Tuesday 20 December 2016

Why Is Google Trying To Murder HTTP Connection Used By Websites

Modern times have witnessed a more sophisticated way of stealing data and stalking a person on the internet. The HTTP connection used by many websites is enough to lure malevolent minds to fulfill their intentions. Google is determined to demote the adoption of HTTP connection by websites.

The reason behind this objective is that the HTTP connection is not secure. What does that mean? If a website uses an HTTP connection, the passwords and credit card details you type there are sent in plain text over the network making it possible for any middleman to read all of it. And it is not only about the credit card numbers, a website using an HTTP connection can be modified by a person before it reaches your computer.

Another matter of concern is that people don’t give a second thought while accessing a website that’s not secure. The security indicators placed in web browsers are left unnoticed. Hence, the situation becomes more alarming.

Google wants the websites to shift to the HTTPS connection which uses SSL/TLS encryption to send data. So, when you type your credit card numbers they are converted into random-looking characters before being sent over the network.

“Beginning in January 2017 (Chrome 56), we’ll mark HTTP sites that transmit passwords or credit cards as non-secure, as part of a long-term plan to mark all HTTP sites as non-secure,” writes Emily Schechter, Google Security Team.

Schechter notes that a significant number of websites have transitioned to HTTPS and the number is increasing. “We recently hit a milestone with more than half of Chrome desktop page loads now served over HTTPS,” she writes.

In the coming months, Google will extensively encourage the frequency of “not secure” warning label on HTTP web pages in Google Chrome. Initially, HTTP warnings would be displayed in incognito mode and for all the web pages after some time.

HTTPS has many advantages over the HTTP connection and it helps in protecting your confidential information. Google is not alone acting to boost the adoption of HTTPS. A few months ago, the website hosting platform WordPress turned on HTTPS for all of its websites for free. Check out how an HTTPS page loads faster than an HTTP page.

How To Download YouTube Videos Using VLC Media Player

VLC is one of the most popular media players around. This free and open source media player became popular a long time ago as it was one of the first ones that “played anything”. Its simple UI can disguise the new users who might consider it less advanced. Few people know that VLC media player packs a wide range of features.

In our previous article, we’ve already told you how to convert a media file to any different format using VLC. In this article, I’m going to tell you how to download videos from YouTube using your favorite VLC media player.

Steps to download YouTube videos using VLC?

The method to download YouTube videos using VLC media player is very simple. Here are the steps that you need to follow to complete this task:

The first step involves opening some YouTube video and copying its URL from your web browser’s address bar. Here, I opened the Fossbytes YouTube channel and looked for the how to make Chrome faster tutorial. After that, I simply copied the path of the video from the address bar.Now you need to open VLC media player on your computer. I’ve written this tutorial using Windows 10. So, the appearance and placement of different options might differ on your Mac or Linux PC.In VLC, find the Open Capture Device option and click on it. It should open a new window.Now click on the Network tab and paste the copied URL in the empty field that’s titled Please enter a network URL. Now click Play button.This should soon start playing the YouTube video in your VLC media player. You can use the media controls in VLC just like the YouTube controls and use them to play, pause, or stop the playback.Now, in Tools option, click on Codec informationIt’ll open the Current Media Information window that’ll show codec information. There’ll be a link under Location. It’s basically the download link and you need to copy it.Now you need to open your web browser and paste the copied download link in the address bar and hit Enter. This would either start the video playback in your web browser or directly show you the download dialog. Simply click on the Savebutton to grab the video.Here’s the downloaded video in all its glory:

Saturday 17 September 2016

How to Fix Windows 10 Slow Performance Issue and Increase Overall System Speed


windows-10-slow-performance-issue-fixShort Bytes: Many Windows users are facing Windows 10 slow performance issue in Windows 10. This appears in the form of input lags and could be fixed by tweaking some Page File settings in Windows 10. So, how to fix this slow performance issue in Windows 10 to boost system speed? Here is the answer.
After the official launch of Windows 10, millions of PC users upgraded their PCs to Windows 10 by availing the free upgrade offer from Microsoft. If you haven’t got the upgrade, here’s a simple way to get Windows 10 upgrade right now. However, several desktop users have reported Windows 10 slow performance issue on Microsoft forums and Reddit after upgrading their systems.
There are some definite issues with the Windows 10 OS as the number of people facing slow performance issue in Windows 10 is very large. This sluggish performance usually appears in the form of input lags. For example: After clicking the Start Menu, it takes about 2-3 seconds to appear or taking the same time to refresh your desktop, Complaining this Windows 10 slow performance issue, many users have downgraded to the previous versions of Windows OS.
According to a user at the Microsoft Community forums, Windows 10 slow performance issue could be fixed by tweaking the Page File settings in Windows 10 that affects and improves the overall system performance. If you’re facing the slow performance issue in Windows 10, you can try to speed up the OS by changing the default settings for Page File control.

How to Fix Windows 10 Slow Performance Issue and Boost your System Speed?

