Sunday, 31 July 2016

Here are 20 really tough questions that Google asks during Job Interview

Posted by Sufyan Hacker  |  at  02:04:00


 

Can you answer these 20 difficult questions asked in Google interviews?

Getting a job in Google is a dream come true for millions of engineers. Google has been ranked by job-community website, Glassdoor as ‘best workplaces’ year after year. Many job aspirants aspire to get a job in Google but getting one seems to be the toughest assignment according to Glassdoor.
We already know that Google takes on board only the best talent available in the world over and therefore it is well known for asking difficult and tricky interview questions. If you are an engineer and want to try your luck at Google, this post is for you. Here we’ve compiled a list of some of the most difficult questions asked during job interviews at Google for a variety of job profiles.
Remember only a handful of job candidates actually made it according to Glassdoor. Even if you are not trying to get into Google, it would be good to take up the challenge of solving these really tough questions.
  1. Question for a Software Engineer : Implement a binary tree and explain it’s function.

  2. Question for an Associate Product Manager : What is the marginal cost of a gigabyte in Gmail?

  3. Question for a Software Engineer : Create a cost model that allows Google to make purchasing decisions on to compare the cost of purchasing more RAM memory for their servers vs. buying more disk space.

  4. Question for a Software Engineer : Write an iterator over multiple collections.

  5. Question for a Software Engineer : How do you check if a URL is bad really fast in Google server. (The point is for the user not to notice the lag in the checking)

  6. Question for a Senior Software Engineer : Develop a solution to convex hull and state its complexity.

  7. Question for a Senior Software Engineer : How many golf balls can fit in a school bus?

  8. Question for an Engineer : If you were given the land prices in the Bay Area, what would you pick, the mean or the median? Why?

  9. Question for a Product Manager : What happens from the point when you type in a URL in your browser to the point the page gets displayed?

  10. Question for a Product Manager : If you host a celebrity website which displays ads and suddenly notice a drop in traffic to your site/clicks on ads, how do you root cause the issue?

  11. Question for an AdSense Account Manager : What is the next billion dollar idea for Google?

  12. Question for a Programmer : How would you implement an MS Paint clone? (What objects and methods would you need, how would they draw on the canvas, and what UI elements would be necessary?)

  13. Question for a Patent Docketing Specialist : You have 7 balls. One weighs more than the others (not significantly) (You have a scale, like the scales of justice. Describe how to find the weighted ball only using the scale twice.)

  14. Question for a Product Manager :  If you have a vacant field and add one flower and the number of flowers doubles every day and at the end of 45 days, the field is full, on what day is the field half full?

  15. Question for a Rich Media Campaign Manager : How many people do you think are using their cell phone in the entire world at this very moment?

  16. Question for Mobile Product Manager : Do you know what “Peak Oil” is? Yes? good. You are the product manager of Peak Oil for Google. What do you do?

  17. Question for a Software Engineer : Design a system or algorithm to catalog all of the worlds books?

  18. Question for AdWords Representative : How many buses are there in Hyderabad?

  19. Question for Senior Software Engineer : Write a probability formula to tell how many bits will be changed when 1 is added to a 32 bit binary number.

  20. Question for Industry Leader : How do you think Media Agencies make money?

They are really tough!

0 comments:

Top 10 Best Free Antivirus Software of 2016 | Hacking Tips And Tricks

Posted by Sufyan Hacker  |  at  01:53:00

BEST ANTIVIRUS SOFTWARE Hacking Tips and Tricks is back with its annual rendition- the list of the best free antivirus of 2016. Consider this your one-stop shop to help cast aside all your insecurities, tackle vulnerabilities, subdue any cyber threats, make your system secure and much more.
Fashion tips and Twitter trends fade away with time but the one thing that most certainly never fails to pique our interest are the headlines: “Hacked..Millions of Accounts Compromised..Personal Details Leaked Online”.I read this quote somewhere which went along the lines of – “It is not weapons of mass destruction or terrorists that keep me up at night, it is the threat of Cyber Attacks”. And rightly so, I mean once you hear the news such as ‘Mark Zuckerberg’s Twitter & Pinterest accounts getting hacked‘ or about the ‘Hacker is selling an exploit that makes all versions of Windows OS hackable’, cybersecurity is bound to jump to the top of your ‘List of Things to be Concerned About’.
Now, even though apps such as ‘Hacked‘ are being developed to avoid having your system compromised, but nothing beats the good old antivirus. Now I am sure, at the mention of the word antivirus, the first few names that would pop up in your mind would be the paid antivirus software such as Norton, Kaspersky or perhaps McAfee. But why pay for something when you could get it for free?
The word ‘free’ has a pretty nice ring to it, doesn’t it? Well, we at fossBytes have yet again compiled a list of the best free antivirus of 2016, replete with the full details of antivirus software which would even give their paid counterparts a tough run for their money. The list holds some surprises in the form of new entrants and some shuffling as compared to last year. Without any further ado lets tell you more about them:

Best Free Antivirus Software Of 2016 for Computer Virus Protection:

10. Zone Alarm Free Antivirus 

ZoneAlarm-Best-Free-Antivirus
Platform: Windows XP or higher
The Zone Alarm Antivirus is the new sheriff in town, replacing FortiClient on our list of best free antivirus this time around. For those people who value system performance and prefer a minimalistic approach to system security rather than a full-fledged security suite, Zone Alarm is the go to free antivirus.
With antivirus protection licensed by security giant Kaspersky, Zone Alarm boasts of a built-in and highly efficient firewall along with features such as kernel level virus prevention, automatic updates and a web security and privacy toolbar. It is pretty effective in detecting threats and moreover it can also detect wireless networks and automatically apply the most secure firewall settings on its own in addition to providing real-time security updates. Although, we feel that it lacks out on some important features such as phishing protection and is somewhat not as effective against zero-day threats as you would want your antivirus to be.

