phrases but, there are different assessments too. A felony test is likewise covered on this. it is stated that via making use of legal arguments according to it, you could differentiate among hackers (or some other party) and crackers. there's no comprehensive legal education required for this test. it is clearly used via asking it as "Men's- Rea".


What is Men's Rea?

Meaning of Man's Rea with other wordsMen Rea is a Latin phrase that indicates contaminated mind. This term is  used to explain the intellectual situations wherein criminal intention exists. Within the hacker-cracker equation, it is simple to use Men's Rea.

If the suspect has unknowingly entered the O.S. system, then there may be no guy in this example and consequently there's no crime.

 If the suspects were properly conscious that they're violating safety measures, and they're intentionally making plans sophisticated techniques of enforcing that violation, then right here men are present and crime has been done.

With this measure (at least one legal point of view), the first men/ person might be a hacker and the latter is a cracker. In my view, hackers and crackers are human, the much better manner distinguish those individual is to recognize their motivation and strategies of their lifestyles. I need to begin with hackers. in order to apprehend the hacker's brainset, you ought to first realize what they do. To provide an explanation for this, I want to speak about briefly on computer languages.

Computer Languages:

all computer languages There may be a set of computer libraries or commands, that could create an useful computer software if it is nicely prepared and compiled. The constructing blocks of a given computer language are by no means modified considerably. That's why all programmers ought to begin with basics, a number of those basic terms include these examples.

Language Libraries - these are pre-fabricated features which might be normally included in any computer program. they're provided to the programmer in order to focus on different common, much less common components of the computer application.

Compiler - these are software applications that convert programmer's written code into executable format, which might be appropriate for running on this or that platform. Programmer isn't any more than languages ​​(except for some manuals).

Describe how to use these equipments?  it relies upon onto a programmer to maintain them in mind and use them correctly or not. They are able to create a program for lots aspects (either to learn or to create, to achieve or to misuse or to harm the services). This is a beneficial process, not humiliating.

Throughout these studying and learning processes, the programmer learns such things which are not yet created or in other words, the language that's absent between the libraries and the compiler: and beyond them additionally.

Contemporary hackers, but, nonetheless reach deeper. They take a look at the system, frequently at a microscopic level, find holes inside the software program and discover snags inside the logic. They write programs to test the integrity of different programs. for this reason, if a hacker creates a application which can routinely take a look at the safety structure of the wireless device, it now indicates the desire to be higher. it is the advent and development via the technique of evaluation.

On another hand, crackers not often write codings from their own saying. As an alternative, they ask for system, borrow, or thieve from others. They do not use these equipment to improve net safety, to remove it. They've the technology, perhaps, but do not have programming talents or creativeness.

 They research for loopholes in the systems holes and can be enormously proficient to practice their unfavorable arts, however they stay constrained. a true cracker makes nothing and destroys lots. Their primary happiness comes from hindering others' computer services or also  from destructive results.

So basically it is the Difference of hackers and crackers. Both are effective forces at the net, and both will stay permanently in the future. And, as you would possibly have guessed, few humans can qualify for both of these categories. The life of such peoples facilitates in furthering the division among these  extraordinary agencies of human beings.

Read More

Sunday, August 26, 2018

// // Leave a Comment

Top Black Hat Hackers of the World | newsworldfactors

Top Black Hat Hackers of the World


Free ethical hacking tutorials

In our Previous Lessons we are familiar with Basic concepts of Ethical hacking, and Top white hat hackers of world. Now, in this lesson let's have a look to Top black hat hackers of the world.
The purpose of this lesson is to tell you what is the punishment of hacking done for wrong motives?

#1. Jonathan James
Black hat hacker-Jonathan James16-year-vintage black hat hacker Jonathan James, became the primary juvenile imprisoned for cybercrime. James received his notoriety through imposing a sequence of a success intrusions into numerous systems. In a nameless PBS interview, he professes, “i was simply searching around, playing around. What was amusing for me turned into a project to look what I ought to pull off.”

