Tuesday 11 November 2014

A Comprehensive List of MOOC (Massive Open Online Courses) Providers

The recent emergence of Massive Open Online Courses , commonly known as MOOCs, is revolutionizing the online education world and
is having a profound impact on higher education. With the growing adoption of MOOCs, the number of MOOC providers has also increased many folds. Below is a
comprehensive and up-to-date list of MOOC providers; might be helpful to all interested.
Peace and cheers.
List of MOOC Providers
1. EdX
–A Not-for-profit enterprise with MIT
and Harvard universities as founding partners.
2. Coursera
–A social entrepreneurship
company founded by computer science professors Andrew Ng and Daphne Koller from Stanford University.
3. NovoEd
– Rebranded version of Stanford’s
Venture Lab, with a special focus on
students collaboration and real-world course projects.
4. Udacity
– Udacity was an outgrowth of a
Stanford University experiment in which Sebastian Thrun and Peter Norvig offered their ‘Introduction to Artificial Intelligence’
course online for free in which over
160,000 students in more than 190
countries enrolled.
5. Futurelearn
- The first UK-led multi-institutional platform, partnering with 17
UK universities, offering MOOC to students around the world. It is a private company owned by the Open University.
6. OpenUpEd
- First Pan-European MOOC
initiative, with support of the European commission. It includes partners from 11
countries.
7. iversity
– A company with a diverse
interdisciplinary team from Berlin presently offering MOOC production fellowship and
collaboration network for academia.
8. Open2Study
– An initiative of Open
Universities Australia which itself is a leading provider online education through collaboration of several Australian universities.
9. Canvas
– An open, online course network
that connects students, teachers &
institutions
10. 10gen Education
- an online learning
platform run by 10gen (the MongoDB company)
11. OpenLearning
12. Class2Go – UWA
13. Class2Go
– Stanford Now in maintenance
mode. Will be merged with edX platform.
14. MRUniversity
– Focusing on economics
courses, founded by two GMU professors
15. Academic Earth
16. P2PU -
Peer to Peer University is a non-
profit online community based learning platform, founded with funding from the
Hewlett Foundation and the Shuttleworth Foundation.
17. Udemy
– An online learning platform that
allows anyone to host their video courses.
18. Caltech’s ‘Learning From Data’ Course
19. OpenHPI
- The educational Internet platform
of the German Hasso Plattner Institute, Potsdam, focusing on courses in Information and Communications Technology (ICT).
20. UoPeople
– University of the People
(UoPeople) is a tution-free, non-profit,online academic institution offering undergraduate programs in Business Administration and Computer Science.
21. Saylor
- a non-profit organization that
provides over 280 free, self-paced courses.
22. World Education University – WEU
23. CourseSites MOOCs
24. Open Learning Initiative – CMU
25. Unimooc
26. iDESWEB
27. WideWorldEd
– First Canadian MOOC provider
28. Eliademy
29. MOOC on
30. Alison
31. Khan Academy
- Finally, it’s included in the
list!
32. Schoo
– Japan’s MOOC provider. Presently,
offering more than 130 courses
33. Veduca – From Brazil
34. Acamica
35. Poynter’s News University
36. @ral
38. Aquent
39. Kennesaw State University’s
MOOC Kennesaw State University will offer “K-12 Blended and Online Learning MOOC “, its first, beginning January 2014
40. Pedagogy First Offers program for onlineteaching certificate
41. Think CERCA Chicago based company helps develop critical thinking and writing skills for a
better K-12 education
42. Modern Lessons Helps teachers to become
tech savvy and more engaged
43. Santa Fe Institute
Santa Fe Institute is
offering a series of MOOCs covering the field of complex systems science ranging from
beginner to expert levels, courtesy Complexity Explorer Project.

Massive Open Online Learning (moocs)

The moocs are now taking over our education system.students around the world have now moved to easier mode of learning where flexibility and content is just out of this world.
Some of the courses available in moocs come from the best universities in the world such as MIT,Harvard,Stanford etc.
Some the classes available in moocs are:
-Edx
-Futurelearn
-Iversity
-Class central
-udemy
-Khan academy
-Canvas.net n many more

Take this opportunity and learn a course your dream and earn certificates.classes have flexibility and some courses are self-paced

Wednesday 5 November 2014

INTERNET ERROR CODES !!

Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not
supported/DNS Lookup Fail/
unknw host
Error 500-599 - Server errorsNTERNET ERROR
CODES !!
Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not
supported/DNS Lookup Fail/
unknw host
Error 500-599 - Server error

