Wednesday 21 December 2016

How to Access Blocked Websites

Here are some ways to access your favourite  blocked website

1. Become Anonymous: Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience ‘unrestricted’. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from the ISPs and allows you to access blocked websites. To get a proxy website for any blocked site, just perform the Google search.

Eg: Facebook Proxy Server. In case, Facebook is blocked in your institution, or you can go to —

http://www.spysurfing.com/
https://www.hidemyass.com/
http://proxify.us/p/ and more…

2. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value that’s difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

Check out our how to set-up VPN on Android devices without the need of any software. You can also read our detailed article on what is VPN and how it works.

3. Use IP Rather Than URL

The blocked website sometimes are stored as a list of URLs and using IP of the website might work in few of the cases. To get the IP address for any website, you do a ping domain.com command in Command Prompt. Using IP is a simple way to access blocked websites in your region. However, if the website had hidden its IP too, then it won’t open with this method.

All you need to do is run CMD on your computer. Now type “ping www.websitename.com” and press Enter. This will promptly return the IP address. Now enter this IP address in your web browser’s address bar and hit Enter.

4. Change Network Proxy In Browsers

Your college or institute might be having more than one proxy for its network. So, it happens that some websites are restricted on one proxy, but accessible in another. So, you can give a try to proxy surfing to access blocked websites in your college.

Disabling the network proxy settings in our web browsers isn’t a tough task. You just need to find the connections/network option in the settings of your web browser. There, you can select the no proxy option or use another one that’s providing unrestricted browsing at your institution.

5. Use Google Translate

Institutes or even countries sometimes don’t ban Google Translate. So, you can bypass the restriction by converting the blocked website into some other language that you may know. Try Google Translate and see for yourself. It is yet another simple way to access blocked websites.

You can also use Microsoft’s Bing translation service to unblock a banned website.

6. Bypass via Extensions

If the websites that are blocked by your institute or office are dynamic in nature such as Facebook or YouTube, then you should give a try to these extensions. Hola and ProxMate are some extensions that you can use to access blocked websites.

7. URL recasting

There are instances when a particular website is hosted in VPN and it doesn’t have a verified SSL installed. For such websites, you can simply go to the address bar of your web browser and try typing https://www.url.com, instead of accessing www.url.com or http://www.url.com. This change might display a security notice. Press on the Proceed Anyway option and visit the website.

8. Replace your DNS Server

We’ve already discussed this method under a separate topic named DNS Hack. You can simply use this method and bypass the blockade. This method generally involves using Google DNS or OpenDNS for accessing the internet.Here are the detailed steps on the same.

9. Go to Internet Archive — Wayback Machine

Wayback Machine is an interesting service that stores a copy of most of all website on the internet. It saves multiple versions of a website and you can use it to access the past versions of a website. The users can also use it to browse the blocked content online.

10. Use RSS Feed

RSS readers are useful for getting the fresh content and reading them with ease. You can grab the RSS feed of the blocked website and add it to your reader. Just in case that website doesn’t have an RSS feed, there are some useful online services to create the feed.

These are some of the most effective and easy to use methods to circumvent the censorship that has been put on your favorite websites. 

Tuesday 20 December 2016

Why Is Google Trying To Murder HTTP Connection Used By Websites

Modern times have witnessed a more sophisticated way of stealing data and stalking a person on the internet. The HTTP connection used by many websites is enough to lure malevolent minds to fulfill their intentions. Google is determined to demote the adoption of HTTP connection by websites.

The reason behind this objective is that the HTTP connection is not secure. What does that mean? If a website uses an HTTP connection, the passwords and credit card details you type there are sent in plain text over the network making it possible for any middleman to read all of it. And it is not only about the credit card numbers, a website using an HTTP connection can be modified by a person before it reaches your computer.

Another matter of concern is that people don’t give a second thought while accessing a website that’s not secure. The security indicators placed in web browsers are left unnoticed. Hence, the situation becomes more alarming.

Google wants the websites to shift to the HTTPS connection which uses SSL/TLS encryption to send data. So, when you type your credit card numbers they are converted into random-looking characters before being sent over the network.

“Beginning in January 2017 (Chrome 56), we’ll mark HTTP sites that transmit passwords or credit cards as non-secure, as part of a long-term plan to mark all HTTP sites as non-secure,” writes Emily Schechter, Google Security Team.

Schechter notes that a significant number of websites have transitioned to HTTPS and the number is increasing. “We recently hit a milestone with more than half of Chrome desktop page loads now served over HTTPS,” she writes.

In the coming months, Google will extensively encourage the frequency of “not secure” warning label on HTTP web pages in Google Chrome. Initially, HTTP warnings would be displayed in incognito mode and for all the web pages after some time.

HTTPS has many advantages over the HTTP connection and it helps in protecting your confidential information. Google is not alone acting to boost the adoption of HTTPS. A few months ago, the website hosting platform WordPress turned on HTTPS for all of its websites for free. Check out how an HTTPS page loads faster than an HTTP page.