9. AdAware Free Antivirus 

AdAware-Best-Free-Antivirus
Platform: Windows XP or higher
Lavasoft’s AdAware antivirus has been in the game for some time. As the name suggests, the antivirus started off as an anti-adware program but with time, it has been developed into a complete security suite. With its latest update, the AdAware has observed much-needed improvements in detection technology and User Interface. It offers smooth installation, non-intrusive notifications along with detailed custom scanning. Several new features feature prominently in the antivirus such as Sandbox emulation, scheduler and command line scanner.
Even though AdAware is a pretty reliable free antivirus but we feel that a major drawback associated with it is the lack of features that are readily available in its paid-for siblings. As a result, you stand to miss out on various important features such as anti-phishing email protection, parental controls, and file destruction. Thus, AdAware retains its 9th position in out list of best free antivirus software of 2016.

8. Qihoo 360 Total Security 

Qihoo360TotalSecurity-Best-Free-Antivirus
Platform: Windows XP or higher (Windows 10); Mac OS X 10.7 or later including OS X Yosemite; Android 2.2 and Up
The China-based company Qihoo 360’s Total Security Antivirus is one of the most versatile antivirus present out there. Not only does it boast of four virus detection engines (namely Avira, BitDefender, 360 Cloud Scan Engine and the 360 QVMII AI Engine) but also packs in system tuneup and cleanup features along with a host of other useful tools. What we really like about the Qihoo 360 is its pleasant UI, which is very easy to use and even comes with a lot of themes. It is light on system resources, pretty quick and even provides sandbox and USB protection modules along with Glasswire Firewall and Windows Patch-up components.
However, such a wealth of features sometimes overshadows the main purpose of the antivirus, and as a result, it lacks out on the security front. Even though it scored well in hands-on tests and in tests by other independent labs, we feel the Potentially Unwanted Program (PUP) detection can still be improved further with more focus on core antivirus protection rather than other services.

7. Windows Defender & Microsoft Security Essentials 

WindowsDefender-Best-Free-Antivirus
Platform: Windows XP or higher
One of the surprise entrants on our list of the best free antivirus software is the Windows Defender antivirus. Mostly Microsoft’s antivirus has been criticized for sub-substandard performance and virus protection. But, with the latest version, things sure seemed to have turned around for good. Microsoft has invested massively in system protection and it has definitely reaped some good results for them.
Apart from integrating with Windows very effectively, it provides on-access/resident protection from viruses, spyware and other malware as well. It also excels in the area of false positives and is known to have produced not even a single warning for a false threat in tests conducted by various independent labs. Even though it is a vast improvement over the 2015 version, there is still a lot of scope for improvement in terms of system performance and virus protection.

6. Comodo Antivirus 

Comodo-Best-Free-Antivirus
Platform: Windows XP or higher (Windows 10); Mac OS X 10.4 or above; Android 2.2 and Up
Being in a class of its own, no other Antivirus merits its place in the list of the best free antivirus more than the Comodo Antivirus. Although if you are the one to feel intimidated by the various complexities and technicalities of an antivirus, then the Comodo Antivirus is not for you. The antivirus is often known to prompt the user for input and as a result is not that suitable for newbies. But once you work your way around that, the Comodo Antivirus is one of the most reliable antivirus to have on your system.
Provided with Comodo’s proprietary Defense+ Technology, the antivirus employs a no-nonsense approach and treats all unknown files as a threat. It provides On-Access/Resident Protection, cloud-based protection, and an automatic sandboxing function. The Host Intrusion Protection System has also been improved by leaps and bounds as compared to its previous versions. Although it offers too many extra add-ons such as Chromodo Browser, Yahoo search engine, custom DNS, and Geek Buddy during default install and requires too many tweaks in order to offer better protection, Comodo still needs to automate more of its security features.

5. Avast Free Antivirus 

Avast-Best-Free-Antivirus
Platform: Windows XP or above; Almost all Mac OSX versions
One of the most renowned antivirus software out there, Avast needs no reckoning at all. The latest 2016 version of Avast has witnessed a massive overhaul in the appearance. The abstract art in the main window and a minimalistic approach to the icons and reports is very pleasing to the eye. But, do not mistake Avast 2016 to be all about beauty because from the inside, it still remains a beast of an antivirus.
Loaded with a well-implemented password manager, network scanner, and top notch detection capabilities, it sure packs a punch. It features a heuristics engine of its own along with deep screen technology including Sandbox and a plethora of secondary components, that make it even more versatile than any contemporary antivirus out there. But, the various popups and advertisements being displayed in the free version can be pretty irksome at times. An anti-ransomware module and a few tweaks in the Malware signatures and HIPS module would do Avast a whole lot of good in terms of protection.

4. Panda Free Antivirus 

Panda-Best-Free-Antivirus
Platform: Windows XP or above; Android 2.3 or up
A list of the best free antivirus can’t be termed complete until the name of the Panda Antivirus has been mentioned in it. Like Avast 2016, Panda Antivirus has been revamped in terms of its appearance and the modern design featuring tiles looks quite subtle.
Most free antivirus software lack some advanced features and keep pestering you to upgrade to their paid counterparts, but we got to say that the Panda Antivirus is pretty well equipped in this domain and provides a host of optional features that other antivirus software fail to provide. Another state of the art feature provided by the Panda Antivirus is its cloud-based scanner which removes the load from your CPU and places the burden on the Panda servers, thereby making it really light and efficient. The only not-so-positive side of the antivirus is that it is internet connection-dependant, leading to weaker offline security.

3. AVG Free Antivirus 

AVG-Best-Free-Antivirus
Platform: Windows XP or higher; Mac OS X Mountain Lion or Later; Android 2.2 or above
One of the most critically acclaimed and highly appreciated antivirus software is the AVG Free Antivirus. The 2016 version of the AVG Antivirus comes with Zen applications that allow you to monitor the status of all the device running the software. One of the best features of AVG Antivirus is the smart scan technology which it uses to effectively reduce scanning times. Features like link scanning, remote protection, integrated File Shredder and Wi-Fi Guard present a strong case for AVG being your go to free antivirus.
AVG’s popularity has taken a hit in the past few days, with it being in the headlines for its privacy policy which clearly stated that AVG is entitled to share some personal and non-personal data of users with third parties. Although other software also do to the same, but when it comes to delicate matters such as computer security it is best to take some caution in such matters.