James’ most important intrusions focused excessive-profile businesses including NASA and the department of defense. He cracked into NASA computer systems, stealing software well worth about $1.7 million. He additionally hacked into the defense hazard reduction organization and intercepted over 3,000 pretty secretive messages passing to and from the DTRA personnel, whilst accumulating many usernames and passwords additionally called “c0mrade,” James devoted suicide using a gun, On may 18, 2008, at the age of 25. His suicide became reputedly prompted by way of the perception that he might be prosecuted for crimes he had no longer devoted. “I really, truly had nothing to do with TJX,” James wrote in his suicide notice, “I haven't any faith in the ‘justice’ system. possibly my actions these days, and this letter, will send a stronger message to the public. both manner, I've lost my control over this condition, and that is my simplest manner to regain control.”

#2. Gary McKinnon

Black hat hacker- Gary McKinnonIn 2002, a very strange message seemed on a US military computer screen: “Your safety machine is crap,” it read. “I'm Solo. i can preserve to disrupt at the very best ranges.” It were later diagnosed as the work of Scottish systems administrator, Gary McKinnon, who was accused of perpetrating the “largest army computer hack of all time”. he's accused of hacking into ninety seven U.S. army and NASA computer systems over a 13-month duration between, the usage of the name ‘Solo’.


The United States government declares that he deleted crucial documents from operating systems, which shut down the us military’s army District of Washington network of 2,000 computer systems for 24 hours. After the Sep 11 assaults in 2001, he deleted weapons logs at the Earle Naval weapons Station, rendering its network of 300 computers inoperable and paralyzing munitions supply deliveries for the united states navy’s Atlantic Fleet. He is likewise accused of copying information, account documents and passwords onto his personal systems.

#3. Adrian Lamo

Black hat hacker- Adrian LamoAdrian Lamo is a Colombian-American hazard analyst and hacker. He used espresso stores, libraries and net cafés as his places for hacking. Aside from being the homeless hacker, Lamo is extensively-known for breaking into a chain of highly-profile device networks, which consist of the new york times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he brought his name to the The new york times’ internal database of professional resources and utilized LexisNexis account to conduct studies on excessive-profile skills.

For his intrusion of the new york times, Lamo was ordered to pay about$65,000 in damages and was sentenced to 6 months home arrest at his parents’ house, with a further 2 years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. navy government because the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is currently working as a hazard analyst and donates his time and abilities to a Sacramento-based totally nonprofit enterprise.

#4. George Hotz
Black hat hacker- George HotzGeorge Francis Hotz, alias geohot, or virtually mil, is an American hacker recognized for unlocking the iPhone, permitting the smartphone for use with different wi-fi providers, opposite to AT&T and Apple’s rationale. Moreover, he evolved the limera1n jailbreak device, which used his limera1n bootrom exploit.

In June, 2007, Hotz become the primary person to do a successful unlock in an iPhone. Consistent with Hotz’s weblog, he traded his second unlocked eight GB iPhone to Terry Daidone, the founding father of Certicell, for a Nissan 350Z and three 8 GB iPhones. Hotz stated that he wants to offer the iPhones to the alternative individuals of the crew who created the hack with him. His name will always be related to the April 2011 playstation breach. Being very first hackers ever to jailbreak the Sony playstation 3, Hotz determined himself in the midst of a completely relentless, public and messy court docket war with Sony – perhaps worsened through Hotz’s public release of his jail breaking techniques. In a stated retaliation to Sony’s gap of the unspoken regulations of jail breaking – never prosecute – the hacker institution anonymous attacked Sony in what would be the dubbed as the most expensive safety spoil of all time to date.

At the end of April 2011, Hackers broke into the playstation  community and stole private data of a few seventy seven million customers. but, Hotz denied any obligation for the assault, and said “running homebrew and exploring safety on your devices is cool; hacking into someone else’s server and stealing databases of consumer data isn't always cool.”


#5. Kevin Mitnick

Black hat hacker- Kevin MitnickA self-proclaimed “hacker poster boy,” Mitnick went via a highly publicized pursuit by government. His mischief turned into hyped through the media however his real offenses may be much less terrific than his notoriety shows. The branch of Justice describes him as “the most desired computer crook in united states history.” His exploits were unique in 2 movies: Freedom Downtime and Takedown.