Tuesday 4 November 2014

How to prevent SQL injections

Use prepared statements and parameterized
queries. These are SQL statements that are sent
to and parsed by the database server separately
from any parameters. This way it is impossible
for an attacker to inject malicious SQL.
You basically have two options to achieve this:
Using PDO:
$stmt = $pdo->prepare('SELECT * FROM
employees WHERE name = :name');
$stmt->execute(array('name' => $name));
foreach ($stmt as $row) {
// do something with $row
}
Using MySQLi:
$stmt = $dbConnection->prepare('SELECT *
FROM employees WHERE name = ?');
$stmt->bind_param('s', $name);
$stmt->execute();
$result = $stmt->get_result();
while ($row = $result->fetch_assoc()) {
// do something with $row
}
PDO
Note that when using PDO to access a MySQL
database real prepared statements are not used
by default. To fix this you have to disable the
emulation of prepared statements. An example
of creating a connection using PDO is:
$dbConnection = new PDO('mysql:dbna
me=dbtest;host=127.0.0.1;charset=utf8', 'user',
'pass');
$dbConnection->setAttribute(PD
O::ATTR_EMULATE_PREPARES, false);
$dbConnection->setAttribute(PD
O::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);
In the above example the error mode isn't
strictly necessary, but it is advised to add it.
This way the script will not stop with a Fatal
Error when something goes wrong. And it gives
the developer the chance to catch any error(s)
which are thrown as PDOExceptions.
What is mandatory however is the first
setAttribute() line, which tells PDO to disable
emulated prepared statements and use real
prepared statements. This makes sure the
statement and the values aren't parsed by PHP
before sending it to the MySQL server (giving a
possible attacker no chance to inject malicious
SQL).
Although you can set the charset in the options
of the constructor, it's important to note that
'older' versions of PHP (< 5.3.6) silently ignored
the charset parameter in the DSN.
Explanation
What happens is that the SQL statement you
pass to prepare is parsed and compiled by the
database server. By specifying parameters
(either a ? or a named parameter like :name in
the example above) you tell the database engine
where you want to filter on. Then when you call
execute, the prepared statement is combined
with the parameter values you specify.
The important thing here is that the parameter
values are combined with the compiled
statement, not an SQL string. SQL injection
works by tricking the script into including
malicious strings when it creates SQL to send to
the database. So by sending the actual SQL
separately from the parameters, you limit the
risk of ending up with something you didn't
intend. Any parameters you send when using a
prepared statement will just be treated as
strings (although the database engine may do
some optimization so parameters may end up as
numbers too, of course). In the example above,
if the $name variable contains 'Sarah'; DELETE
FROM employees the result would simply be a
search for the string "'Sarah'; DELETE FROM
employees", and you will not end up with an
empty table.
Another benefit with using prepared statements
is that if you execute the same statement many
times in the same session it will only be parsed
and compiled once, giving you some speed
gains.
Oh, and since you asked about how to do it for
an insert, here's an example (using PDO):
$preparedStatement = $db->prepare('INSERT
INTO table (column) VALUES (:column)');
$preparedStatement->execute(array('column' =>
$unsafeValue));
127.0.0.1
127.0.0.1

Trusting VPN providers

When chooising VPN the one thing u need to
know is that u can trust your VPN provider and
that they Dont keep logs of your data we at
cyberlovesecurity have booked a meeting with
an VPN provider to talk about security i. I will
give u all an example : some VPN providers have
keeped logs of their users data and a big VPN
provider ( https://www.hidemyass.com )
They keept data on a lulzsec member and gave
that data to the cops long story short this
person is in jail now. So u need to pick one
good thats why we are setting up this meeting
to talk about cheap and secure VPN with a
company and se IF we can get something going

Tuesday 23 September 2014

4 Secrets Wireless Hackers Don't Want You to Know!

You're using a wireless access point that has
encryption so you're safe, right? Wrong!
Hackers want you to believe that you are
protected so you will remain vulnerable to
their attacks. Here are 4 things that wireless
hackers hope you won't find out, otherwise
they might not be able to break into your
network and/or COMPUTER:
1. WEP encryption is useless for protecting
your wireless network. WEP is easily cracked
within minutes and only provides users with
a false sense of security.
Even a mediocre hacker can defeat Wired
Equivalent Privacy (WEP)-based security in a
matter of minutes, making it essentially
useless as a protection mechanism. Many
people set their wireless routers up years ago
and have never bothered to change their
wireless encryption from WEP to the newer
and stronger WPA2 security. Updating your
router to WPA2 is a fairly simple process.
Visit your wireless router MANUFACTURER'S
website for instructions.
2. Using your wireless router's MAC filter to
prevent unauthorized devices from joining
your network is ineffective and easily
defeated.
Every piece of IP-based hardware, whether
it's a computer, game system, PRINTER, etc,
has a unique hard-coded MAC address in its
network interface. Many routers will allow
you to permit or deny network access based
on a device's MAC address. The wireless
router inspects the MAC address of the
network device requesting access and
compares it your list of permitted or denied
MACs. This sounds like a great security
mechanism but the problem is that hackers
can "spoof" or forge a fake MAC address that
matches an approved one. All they need to
do is use a wireless packet capture
PROGRAM to sniff (eavesdrop) on the
wireless traffic and see which MAC addresses
are traversing the network. They can then set
their MAC address to match one of that is
allowed and join the network.
3. Disabling your wireless router's remote
ADMINISTRATIONfeature can be a very
effective measure to prevent a hacker from
taking over your wireless network.
Many wireless routers have a setting that
allows you to administer the router via a
wireless connection. This means that you can
access all of the routers security settings and
other features without having to be on a
COMPUTER that is plugged into the router
using an Ethernet CABLE. While this is
convenient for being able to administer the
router remotely, it also provides another
point of entry for the hacker to get to your
security settings and change them to
something a little more hacker friendly.
Many people never change the factory
default admin passwords to their wireless
router which makes things even easier for
the hacker. I recommend turning the "allow
admin via wireless" feature off so only
someone with a physical connection to the
network can attempt to administer the
wireless router settings.
4. If you use public hotspots you are an easy
target for man-in-the-middle and session
hijacking attacks.
Hackers can use tools like Firesheep and
AirJack to perform "man-in-the-middle"
attacks where they insert themselves into the
wireless conversation between sender and
receiver. Once they have successfully
inserted themselves into the line of
communications, they can harvest your
ACCOUNT passwords, read your e-mail, view
your IMs, etc. They can even use tools such
as SSL Strip to obtain passwords for secure
websites that you visit. I recommend using a
commercial VPN service provider to protect
all of your traffic when you are using wi-fi
networks. Costs range from $7 and up per
month. A secure VPN provides an additional
layer of security that is extremely difficult to
defeat. Unless the hacker is extremely
determined they will most likely move on and
try an easier targe