2. BitDefender Antivirus

BitDefender-Best-Free-Antivirus
Platform: Windows XP or up; Android 2.3 or up
One of the most unobtrusive antivirus software out there, the BitDefender Free Antivirus is capable enough to give the paid antivirus software a tough run for their money. BitDefender is very discreet in its operation and in addition to being lightweight, it is also free of the hassling advertisement and popups. What’s more is that despite being lightweight, it still provides for a Real-time Shield, Active Virus Control, Intrusion Detection, Rootkit scanning, HTTP scanning along with a plethora of other features such as Profiles, online banking protection and even a parental control system.
We would highly recommend BitDefender for those people who don’t want to meddle much with the antivirus and prefer to let it do its job quietly in the background. However, users who prefer to fiddle with the settings of their antivirus and wish for complete control over it, may find BitDefender a tad bit disappointing because of the lack of customization operations on offer.

1. Avira Free Antivirus

Avira-Best-Free-Antivirus
Platform: Windows XP or above; Mac OSX 10.9 (Mavericks) or higher; Android 2.2 or up;
Editor’s Recommendation: *Drumrolls*, the antivirus which occupies the top spot on our list of the best free antivirus of 2016 is the Avira Free Antivirus. Avira Antivirus is in a league of its own and takes antivirus protection to a completely new level. Be it the casual unconcerned user or the control freak who likes to tweak various settings of their antivirus software, Avira fits the bill perfectly for all.
The latest version of the antivirus has undergone some major improvements and now boasts of exceptional detection and blocking rates. It has even achieved 100% malware detection in tests conducted by various independent labs. Its refined cloud detection technology also makes it stand out from other antivirus software when it comes to the detection of zero-day threats. Seamlessly fast scans and a small footprint makes it ideal even for older systems. An optional browser extension in addition to a launcher for user convenience also adds a feather to its cap.
Such a diversity of features has resulted in a community of users which keeps expanding by the hour. With so much to its credited, Avira Free Antivirus is hands down the best free antivirus of 2016.

Do you feel some other free antivirus should have made it to the list of top 10 best free antivirus software of 2016? Give us your suggestions below and help others to get the best computer virus protection.

0 comments:

Why Surfing Porn on Android Smartphones Is Not Safe?

Posted by Sufyan Hacker  |  at  01:49:00

 Why Surfing Porn on Android Smartphones Is Not Safe?

Here is why you should not surf porn on your Android smartphones and tablets

Last week we had covered how surfing porn in Incognito mode on all browsers is not that safe. Today we look to another facet of our modern day life, surfing porn on Android smartphones. Since many people still don’t own a PC/laptop it becomes easy to surf porn on your Android smartphones in private. It also helps that smartphones being small can immediately be hidden in case someone jumps on you during your porn watching session.
However, it is worth nothing that surfing porn on Android smartphones is not at all safe. Why?

Here are a few reasons why you should not watch porn on Android smartphones.

The biggest reason for staying away from porn on your Android smartphones is security.  According to research, almost one-quarter of malware on mobile devices comes from porn websites. In other words, watching mobile porn on your Android smartphone is a much higher risk than watching it on your PC. Reason? Smartphone operating systems, especially Android, are not as secure as a PC, there are many vulnerabilities that are unknown, and exploited by cybercrime.
Another security problem is Porn tickers. Porn tickers are an irritating age-old problem with Android smartphones. These come as a fake version of a legit Android app. Like if you watch porn on an Android mobile and then head on to the Play Store to download popular games, porn tickers will disguise themselves in the form of Temple Run, Hay Day, etc. So, if someone taps on it without going through the credentials, they are basically downloading a Trojan.
Another important thing to note about the difference between PC and Android smartphones is that on a PC everything is opened in a different container which is independent of each other. Whereas, Android ecosystem is so much integrated that if you surf on your Chrome browser on your Android smartphone searching for Nike shoes, chances are that your MX Player will start showing Nike ads when you pause between a movie.
The reason for this is that Android smartphones operate in an entirely different format compared to PC/laptops. Another risky aspect of watching porn on Android smartphones is that except for big websites like Pornhub and Xvideos, most other websites use your Android/custom media player to play porn movies. You may have noticed that when you click to play a porn movie, it asks for permission to leave the porn website leaving your porn surfing habits open to scrutiny.
The system of private containers doesn’t exist on Android smartphones except on Samsung Galaxy series smartphones which have a service called Knox. This service, unique to Samsung opens everything in a private container if the smartphone wishes. Hopefully, going ahead more phone manufacturers will bring Samsung Knox like features to their smartphones.
One of the biggest culprits of leaks is location services. Most Android smartphone owner have locations services enabled for a variety of reasons such as for Google Now or Facebook Messenger, sometimes unknown to them. Chances are that such services are enabled even during watching porn on your smartphone, thereby compromising your privacy.
The above are some of the reasons why it is not safe to watch porn on your Android smartphones. If you are a porn addict, it is much better to watch porn using Incognito Mode in your native browser/Chrome browser. Not that, watching porn in incognito mode is safe but it offers relatively more privacy than watching porn in an open browser.
Remember most of the things you do are reported back to Google servers in one form or the other. Follow this basic steps while watching porn.
  • Disable location services
  • Watch in incognito mode
  • Use Knox like features to watch porn
  • Surf only renowned services like Pornhub or Xvideos which have their own native players
  • Dont install files/visit sites which look dubios
  • Dont install apps from porn websites
  • Stay Safe ;)

0 comments:

Wednesday, 27 July 2016

How To Find Windows Product Key Using CMD, PowerShell, And Windows Registry 2017

Posted by Sufyan Hacker  |  at  01:46:00

product-key-recovery-in-windowsShort Bytes: If you are willing to reinstall your Windows operating system, it’s possible that you’ll be stuck at some point due to lost Windows key. However, using some simple methods that involve PowerShell, Command Prompt, and Windows Registry, you can easily find Windows product key. These methods are a lifesaver for every Windows user and they just need a couple of steps.
In my previous tutorial on Windows operating system, I told you how to legally download Windows 7, 8.1, and 10 ISO images if you need to reinstall your operating system, performing  a clean installation. Very often we misplace the original installation media that came with our brand-new computer. In those times, such methods are very useful.While reinstalling your Windows operating system, you might also face the trouble of misplacing your Windows product key. Let me tell you, sometimes it could turn out to be a really frustrating affair.
I, personally, find it hard to understand why Microsoft makes the process to find Windows key so difficult. It could only be explained with the assumption that Microsoft doesn’t want you to use Windows keys from older computers.
After you install Windows operating system on your computer and activate it, Microsoft stores it in Windows Registry–something that’s impossible for humans to read. Nowadays, Microsoft has also stopped putting Certificate of Authority stickers on machines, which showed Windows keys.

How to find Windows product key by just ‘looking around’?

If you are familiar with a Windows product key, you might be knowing that it’s a 25-character alphanumeric code that’s used to activate Windows operating system. It looks something like this:
PRODUCT KEY: XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
Sometimes, your Windows key could be just located or printed in plain sight. Here are few ways to find Windows key by just looking around:

1. Windows key on sticker/label:

When you buy a new PC, it comes pre-activated. It’s possible that you don’t need to open your command prompt or play with Windows Registry. Your Windows key could be there right in front of you on a Certificate of Authority (COA) sticker on your computer, or included in the original packaging. If you bought the PC from an authorized Microsoft retailer, you need to find Windows key on a label inside the PC box.laptop product activation key
The COA sticker on your computer verifies the authenticity of your Windows computer. It could also be found under the battery if it’s removable. If you own a desktop PC, you’ll spot the COA sticker on the side of the desktop case.

2. Windows key in an email from Microsoft:

Just in case you bought your Windows copy from Microsoft’s website, you can find your Windows product key in an email from Microsoft guys. The company sends a confirmation mail after you complete the purchase.

3. Windows key in PC’s UEFI firmware:

These days, OEMs ship computers using a new Windows activation method. Instead of providing a physical Windows key, they store in your computer’s UEFI firmware or BIOS. So, if you know which version of Windows you are running, you can reinstall the same version and it’ll activate automatically–without the need to enter a key.
Similarly, if you wish to upgrade your legal and activated Windows 7 or 8.1 computer, you don’t need a key. Microsoft will activate your Windows copy on its own (before July 29, 2016) and you’ll receive a digital entitlement for Windows instead of a key.

How to find Windows product key using — Windows Registry method

To go ahead with this method, you need to boot your Windows computer without. Now, using a simple VBcript–some of you might have seen it on Microsoft forums–you can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.
So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the “All Files” option in “Save as type”.
After saving this file, just click on it and a new popup window will show your Windows product key. You can copy or note this down somewhere to use it later.windows key recovery registry method

How to recover Windows product key using Command Prompt?

This method to recover Windows product key is very simple. All you need to do is fire up a Windows Command Prompt window with administrative purposes. To do this, search for cmd in Windows search bar and right-click to choose the elevated permissions option.
Now, type the following command in Command Prompt and hit Enter:
wmic path softwarelicensingservice get OA3xOriginalProductKey
This step will promptly show your Windows key. Note that this method also works for OEC and Retail licenses.windows key cmd recovery method

How to find Windows License key using PowerShell?

To get back Windows serial key using Windows PowerShell, you need to open a new PowerShell with administrative permissions. Now, type the following commands and press Enter:
powershell “(Get-WmiObject -query ‘select * from SoftwareLicensingService’).OA3xOriginalProductKey”
This method will now promptly show you your Windows 10, 8.1, or 7 product key.
If these methods don’t solve your problem, you need to contact Microsoft Support or your OEM for Windows activation. You can also use some third-party software to recover your license key. If you’ve got the Windows key, but you need a Windows installation media, feel free to visit our ‘legal’ Windows download guide.
Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.

0 comments:

Why Is Bluetooth Called Bluetooth?

Posted by Sufyan Hacker  |  at  01:44:00

0 comments:

Monday, 25 July 2016

This Is How To Watch 3D Movies On PC Using VLC Media Player

Posted by Sufyan Hacker  |  at  02:31:00

How to watch 3D movies on  your PC/laptop using VLC Media Player

When it comes to selecting a media player for your PC and laptop, majority of the people would definitely choose VLC media player over any of the other media players available. The reason being, VLC media player can play almost all the media file formats and it is indeed a proven fact.
VLC is certainly a popular video player, thanks to its ease of use and its adaptability. It is an open source program that runs some of the most common video formats, including .flv, the typical format you’ll find on Vimeo and YouTube. You can even use it with some simple modifications to play movies in 3D.
However, the only problem is that it supports Red and Cyan 3D viewing option only. So, all you need to do is just get a 3D SBS (Side-By-Side) movie and watch it using your VLC media player. For those who need to watch 3D SBS movies on their PC, here’s how you can do so.

Steps To Watch 3D Movies on Your PC/Laptop Using VLC Media Player:

1. Run VLC Media Player and play the 3D SBS movie in it. Make sure that the movie you will be playing is a SBS (Side-By-Side) 3D movie.
2. Click on Tools and select Effects and Filters.
How to Watch 3D Movies on PC Using VLC Media Player
3. Now, a dialog box will appear like shown below, there click on Video Effects tab.
How to Watch 3D Movies on PC Using VLC Media Player
4. Then, select the Advanced tab.
How to Watch 3D Movies on PC Using VLC Media Player
5. Enable the Anaglyph 3D option and close the Effects and Filter windows (This effect enables the 3D effects of your VLC media player).
How to Watch 3D Movies on PC Using VLC Media Player
6. Voila, you are done and the video will now appear in anaglyph 3D. Now, put on your Red/Cyan glasses and enjoy the movie in 3D. Be sure to enjoy the movie with popcorn and cocacola!