How To Download YouTube Videos Using VLC Media Player

VLC is one of the most popular media players around. This free and open source media player became popular a long time ago as it was one of the first ones that “played anything”. Its simple UI can disguise the new users who might consider it less advanced. Few people know that VLC media player packs a wide range of features.

In our previous article, we’ve already told you how to convert a media file to any different format using VLC. In this article, I’m going to tell you how to download videos from YouTube using your favorite VLC media player.

Steps to download YouTube videos using VLC?

The method to download YouTube videos using VLC media player is very simple. Here are the steps that you need to follow to complete this task:

The first step involves opening some YouTube video and copying its URL from your web browser’s address bar. Here, I opened the Fossbytes YouTube channel and looked for the how to make Chrome faster tutorial. After that, I simply copied the path of the video from the address bar.Now you need to open VLC media player on your computer. I’ve written this tutorial using Windows 10. So, the appearance and placement of different options might differ on your Mac or Linux PC.In VLC, find the Open Capture Device option and click on it. It should open a new window.Now click on the Network tab and paste the copied URL in the empty field that’s titled Please enter a network URL. Now click Play button.This should soon start playing the YouTube video in your VLC media player. You can use the media controls in VLC just like the YouTube controls and use them to play, pause, or stop the playback.Now, in Tools option, click on Codec informationIt’ll open the Current Media Information window that’ll show codec information. There’ll be a link under Location. It’s basically the download link and you need to copy it.Now you need to open your web browser and paste the copied download link in the address bar and hit Enter. This would either start the video playback in your web browser or directly show you the download dialog. Simply click on the Savebutton to grab the video.Here’s the downloaded video in all its glory:

Saturday 17 September 2016

How to Fix Windows 10 Slow Performance Issue and Increase Overall System Speed


windows-10-slow-performance-issue-fixShort Bytes: Many Windows users are facing Windows 10 slow performance issue in Windows 10. This appears in the form of input lags and could be fixed by tweaking some Page File settings in Windows 10. So, how to fix this slow performance issue in Windows 10 to boost system speed? Here is the answer.
After the official launch of Windows 10, millions of PC users upgraded their PCs to Windows 10 by availing the free upgrade offer from Microsoft. If you haven’t got the upgrade, here’s a simple way to get Windows 10 upgrade right now. However, several desktop users have reported Windows 10 slow performance issue on Microsoft forums and Reddit after upgrading their systems.
There are some definite issues with the Windows 10 OS as the number of people facing slow performance issue in Windows 10 is very large. This sluggish performance usually appears in the form of input lags. For example: After clicking the Start Menu, it takes about 2-3 seconds to appear or taking the same time to refresh your desktop, Complaining this Windows 10 slow performance issue, many users have downgraded to the previous versions of Windows OS.
According to a user at the Microsoft Community forums, Windows 10 slow performance issue could be fixed by tweaking the Page File settings in Windows 10 that affects and improves the overall system performance. If you’re facing the slow performance issue in Windows 10, you can try to speed up the OS by changing the default settings for Page File control.

How to Fix Windows 10 Slow Performance Issue and Boost your System Speed?

If you are irritated with slow performance issue in Windows 10, we advise you to follow this small guide to speed up your Windows 10 OS on you computer. You need to change the default settings for the Page File control in Windows 10 from System Managed to manual format. Here you can change the page file memory’s file and maximum size- based upon the RAM on your PC.

How to fix Windows 10 Slow performance:

  •  Open Start Menu and find the Control Panel. Click on it.
  • Here in the Control Panel, go to the Search field at the top-right of the window and type Performance. Now hit Enter.
  • Now find Adjust the appearance and performance of Windows.
  • Go to the Advanced tab and click on Change in the Virtual Memory section.
windows-10-slow-performance-issue
  • Now untick the option “Automatically manage paging file size for all drives.”
  • Select the default C: drive where Windows 10 is installed and then choose Custom Size. Then change Initial Size and Maximum Size to the recommended values by Windows (given below).
windows-10-slow-performance-issue-
  • Now click Set and then hit OK to save the settings.
  • Reboot the computer for the changes to take effect and fix the slow performance issue in Windows 10.
After your PC boots up, you should experience better Windows 10 performance. If you found this way to boost your Windows 10 system speed helpful – or you know any other method – feel free to mention it in the comments below.

Teardrop Attack: What Is It And How Does It Work?

WHAT IS A TEARDROP ATTACKTeardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then delivered to the target machine. Unable to rearrange the fragments, the victim keeps on accumulating the fragments until it crashes.
As the name suggests, the Teardrop Attack works gradually by sending the fragmented packets to a target machine. It’s a type of a denial-of-service (DoS) attack which overwhelms the target machine with the incomplete data so that the victim crashes down.
In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
In this way, the packets keep on getting accumulated over the victim’s machine and finally due to the buffer overflow, the target machine crashes down.

How Teardrop Attack works?

