Posts

Showing posts from January, 2017

Top 10 Worst Passwords Of 2016 You Should Never Keep, Else You’re A Dumbo

Image
The year 2016 was rough regarding data security and the thing that enhances the frustration of the advocates of cyber security is the pathetic choice of passwords people have on the internet. Keeper Security has released the list of the most popular (worst) passwords used in 2016. It is highly recommended to set a password that is strong and can’t be guessed easily. A password is used to protect people’s devices and online accounts from unauthorized access. But some people just don’t get it and make sure that their password is the dumbest of all. Seriously, it’s 2017 now. Your internet life is as important as your real one unless you’re some wannabe cave dweller hiding somewhere in the forests of Amazon. Keeper Security has  released  the list of the most common passwords for 2016, but I would like to call them the ‘worst passwords’ and people should avoid using passwords which are guessable. THE AWARD FOR THE MOST POPULAR PASSWORD FOR 2016 GOES TO 123456. Last year was full of differe

The Reason Why C Programming Language Was Named C

Image
The first thing that comes to our mind for the term programming language is C. It is a decade old general-purpose high-level programming language which has defied all norms of popularity. The language has been given the name C because it succeeds another language called B. C is one of the most popular computer programming languages which has existed since the last 44 years. It was created by the famous American programmer Dennis Ritchie – with the help of Ken Thompson – while working at Bell Labs. Most of us have this curiosity that why is the programming language named after a single alphabet. And why it is C, not any other letter. Anyways, we would have questioned the name of the programming language even if a different letter was used. So, let’s focus on the story instead. The naming of C doesn’t involve any crunchy fiction story, like in the case the Linux Penguin Tux. It is said Linus Torvalds, the creator of Linux, contracted penguinitis after a man-eating penguin running at 100-

Debian GNU/Linux 8.7 Released (Update: ISOs Now Available)

Image
The Debian Project has released the seventh update of Debian 8 Jessie. This release ships with tons of security updates, bug fixes, and updated packages.  The existing users of Debian 8 need to point the apt package tool to one of the updated Debian mirrors and get the update. The new installation media and ISO images are yet to be published. Update:  Debian 8.7’s ISO images are now available for download. It can be grabbed via these  mirrors  or download the installation images from  here . B ack in early 2015, Debian 8.0 Jessie was released after spending two years in development. This release switched back to GNOME as the default desktop environment choice. Now, the Debian Project is here with the latest update to this long-standing Linux distribution. The seventh update of Debian 8, i.e. Debian GNU/Linux 8.7, has  just been released . As expected, this release fixes tons of existing security issues. Notably, many of the included security advisories were already published and refere

Donald Trump: ‘Full Report’ On Hacking In First 90 Days

Image
President-elect Donald Trump said his administration would produce a full report on hacking within the first 90 days of his presidency and accused  “my political opponents and a failed spy” of making “phony allegations ” against him. “Totally made up facts by sleazebag political operatives, both Democrats and Republicans,” Trump said in a Twitter post Friday, adding in a later tweet, “My people will have a full report on hacking within 90 days!’’ In a flurry of early morning messages, the president-elect also suggested that the intelligence community had leaked damaging information about his alleged ties to Russia, after news reports published information about a dossier claiming the Kremlin had compromised him. “Russia says nothing exists,’’ Trump said on Twitter. “Probably released by ‘Intelligence’ even knowing there is no proof, and never will be.’’ In messages sent before many Americans reported to work, Trump took to social media to share with the public his thoughts on a range o

SyntaxDB — A Perfect Programming Syntax “Search Engine” For Coders | Padsa Information

Image
SyntaxDB calls itself a programming syntax database that wishes to eliminate the need to use Google to search syntax during coding. It allows you to search your syntax queries and shows you helpful results along with further documentation. Currently, SyntaxDB supports nine popular programming languages. V ery often programmers new to the field ask if is it okay to use Google and Stack Overflow to look up some syntax. The answer is yes — searching the web is a routine task of a good developer and its frequency even increases with time. Using Google doesn’t make you a bad programmer. Instead, it makes you even better at it and teaches you new things. To make things even easier for programmers, Anthony Nguyen, a software developer studying at Queen’s University, has created  SyntaxDB . This website calls itself the programming syntax database and allows you to search your required query. Nguyen calls it helpful for those who often visit Google to look for their programming rela

How to become an ethical hacker | Padsa Information

Image
An essential guide to becoming an ethical hacker I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker Ethical hacker A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent. So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker ……  it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!. You need essential prerequisite knowledge If you want to get into the IT  security world as a white hat you must be competent in the following areas: Networking Programming Databases Operating systems (Linux and Windows) Once you have a fairly good knowledge of the above

Why should you choose java as your primary programming language | Padsa Information

Image
Java is a high-level  object oriented programming language  and computing platform developed by Sun Microsystems and released in 1995. With more than 9 million developers worldwide, java enables us to develop and deploy applications and services. From laptops to data centers, game consoles to super computers and cell phones to the Internet, java is everywhere. Why Choose java? Although there are many reasons why a software developer choose java, below are some of the popular reasons: Develop software on one platform and deploy it on virtually any other platform. Create programs that can run in a web browser and access available web services. Develop server-side applications like online stores, polls, image galleries, form processing and more. Create powerful applications for mobile phones and other embedded devices. JRE provides the run-time engine JVM along with the class libraries which contains the predefined functionality. Using JDK programmers can create and run Java programs. But

Linux Filesystems Explained — EXT2/3/4, XFS, Btrfs, ZFS | Padsa Information

Image
Linux is known for supporting the most filesystems out of all operating systems. There are many retro ones, there are the tried and true, and then there are the next generation filesystems with amazing features. There are so many, in fact, that it can be extremely daunting to the average user, and more so for the FOSS newcomer. T he first time I installed Ubuntu on my computer, when I was sixteen, I was astonished by the number of filesystems that were available for the system installation. There were so many that I was left overwhelmed and confused. I was worried that if I picked the wrong one my system might run too slow or that it might be more problematic than another. I wanted to know which was the best. Since then, things have changed quite a bit. Many Linux distributions offer a ‘standard’ filesystem that an installation will default to unless otherwise specified. I think this was a very good move because it assists newcomers in making a decision and being comfortable with it. B

Top 10 Best Free Data Recovery Software of 2017 | Padsa Information

Image
Padsa Information  brings you a list of the best data recovery software of 2016 which are totally free. These data recovery tools save a lot of hassles after we accidently delete some important files or we do not take backups before formatting a hard drive. Using these free recovery software, you can recover your data back on your PC. W e lose our important data from hard disk by accidentally pressing the Delete key. Sometimes, a software bug or virus can also corrupt your hard disk. In that case, you need the best data recovery software or a recovery tool to recover your important data back at any  cost.At  this point of time, a data recovery software comes in handy. We have compiled a list of best free data recovery software considering factors such as whether the software can recover RAW, Unallocated, Corrupt or Formatted Hard Disk; its ability to recover from different file systems such as FAT, FAT32, HFS, NTFS etc.; the array of devices supported; time At this point of time, a dat