0 comments:

How To Make Google Chrome Faster For Web Browsing 2016

Posted by Sufyan Hacker  |  at  01:41:00

make-google-chrome-faster-browsingShort Bytes: Sometimes, slow web browsing could be a real headache and it’s irritating for most of us. If your data connection is fast enough, this could be a result of your sluggish web browser. To solve this issue, we are here with some useful tips and tricks to make your Google Chrome faster and thus boosting up your browser’s performance. 
Google Chrome is undisputedly the best and one of the most popular web browser available in the market. According to different surveys, about 25-28 percent people browse the web using Google Chrome. Talking about the speed, benchmark tests put Chrome at the top without any hesitation. To improve the web browsing experience and making it faster, Google has introduced many features like better security measures and new protocols.Even though Chrome is the fastest web browser available, it’s often bashed for eating up your RAM and slowing down your PC. To make Google Chrome faster than ever, we’re here with some simple tweaks and tricks. After performing these steps, you are bound to experience increased speed in Google Chrome.
For everyday use, Chrome works just fine. But if you are a power user, you can try out few experimental options of Chrome. These tweaks use your PC muscle to make Google Chrome faster improve the performance.
Let’s take a look at them one by one:

Method 1: Using flags setting to make Google Chrome faster:

Your Google Chrome browser has a hidden browser feature known as “flags” that can be used for testing purposes and improving the performance of Google Chrome.
These features are experimental and they may change, disappear or break anytime. So, as soon as you proceed with this method and open the flags in your Google Chrome browser to make it faster, Google shows the following message as a warning:
These experimental features may change, break, or disappear at any time. We make absolutely no guarantees about what may happen if you turn one of these experiments on, and your browser may even spontaneously combust. Jokes aside, your browser may delete all your data, or your security and privacy could be compromised in unexpected ways. Any experiments you enable will be enabled for all users of this browser. Please proceed with caution.
However, the steps we are going to mention ahead, are not much to be worried about and you can hack your Google Chrome browser to increase its speed and overall performance. If you notice any glitches, you can always revert back the changes with the same simple steps mentioned ahead.
Take a look at these steps to change the “flags” settings in Google Chrome to make it faster than ever: (Click to enlarge the images)
1. Type chrome://flags/ in the search bar of Google Chrome to open the flags page. Here you can see tons of things to change and create a havoc in Google Chrome. But, proceed carefully and don’t change any setting on your own.
chrome-flags-to-make chrome-faster
2. Search for Maximum tiles for interest area and set it to 512. This step actually increases the RAM that Chrome is allowed to use and thus makes your Google Chrome a lot faster.
It’ll be easier to locate the items in flags if you perform the search using Ctrl+F in Windows and Cmd+F in Mac as the items in flags are not much organized.
maximum-tiles-to-make chrome-faster
3. Search for Number of Raster threads and set it to 4. This small modification increase rendering speed of images in Chrome and improves the Google Chrome performance.
number-of-raster-threads-to-make chrome-faster
4. Search SPDY/4 and set it to Enable (Update: You might not find this option, as Google changes its protocol from SPDY to http/2)This will speed up page loading by making web transactions faster to speed up Google Chrome.
Enable-SPDY-to-make chrome-faster
5. Find Enable fast tab/window close and set it to Enable. Enable this change if you want to close any window or tab faster.
Enable-fast-tab-to-make chrome-faster
6. To make Google Chrome faster on touch screens computer, search for Touch Events and Enable it. This will increase your Google Chrome speed drastically.
touch-events
7. You can also give a little boost to your browsing speed by enabling Experimental canvas features. Search for it and click enable button present at the bottom.enable-experimental-canvas-feature
After completing the following steps, now press the Relaunch Now button which you can find at the bottom of the page. This will implement all the changes that you did in order to make Google Chrome faster for browsing.    relaunch

Method 2: Google’s prerendering suggestion to make web pages load faster

In a blog post, Google explains the method of prerendering the links that can make your Google Chrome faster. Actually, while browsing, Chrome predicts the links you might click and it prepares them to load instantly for you.
For example: If you are on a web page and there’s a read more or next page link, Google Chrome intuitively prerenders the web page and serves it instantly as you click on it. Also, by enabling this option for increasing the Google Chrome speed, you browser predicts the web pages you might enter in the address bar and shows them as you hit enter. Chrome does this by looking at your browsing habits.
Here’s the way to turn on these network action predictions:
On you PC:
1. Click on the hamburger Chrome menu symbol located at the top right corner of your Chrome browser to open the settings.
2.Go to Settings and then click on Show advanced settings.
3. Now in the privacy section check Prefetch resources to load pages more quickly.
On your Android device:
1. Tap on the Chrome menu and open Settings.
2. Under Advanced, find Privacy and open it.
3. Now look for the option Prefetch page resources.
4. You’ll be greeted with following options, choose the desired one to make your Google Chrome faster:
  • Always: Chrome will always preload webpages even when you’re using mobile data. This way, you may end up using a large chunk of mobile data.
  • Only on Wi-Fi: Chrome will only preload webpages on Wi-Fi network. This is the default option.
  • Never: If you are using a very limited data plan, select this to stop Google Chrome from preloading the web pages.

Method 3: Using speed up extensions to make Google Chrome faster

While writing about making Mozilla firefox faster for web browsing, I already mentioned that I personally don’t like lots of extensions installed in my browser. This is so because sometimes, these extensions are also a hindrance in speeding up the speed of your browser. But, there are few useful extensions that can help you to speed up your Google Chrome.
1. The Great Suspender: It’s my personal favorite extension and stops Chrome from killing your PC by eating tons of RAM. This extension suspends the unused tabs in Chrome, saves your PC juice and makes Google Chrome faster. Download it here
2. Better Browse: This extension makes web browsing on Google Chrome about 15% faster by using some simple tweaks already mention in this tutorial. Download it here

Method 4: Random methods to make Google Chrome faster

1.  Type chrome://plugins/ in URL box and disable the unnecessary plugins as they make your Google Chrome slower.
2. Type chrome://extensions/ in URL box and delete the extension that are unnecessary or not in use for long time.
3. Type chrome://settings/clearBrowserData and clear browsing history from beginning (Uncheck Cached images and files and other below options).
                       clear-cache-for-chrome-faster
That’s it! These were the best methods which will help you to increase your web browsing speed and make Google chrome faster than ever.
If you find this article helpful, share it with friends and if you are still having any problems, let us know in comments below.