Here, I am taking a reference from the Juniper’s technical publication to illustrate how does it work —
Teardrop attack and IP header
As you can see in the above figure of IP header, which operates at the network layer, there is a field called fragment offset field.

Teardrop Attack and Fragment Offset:

Understand it like this — When a large amount of data is sent across the internet, the data is broken into the smaller fragments. Each of these fragments is assigned a number. When they reach the receiving end, these fragments are rearranged to reproduce the original data or message.
To identify the sequencing of the fragments, the fragment offset field holds the necessary information using which the target machine rearranges the sequence.
However, in the Teardrop Attack, the fragment offset field is made buggy by the hacker so the victim’s machine is unable to find the relative fragments.
So, as the name suggests, the buggy packets keep on accumulating at the victim’s side like teardrops and ultimately it leads to the machine crash.
However, modern networking devices can detect this discrepancy in a fragmented packet. Once they detect the problem, they simply drop the packet.

Saturday 30 July 2016

Top 5 IT Security Certifications To Enhance Your Career

While not having an IT security
certification doesn’t disqualify you from getting a job offer or promotion, but prospective employers looking for industry-
leading credentials look at it as one
measure of qualifications and commitment to quality.

As the market for information security talent heats up and the skills shortage continues, infosec experts who have the right combination of credentials
and experience are in remarkably high demand.
“A certification today is like a college degree,” says Grady Summers, America’s leader for information security program
management services at Ernst & Young.“You may not hire a candidate just because they have one, but it is something that you come to expect in this field.”
“There is no replacement for real-world experience,” Summers says. “However, certifications are important and have become de facto minimum criteria when screening resumes.”

Here is a list of top five security certifications, which are based on
review of job boards and interviews with IT security recruiters and employers:

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) is gaining popularity as organizations concentrate on securing their IT infrastructure and networks from internal and external attacks. Some employers aggressively look
to hire candidates with CEH validation for hands-on security operations and intelligence activities.

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program offered by EC-Council, suitable for
candidates who want to acquaint
themselves with the latest security threats,advanced attack vectors, and practical real time demonstrations of the latest hacking techniques, tools, tricks, methodologies, and security measures.

The goal of the CEH is to certify security practitioners in the methodology of ethical hacking. This vendor-neutral certification
covers the standards and language involved in exploiting system vulnerabilities, weaknesses and countermeasures. Basically, CEH shows candidates how the attacks are committed. It also makes efforts to define the legal role of ethical hacking in enterprise organizations.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC) is the leading provider and developer of Cyber Security Certifications,globally recognized by government, military
and industry leaders. As a result, its demand is rising in specific disciplines such as security operations, digital forensics, incident handling, intrusion
detection, and application software
security.

This certification is designed for
candidates who want to demonstrate skills in IT systems roles with respect to security
tasks. Ideal candidates for this certification possess an understanding of information
security beyond simple terminology and concepts.

“GIAC’s focus on open source tools and its aggressive in-depth training is very useful,” says Daryl Pfeil, CEO of Digital Forensics Solutions, a computer security and digital
forensics firm. She finds GIAC certified candidates highly skilled and talented to handle the dynamic demands of the real-
world job environment. Similarly, employers and recruiters are
gradually finding the GIAC credential as a requirement for hands-on technical positions.

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) is significantly in demand as the profession concentrates on the business side of security. Offered by Information
Systems Audit and Control Association (ISACA), CISM addresses the connection
between business needs and IT security by concentrating on security organizational
issues and risk management.

This certification is for candidates who have an inclination towards organizational security and want to demonstrate the ability to create a relationship between an information security program and broader business goals and objectives.

Basically, CISM is perfect for IT security professionals looking to grow and build their career into mid-level and senior management positions. This certification ensures knowledge of information security, as well as development and management
of an information security program.

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information System
Security Certification Consortium, also known as (ISC)², the not-for-profit consortium that offers IT security certifications and training.
CISSP is viewed as the baseline standard for information security professions in government and industry. Companies have
started to require CISSP certification for their technical, mid-management and
senior management IT security positions.

This certification is designed for
candidates who are interested in the field of information security. The ideal candidates are those who are information assurance professionals and know how to
define the design, information system architecture, management and control that can guarantee the security of business environments.
The CISSP is widely popular within the IT security community, as it provides the basis of security knowledge. “We feel safe
hiring candidates carrying this validation,” says Ellis Belvins, division director at Robert Half International, a professional
staffing consultancy. The certification validates the security professionals’ high proficiency, principles and methodologies,
commitment and deeper understanding of security concepts.

Vendor Certifications

The increasing need for hands-on network engineers, along with social computing and web technology, has pushed network
security even further. Vendor certifications including Microsoft’s Certified Systems Engineer (MCSE) with focus on security,Cisco’s Certified Network Associate
Certification (CCNA), and Check Point’s Certified Security Expert (CCSE) top the list as organizations within government,
banking and healthcare that look to fill open positions including system administrators, network and architects.