Mitnick won unauthorized access to his first computer network in 1979, at sixteen, while a friend gave him the telephone number for the Ark, the computer system digital equipment corporation (DEC) used for making their RSTS/E operating system software program. He broke into DEC’s computer network and copied their software program, a criminal offense he was charged with and convicted of in 1988. According to the U.S. department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cell telephones to hide his area location and, among different things, copied precious proprietary software program from wide range of the country’s largest cellular cellphone and computer agencies. Mitnick additionally intercepted and stole computer passwords, altered computer networks.

#6. Michael Calce
Black hat hacker- Michael CalceA high school pupil from West Island, Michael Demon Calce excellent called “MafiaBoy”. He launched a sequence of widely known denial-of-service assaults towards huge industrial web sites, such as Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! while it was nevertheless the net’s leading search engine and brought on it to shutdown for approximately an hour. Like many hackers, Calce exploited web sites basically for delight and setting up dominance for himself and his cybergroup, TNT. In 2001, the Montreal youngsters court sentenced Calce to 8 months of open custody, 12 months of probation, constrained use of the net, and a minimum pleasant.



#7. Robert Tappan Morris

Black hat hacker- Robert Tappan MorrisRobert Tappan Morris is an American computer system scientist, well known for developing the Morris bug in 1988. That was considered the first system bug at the internet. Additionally he was the primary individual convicted beneath the computer Fraud and Abuse Act.


Morris created the computer virus whilst he was a graduate pupil at Cornell College. He launched the malicious program from MIT to hide the reality that it simply originated from Cornell. The trojan horse took down one-10th of the internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down. Due in part to the want for social popularity that appears to be commonplace amongst many young hackers, Morris made the fault of chatting about his bug for months earlier than its release at the internet. Morris claimed it was only a stunt, and added that he genuinely regretted inflicting $15 million worth of harm: the expected quantity of carnage his worm left behind.


Morris was one of the first to be tried and convicted under the computer Fraud and Abuse Act . In December, 1990, was sentenced to 3 years of probation, four hundred hours of network service, a fine of $10,050, and the costs of his supervision.


#8. Kevin Poulsen

Black hat hacker- Kevin PoulsenThe infamous' 80s black hat hacker, Kevin Poulson (additionally known as dark Dante) is known for his hack of LA Radio KIIS-FM telephone lines.

 Law enforcement referred to as them "Honeyball Lecture of computer Crime". After hacking into the Federal research database, officers began pursuing Poulson. At some point of this endeavor, he carried ahead the issues of FBI through hacking into federal computer systems for wiretap records. But, their hacking revolves across the cellphone, especially. Poulson's maximum well-known hack, KIIS-FM, was to hack the telephone lines of all stations. In a related success, Poulson "additionally activated the old yellow pages escort phone numbers for a known person, who then used to run a virtual escort company." Later, while his image shows came on "Unsolved Mysteries", then this system had crashed 1-800 phone lines. Ultimately, Poulson was caught within the grocery store and sentenced to 5 years, which was the longest sentence given for hacking at the time. But, he has labored as a journalist and is now a senior editor for wired news. His maximum outstanding article gives info of his work on figuring out 744 intercourse offenders with MySpace profiles.

#9. Albert Gonzalez
black hat hacker- Albert GonzalezAlbert Gonzalez is a pc hacker and computer crook on which the mastermind of joint credit card robbery has been accused of re-saling more than one hundred seventy million cards and ATM numbers from 2005 to 2007 - i.e. the largest fraud in history. Gonzalez's crew used sq. Injection strategies to create malware backdoors on many company systems to launch packet-snifting assaults (specially, ARP spoofing), to assist them steal system records from inner company networks . After they had been arrested, the government seized $ 1.6 million in money in a plastic bag stored in 3 million drums, which include $ 1.1 million, which become buried inside the outdoor to their parents. On March 25, 2010, Gonzalez was sentenced to twenty years in federal jail.