0 comments:

Sunday, 24 July 2016

Ubuntu vs Linux Mint : Which Distro Should You Use?

Posted by Sufyan Hacker  |  at  03:00:00


Ubuntu and Linux Mint are both famous for being very friendly for beginners. Ubuntu is the most popular Linux distro and Linux Mint is based on Ubuntu. But there are some real differences between both of these. And how would you choose the one for you? today we will answer this Ubuntu vs Linux Mint question.

System Requirements

Linux Mint:
512MB Ram  with 1GB as recommended.
9GB of disk space with 20GB as recommended.
800 x 600 screen resolution with 1024 x 768 recommended.
Ubuntu:
512MB RAM with 2GB as recommended.
5GB of disk space with 25GB as recommended.
1024 x 768 screen resolution.

Interface

Most distros opt the standard Linux desktop interface as their default. But Both Linux Mint and Ubuntu developed their own.
Ubuntu makes use of the Unity interface. Unity Interface is a GNOME-based desktop environment that is common only to Ubuntu.  To say simply, Ubuntu looks a lot like Mac OS while Linux mint looks similar to Windows with it’s start menu kind of look.
Linux Mint 18 uses the Cinnamon 3.0. You can see an  overview of its features in the below video .


Both  Linux Mint and Ubuntu have their own user themes. Linux has Mint-Y, while  Ubuntu has Ambiance and Radiance , a new look based on the Moka  and Arc theme icons.

Performance

When you consider the overall performance, Linux Mint definitely has an edge over Ubuntu when it comes to speed. Ubuntu has  gotten faster over its previous versions, but Linux Mint was always pretty snappy. Even on an older and lower-powered hardware, Mint stays fast ( compared to Ubuntu). If you are installing Linux on your PC to speed it up, Mint offers you a better experience.

Conclusion

If you are someone who is installing Linux for just learning basics, Ubuntu is the one for you since it’s forum has answer to every question you ask. If you are a tech savy guy and want to dig deep into Linux but don’t know where to start, Linux Mint is your best choice. If you are installing Linux on your old PC to make it faster, Mint is again one of the best choices you have.
Share your opinion on the Ubuntu vs Linux Mint topic in the comment section below.

0 comments:

9 things about old mobile phones teenagers wont believe existed

Posted by Sufyan Hacker  |  at  02:53:00


http://adf.ly/1hW2Ex

9 things about pre-Android and pre-iPhone feature phones that nobody under 20 will believe

Mobile telephone has come a long way ever since the first mobile phone, DynaTAC was unveiled by Motorola. DynaTAC looked and felt like a brick, had a one line display and you could only make and receive calls. People who were born after the 1995s may not even have seen DynaTAC or that matter the next series of mobiles phones to hit the market.
Today we list the nine unbelievable things about pre-Android, pre-iOS feature phones which you wont believe existed.

1. Batteries went for weeks

Today if your smartphone battery lasts a whole day, you will count yourself lucky. Back in the days when Nokia and Motorola mobiles phones ruled the roost, the batteries of phones could go on and on. Nokia’s were particularly rugged and could carry on with a single charge for a weeks at end.

2. The best mobile game was Snake

There was a time when a game called Snake ruled mobile gaming. You would be surprised to know that people bought the mobile only if it had Snake aboard it. Snake was first released only for monochrome phones. Graphics consisted of black squares, and it had 4 directions. It was programmed in 1997 by Taneli Armanto, a design engineer in Nokia and introduced on the Nokia 6110.

3. Phones didn’t all look the same

Even if their configurations may differ widely, now, we have almost all smartphones looking the same. In those merry old days, you could get a mobile phone according to your choice, and believe me, the choice was wide.  before the introduction of the first iPhone in 2007,  phones came in a fantastic range of forms: magic springy things, foldy things, flippy things, things with aerials, things with keyboards.

4. The internet didn’t work

Back in those days of 1G or WAP, if you got through on Internet you would be considered the luckiest man/woman on Earth. It would take hours for a page to render on your itsy bitsy screen. We couldn’t load proper web pages, let alone music or video. And all of it was text based.

5. Nobody wanted a touchscreen

The earliest of the touchscreen phones were rejected by users because they lacked direction. You had to click a mile away to select a feature. Today’s capacitive multi-touch screens are fast and fluid, but pre-2007, any phone with a touchscreen had a resistive one that you had to poke a hundred times with a stylus, and you had to calibrate that or the screen would decide you’d tapped about two centimetres away from where you actually had.

6. Using Windows was considered futuristic

In the 2000s Windows powered phone was considered the ultimate test of technology. When the world’s first smartphone running on Windows Mobile, Orange SPV,  was released by HTC, websites, and media was agog with its news and features for weeks. However, like always, Google and Apple stole the march over Microsoft and Microsoft ended up being a fringe player in the smartphone market.

7. Users paid actual money to replace the operator logo

In those days everything came for a fee. You had to change ringtone, wallpaper or access your voicemails, you would be charged absurd amount by the service providers. Heck, even incoming calls were charged in those days.

8. Phones were unbreakable

Smartphones today need replacement even if they just slip out of your hands or your little one nips on the USB port. Back in those days mobiles were pretty indestructible with Nokia being one of the most rugged makers. You could even hit and hurt someone with a Nokia.