If you are irritated with slow performance issue in Windows 10, we advise you to follow this small guide to speed up your Windows 10 OS on you computer. You need to change the default settings for the Page File control in Windows 10 from System Managed to manual format. Here you can change the page file memory’s file and maximum size- based upon the RAM on your PC.

How to fix Windows 10 Slow performance:

  •  Open Start Menu and find the Control Panel. Click on it.
  • Here in the Control Panel, go to the Search field at the top-right of the window and type Performance. Now hit Enter.
  • Now find Adjust the appearance and performance of Windows.
  • Go to the Advanced tab and click on Change in the Virtual Memory section.
windows-10-slow-performance-issue
  • Now untick the option “Automatically manage paging file size for all drives.”
  • Select the default C: drive where Windows 10 is installed and then choose Custom Size. Then change Initial Size and Maximum Size to the recommended values by Windows (given below).
windows-10-slow-performance-issue-
  • Now click Set and then hit OK to save the settings.
  • Reboot the computer for the changes to take effect and fix the slow performance issue in Windows 10.
After your PC boots up, you should experience better Windows 10 performance. If you found this way to boost your Windows 10 system speed helpful – or you know any other method – feel free to mention it in the comments below.

Teardrop Attack: What Is It And How Does It Work?

WHAT IS A TEARDROP ATTACKTeardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then delivered to the target machine. Unable to rearrange the fragments, the victim keeps on accumulating the fragments until it crashes.
As the name suggests, the Teardrop Attack works gradually by sending the fragmented packets to a target machine. It’s a type of a denial-of-service (DoS) attack which overwhelms the target machine with the incomplete data so that the victim crashes down.
In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
In this way, the packets keep on getting accumulated over the victim’s machine and finally due to the buffer overflow, the target machine crashes down.

How Teardrop Attack works?

Here, I am taking a reference from the Juniper’s technical publication to illustrate how does it work —
Teardrop attack and IP header
As you can see in the above figure of IP header, which operates at the network layer, there is a field called fragment offset field.

Teardrop Attack and Fragment Offset:

Understand it like this — When a large amount of data is sent across the internet, the data is broken into the smaller fragments. Each of these fragments is assigned a number. When they reach the receiving end, these fragments are rearranged to reproduce the original data or message.
To identify the sequencing of the fragments, the fragment offset field holds the necessary information using which the target machine rearranges the sequence.
However, in the Teardrop Attack, the fragment offset field is made buggy by the hacker so the victim’s machine is unable to find the relative fragments.
So, as the name suggests, the buggy packets keep on accumulating at the victim’s side like teardrops and ultimately it leads to the machine crash.
However, modern networking devices can detect this discrepancy in a fragmented packet. Once they detect the problem, they simply drop the packet.

Saturday 30 July 2016

Top 5 IT Security Certifications To Enhance Your Career

While not having an IT security
certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-
leading credentials look at it as one
measure of qualifications and commitment to quality.

As the market for information security talent heats up and the skills shortage continues, infosec experts who have the right combination of credentials
and experience are in remarkably high demand.
“A certification today is like a college degree,” says Grady Summers, America’s leader for information security program
management services at Ernst & Young.“You may not hire a candidate just because they have one, but it is something that you come to expect in this field.”
“There is no replacement for real-world experience,” Summers says. “However, certifications are important and have become de facto minimum criteria when screening resumes.”

Here is a list of top five security certifications, which are based on
review of job boards and interviews with IT security recruiters and employers:

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) is gaining popularity as organizations concentrate on securing their IT infrastructure and networks from internal and external attacks. Some employers aggressively look
to hire candidates with CEH validation for hands-on security operations and intelligence activities.

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program offered by EC-Council, suitable for
candidates who want to acquaint
themselves with the latest security threats,advanced attack vectors, and practical real time demonstrations of the latest hacking techniques, tools, tricks, methodologies, and security measures.

The goal of the CEH is to certify security practitioners in the methodology of ethical hacking. This vendor-neutral certification
covers the standards and language involved in exploiting system vulnerabilities, weaknesses and countermeasures. Basically, CEH shows candidates how the attacks are committed. It also makes efforts to define the legal role of ethical hacking in enterprise organizations.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC) is the leading provider and developer of Cyber Security Certifications,globally recognized by government, military
and industry leaders. As a result, its demand is rising in specific disciplines such as security operations, digital forensics, incident handling, intrusion
detection, and application software
security.

This certification is designed for
candidates who want to demonstrate skills in IT systems roles with respect to security
tasks. Ideal candidates for this certification possess an understanding of information
security beyond simple terminology and concepts.

“GIAC’s focus on open source tools and its aggressive in-depth training is very useful,” says Daryl Pfeil, CEO of Digital Forensics Solutions, a computer security and digital
forensics firm. She finds GIAC certified candidates highly skilled and talented to handle the dynamic demands of the real-
world job environment. Similarly, employers and recruiters are
gradually finding the GIAC credential as a requirement for hands-on technical positions.