#10. Vladimir Levin
black hat hacker- Vladimir LevinVladimir Levin is a Russian-born Jewish person famed for his involvement in the attempt to fraudulently switch US$10.7 million through Citibank’s computer systems. But, his profession as a hacker was simplest brief lived, with a capture, imprisonment and healing of all however $400,000 of the authentic $10 million. For the duration of Levin’s 1997 trial in the united states of America, he became said to have coordinated the primary ever net bank raid. The fact is Levin’s capacity to switch Citibank customer finances to his own debts was viable via stolen account numbers and PINs. Levin’s scam was an easy interception of customers’ calls even as recording the punched in account numbers.


#11. Jeanson Ancheta

black hat hacker- Jeanson AnchetaThis hacker became the first individual to be accused of controlling a military of hijacked computer systems – known as “botnets” – to send huge quantities of junk mail on the internet. In 2004, he used the virus “rxbot” to govern 500,000 computer systems and even sold their services to anybody who might take down massive web sites. Ancheta was arrested in 2005 whilst an FBI agent pretended to be inquisitive about their services. The hacker returned approximately $60,000 earned in raids and served 60 months in jail.




#12. ASTRA

Hacker and mask picThe hacker called ASTRA has in no way been recognized, at least publicly. He was a mathematician, arrested in 2008. Government in Greece says that he hacked into the aviation company Dassault systems for almost 5 years. During this era, he stole confidential data from army aircraft and sold the data to 250 human beings in distinctive nations. ASTRA might have prompted a loss of 360 million dollars to Dassault.




#13. Owen Walker

Black hat hacker-Owen WalkerIn 2008, Owen Walker admitted to being responsible of six cyber crime charges. He led a community of hackers who broke into 1.3 million computer systems and stole 20 million contemporary accounts. Robberies have commenced while Walker was 17 years old. In overall, he earned $32,000, considering that best writing the code in order that other individuals of team can thieve the cash. He presently specializes in safety era agencies.






#14. Matthew Bevan and Richard Pryce

Black hat hackers- Matthew Bevan and Richard PryceThese British duo broke into Pentagon systems in 1994, copying and military exercise confidential messages and accessed nuclear power plant in South Korea. Price (pictured) was 16 and Bevan, 21. Both were arrested on the following year.



#15. Syrian Electronic Army


Syrian Electronic Army signThe Syrian digital military came in 2011 to help the regime of President Bashar al-Assad on web sites and social networks. Although no longer sophisticated, the organization attacked some of massive companies and masses of web sites in recent months, the usage of junk mail, malware, phishing and denial of service assaults.


#16. Lizard Squad

Black hat hacker- Lizard squadFamous among game enthusiasts, the Lizard Squad down the nets playstation   and Xbox in Christmas 2014. The organization became also within the back of attacks on networks of League of Legends and destiny. The DoS assault utilized in the ones attacks is bought on the enterprise’s internet web page as a provider. The Lizard Squad is also known to take responsibility for assaults on non-existent Tinder, fb and Insta.  People had been arrested for allegedly being a part of the organization: Vinnie Omari, a British 22, and “Ryan”, 17.


#17. Anonymous

An obscure team were shown in 2003 in 4chan (4chan is a basic picture based release board where anybody can post remarks and offer pictures), And this group was sorted out by Web Trawler until the point that 2008, Since this group assaulted the website of Chapel of Scientology, he called this obscure gathering as a "hacktivist".


#18. Chad Davis

Black hat hacker- Chad davisChad Davis was an American programmer from Green Bay. He was engaged with the most needed rundown of "digital hoodlums" in the second half of the twentieth century. He was likewise part of the programmers club named GlobalHeil. The best accomplishment of the programmer aggregate was to pulverize the landing page of the White House site. Chad Davis once went to the U.S. A message sent to the military's landing page "GlobalHail won't pass on." He was recognized and captured. He was detained for a half year in jail, and his utilization of computer system was restricted.
Read More

Recent Posts

Rate us