9. Nokia was Apple

Nokia was the king, queen and everything in those days. Nokia was Apple! Buying a Nokia mobile phone was considered the ultimate target of buyers when lots of other phones existed. In its hey days, 9 1⁄2 people out of 10 bought a Nokia. It was rugged, it was powerful, it could connect even from sewers and its battery lasted weeks. Nokia was a dream to own in those days.
Do you oldies remember your first phone and what it was like to use it comparing with today’s smartphones. Do write in the comments about your experience with your pre-Android and pre-iOS phones.
Resource : Android Pit.

0 comments:

KickassTorrents Comes Back, Again! This Time As KAT.am

Posted by Sufyan Hacker  |  at  00:49:00

kat is back as kat.amShort Bytes: KickassTorrents is back, again. This time, as KAT.am. It also contains the complete KAT database and the user account data. The hosting information is kept a secret behind the walls of Cloudflare.
From the past few days, we have been following the chase between the homeland security department and KAT family. And here is another iteration of KickAss Torrents that has popped up on the internet. KAT.am, with complete KAT database including the user account data, is live now, reports The Verge.The homeland security department seized KAT’s domains. They also managed to arrest KAT founder Artem Vaulin aka Tirm with Facebook and Apple’s help. But, the world’s most loved torrent website came back as Dxtorrent and kickass torrents.website, which is NOT a mirror backed by IsoHunt, as some reports suggested.
The whole scenario resembles what we see in Indian daily soaps where characters come back from the dead again and again. Jon Snow fans will also find this analogy relatable. KAT.am is the new domain rooting for KickassTorrents’ rebirth. The website is “hosted on different cloud servers to prevent blockade, and the hosting information is well hidden behind Cloudflare,” the creators of KAT.am said in an email to The Verge.
Pirate websites coming back from the dead is not a surprise to our ears. The Pirate Bay did so in the past. It’s now running buttery smooth with all of its glory and its original .org domain. No matter how many times the security agencies and the copyright holders will try to put a bar on the pirate realm, it looks like it will come again, and again. Just like it has done so far. 
              
Note: The KAT.am website was working at the time of writing this post.
If you have something to add, tell us in the comments below.

0 comments:

These Are The Programs Used By ISIS To Remain Anonymous On The Web

Posted by Sufyan Hacker  |  at  00:44:00

jihadist toolkit software used by isis


Short Bytes: Cybersecurity group Flashpoint has released a new report, outlining the technologies and software used by ISIS terrorists. These security-first programs are used by  jihadists to erase the tracks of their online activities and defeat surveillance. The software discussed in the report include the likes of TOR, Telegram, and VPN applications.
In the recent past, we have seen an increased use of technology by terrorists and criminals. With their enhanced technical knowledge and strategic use of social media, they are able to harm us in newer manners.The same applies to the brutal terrorists of the Islamic State. They use multiple modes of encrypted communications. They use these means to circulate terror manuals and tutorials to train the new jihadists and spread their propaganda.
According to Flashpoint, a cybersecurity group focused on the deep and dark web, the terrorists have become more sophisticated since 2012.
Flashpoint has released a new report, elucidating about 36 tools and technologies used by terrorists. These technologies have become imperative to these terror operators for remaining underground, escaping surveillance, and covering their tracks.
The report outlines that ISIS members make use of secure browsers like TOR and Opera to pay a visit to the web. As NSA is known to monitor TOR traffic, the jihadists use extra layers of security.
The software used and recommended by ISIS are:
  • Secure browsers like TOR and Opera Browser
  • CyberGhost VPN
  • Fake GPS software
  • Secure messaging apps like Telegram
  • Encrypted email services like Hushmail, Yopmail
  • Radio station apps
  • Locker — an app that deletes files on a mobile device after multiple incorrect unlocking attempts
Today’s terrorists are relentlessly adopting new technologies to conceal their online operations. Very often they are seen using open source tools as they are the best when it comes to online security.
Stressing upon the importance of more insights into the behaviour of terrorists, Flashpoint concludes the report:
“The more we understand about how jihadists leverage digital technologies to engage in nefarious activities, the better equipped we will be to defend ourselves and mitigate risk as effectively as possible.”
Did you find this article interesting? Don’t forget to drop your feedback in the comments section below.

0 comments:

How to upgrade your ordinary router with functionality of a high cost one with Tomato firmware

Posted by Sufyan Hacker  |  at  00:40:00

Here is how to upgrade your ordinary router with functionality of a high cost one

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.

What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and some hundreds of dollars.
There are hardware differences and… software differences.
Using a custom firmware (if supported by the router) can give you options/features available on much more expensive hardware.
Such a firmware is Tomato USB. Its an open source firmware for Broadcomm based routers.
The first step is to see if your router is supported by Tomato, so please check Shibby Tomato Builds. If it is, get the newest version and flash it on the administration interface.
Usually, there are some flavors: AIO (All in One) or VPN (few features, smaller size, perfect for most users).
If it cannot be flashed through Web interface (like Asus RT-N53), you must use the emergency procedure (see router documentation) to upload the custom firmware to the router.
After you install and set up all the usual settings on Tomato (WIFI, LAN etc.), you can go further, and with some work, you can install many programs, for example a webserver with PHP support or Transmission Torrent client (the router must have USB ports).
Different routers have different flash memory sizes. Inside the flash reside the firmware and settings. Depending on the flash size and firmware size (VPN or AIO), some unused space might still remain, so you can create a JFFS partition to install software. This is critical for routers without USB or if you do not want to use a USB drive. If you do want to use a USB drive, read here how to create a partition, and after you create it, continue this tutorial from Step 3.
Okay lets start.
Step 1: Create a JFFS partition.
Go to Administration – JFFS – Enable – Format Erase
In the text box paste:
mount -o bind /jffs /opt
Wait a few minutes, and if you do not get any message, reboot the router.
Step 2:
Go to Administration – Admin Access and modify the default port settings for router administration (ex: 8082).
This will allow you to access your router on specified port.
http://ip_router:8082
default: http://192.168.1.1:8082
Step 3:
3. Access the router on SSH using Putty (Windows) or Terminal (Mac).
On Mac, the command is:
ssh -l root IP
Username must be root and the password of the admin user.
Step 4:
Install Optware package manager by using the following code.
cd /tmp
wget http://tomatousb.org/local–files/tut:optware-installation/optware-install.sh -O – | tr -d ‘\r’ > /tmp/optware-install.sh
chmod 755 optware-install.sh
sh optware-install.sh
Note that it may take time depending on your internet speed and your router’s processing power.
Step 5:
Install nano (text editor), lighttpd (webserver), and PHP
ipkg install nano
ipkg install lighttpd
ipkg install php-fcgi
Step 6: Edit the lighttpd configuration file.
nano /opt/etc/lighttpd/lighttpd.conf
and add this:
server.event-handler =”poll”
Modify the default running port of the webserver (default is 8081).
server.port = 80
Save everything and close nano.
Step 7:
Restart the webserver.
/opt/etc/init.d/S80lighttpd restart
Now you can put files and scripts in /opt/share/www/
If you want your webserver to be accessible from WAN, you need to add those lines to the Firewall script (Administration – Scripts – Firewall):
iptables -t filter -A INPUT -p tcp –dport 80 -j ACCEPT
iptables -t filter -A INPUT -p tcp –dport 443 -j ACCEPT
Its done! now enjoy the features on your budget router. Do post your queries or suggestions in the comments.