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) is significantly in demand as the profession concentrates on the business side of security. Offered by Information
Systems Audit and Control Association (ISACA), CISM addresses the connection
between business needs and IT security by concentrating on security organizational
issues and risk management.

This certification is for candidates who have an inclination towards organizational security and want to demonstrate the ability to create a relationship between an information security program and broader business goals and objectives.

Basically, CISM is perfect for IT security professionals looking to grow and build their career into mid-level and senior management positions. This certification ensures knowledge of information security, as well as development and management
of an information security program.

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information System
Security Certification Consortium, also known as (ISC)², the not-for-profit consortium that offers IT security certifications and training.
CISSP is viewed as the baseline standard for information security professions in government and industry. Companies have
started to require CISSP certification for their technical, mid-management and
senior management IT security positions.

This certification is designed for
candidates who are interested in the field of information security. The ideal candidates are those who are information assurance professionals and know how to
define the design, information system architecture, management and control that can guarantee the security of business environments.
The CISSP is widely popular within the IT security community, as it provides the basis of security knowledge. “We feel safe
hiring candidates carrying this validation,” says Ellis Belvins, division director at Robert Half International, a professional
staffing consultancy. The certification validates the security professionals’ high proficiency, principles and methodologies,
commitment and deeper understanding of security concepts.

Vendor Certifications

The increasing need for hands-on network engineers, along with social computing and web technology, has pushed network
security even further. Vendor certifications including Microsoft’s Certified Systems Engineer (MCSE) with focus on security,Cisco’s Certified Network Associate
Certification (CCNA), and Check Point’s Certified Security Expert (CCSE) top the list as organizations within government,
banking and healthcare that look to fill open positions including system administrators, network and architects.

Tuesday 12 July 2016

Become an Android Developer : Here is how you can create your first Android App

Follow this 7 step guide to create
your first Android App Android is no doubt a great platform for
users as well as developers.

Thanks to Android Studio and continuous support from Google. And in case you were thinking to begin creating Android apps but did not have much idea of the know-how, you can follow this article to get your doubts clarified.

Programming Language

Android apps are developed in Java. You do not need to be an expert, but you should be good in specific areas, e.g. you need to have good knowledge of AWT and Swing for developing a GUI for your app.
Getting easy with following topics before starting will make the development phase more enjoyable.
>> Event Handling.
>> Swing.
>> Constructors.
>> JDBC.
>> Classes, Objects and Methods.
>> Packages.
>> Abstraction.
>> Polymorphism.
>> Inheritance.
You’ll also need to learn basics
of the Extended Markup Language(XML).

Places to Learn From
You can Learn Basics of Java and Android Development from these websites.
1. TreeHouse
2. Tutorials Point
3. Udacity ( Android development for
beginners)
4.Youtube
5.EdX

Steps to get an app built

1. Ideation
First of all an idea is required to be worked on. You’ll need to have a clear view of what your app will be for and what it will do. A good idea will be to start small and gradually add sophistication. Don’t make it
so boring that you don’t want to make it but try to avoid any complex functions as far as possible. Ideally, the app will only require one ‘screen’ (activity) and will involve some simple interactions so that something happens when the user presses a button. Consider it a challenge to make something that’s genuinely useful with the minimum amount of code.

2. Choosing your IDE

The most common way to build Android apps is to use Android Studio and Java.
This is the official method recommended by Google and it will afford you a lot of flexibility while ensuring there’s plenty of support if things go wrong. This is also the
method you will need to know if you ever plan on becoming a professional developer.

There are numerous other options for your IDE and language too however. You may pick Unity and C++ for instance if you want
to make a game. Basic4Android is an IDE focused on rapid development that lets you code with BASIC rather than Java. There’s
even an IDE that runs on Android called AIDE.

3. Collecting Resources

Resources mean images and other
material you will use in your app. You can download numerous images and use them but be aware not to violate someone’s copyright.

4. Building the layout of your app in
IDE

Now you’re going to create your layout in Android Studio using the ‘designer’. This is a tool that lets you simply drag and drop the widgets (also called ‘views’) where you
want them on the page.

You’ll need to start a new project in Android Studio to do this but there will still be no coding necessary at this point (except maybe a little XML). To start a new project select File > New > New Project. Follow the steps
selecting a name for your project and for your activities and choose ‘Empty Activity’.

5. Writing the core code

Now comes the more challenging part – adding the code. You know the basics of Java and you have your widgets/views already in place.

Now you’re going to open the Java file for your main activity and
simply create some ‘onClick’ events to add code that will run only when users click a specific button or otherwise take a specificaction.

6. Implementing more complexity

By now though, you should have some of the basic functionality in place so that your app responds to button clicks (in one way or another) and perhaps stores some variables. Next is to add the more advanced
functionality that will be specific to your app. For example, you might want your app to play music when a button is clicked. Maybe you want to add some flashy animations. Or perhaps you need to know how to transition from one activity to the
other.

7. Final review and publishing

Now comes the last step. You’ll have to test your app for bugs and once everything is right you can get your app published on Google Play Store.