0 comments:

Top 10 Free Wireless Network hacking/monitoring tools for ethical hackers and businesses in 2016

Posted by Sufyan Hacker  |  at  00:37:00


http://adf.ly/1gED0q


Ten Free Wireless Hacking Software

There are lots of free tools available online to get easy access to the WiFi networks intended to help the network admins and the programmers working on the WiFi systems and we at Team Techworm have picked the top 10 of those for ethical hackers, programmers and businessmen.
Internet is now a basic requirement be it office or home as it is majorly used in smartphones besides computer. Most of the times people prefer to use wireless network LAN which is much easier and cost effective.
It has been observed that the neighborhood WiFi hot-spots are visible on user’s device however one can get access to the same only by cracking password with the sole purpose of using free internet. Also in case of big firms where all the employees are connected through a wireless network admin might want to keep a check on the network traffic and hence even they need tools to crack the network.
Vulnerability in the wireless LAN is majorly due to poor configuration and poor encryption. Poor configuration includes the case of weak password mainly done purposefully by the network admin to check the network traffic. Poor encryption is dangerous as it is related to the 2 security protocols WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access) and WPA is again of 2 types WPA1 and WPA2, WPA was introduced in 2003 as WEP protocol was easy to crack. The tools used to hack the network is used either for the
  • purpose of sniffing the network : as is the case of network admins and
  • cracking the password: used by programmers to rectify the trouble shooting and by the people who want to use internet free of cost. It has been seen that based on this concept there are around 10 tools together which can be understood to hack wireless LAN.

Aircrack

Most popular wireless password cracking tool, it attacks 802.11a/b/g WEP and WPA. This tool manufacturers also provides tutorial for installation of the tool and its usage for cracking the password. Prior to using this tool it is essential to confirm that the wireless card can inject packets as this is basis of WEP attack. This can be downloaded from: http://adf.ly/1gED0q
2) Cain & Abel: This tool intercepts the network traffic and cracks the passwords forcibly using crypt-analysis attack methods. It also helps to recover the wireless network keys by analyzing routine protocols. Can be downloaded from : http://adf.ly/1hW2Y9

inSSIDer

This tool has been awarded “Best Opensource Software in Networking” and is a paid software available at a cost of $19.99. This is popular scanner for Microsoft Windows and OS X operating systems and can do a lot of tasks which can be helpful for the admins to sniff the network LAN. Can be downloaded from : http://adf.ly/1hW2XL

WireShark

This is network protocol analyzer. So again good for the network admins to keep a check on the traffic. Basic requirement is that the user should have a good knowledge of the network protocol only then they can use this tool. Can be downloaded from : http://adf.ly/1gECxJ

CoWPAtty

This tool is an automated dictionary attack tool for WPA-PSK. CoWPatty is simple to use however it is slow as tool uses the password dictionary for generating hack for each word contained in the dictionary by using the SSID. Can be downloaded from: http://adf.ly/1hW2Vd

Airjack

This is a Wi-Fi 802.11 packet injection tool. Mostly used to check for the “man-in-the-middle (MiTm) flaws” in the network and mitigate them. Can be downloaded from : http://adf.ly/1hW2V6

WepAttack

This is an open source Linux tool for breaking 802.11 WEP keys. While working with this tool a WLAN card is required and basically the tool attacks working key using the dictionary words. Can be downloaded from : http://adf.ly/1hW2Pl

OmniPeek

This is again network analyzer tool working only on Windows OS. This tools captures and analyzes the network traffic. The tool can be also used for trouble shooting. Can be downloaded from : http://adf.ly/1hW2Od

CommView for WiFi

This is for wireless monitoring and protocol analysis. Captured packets can be decoded by user-defined WEP or WPA keys.  This again is mainly used to monitor the WiFi traffic by the professional programmers, protocol admins and even at homes. Can be downloaded from : http://adf.ly/1hW2Sc

CloudCracker

This is online password cracking for WPA protected WiFi networks. It is used to crack the passwords by using a dictionary of around 300 million words. Can be downloaded from : http://adf.ly/1hW2Td
Most of these tools are free; some of them are for protocol analyzers to monitor the trouble shooting whereas others are for hacking the password for unauthorized internet access also there are tools which use the dictionary words to crack the password.
For the network admins and the professional programmers these tools should be more helpful for understanding the cracking of password and hence helping them professionally.
However, one needs to be cautious when using the tools as this might be an offense to use the tools to crack the passwords and get unauthorized access to the internet in some countries. Also such kind of tools are also used by cyber criminals and terrorists to get easy access for free usage of internet anonymous

0 comments:

Subscribe
Get our latest posts directly in your email inbox.Click on RSS

Google+ Badge

Followers

Copyright © 2016 Hacking Tips and Tricks Designed By Sufyan Hacker
back to top
' type='text/javascript'/>