Thursday 28 April 2016

facebook tripples its earnings in this quater Jan-March And the users also increase making facebook own half the internet users
\g

Tuesday 26 April 2016

What is the Dark Web?

The Dark Web is a term that refers specifically to a collection of websites that are publicly visible, but hide the IP addresses of the servers that run them. Thus they can be visited by any web user, but it is very difficult to work out who is behind the sites. And you cannot find these sites using search engines.

Almost all sites on the so-called Dark Web hide their identity using the Tor encryption tool. You may know Tor for its end-user-hiding properties. You can use Tor to hide your identity, and spoof your location. When a website is run through Tor it has much the same effect.

Indeed, it multiplies the effect. To visit a site on the Dark Web that is using Tor encryption, the web user needs to be using Tor. Just as the end user's IP is bounced through several layers of encryption to appear to be at another IP address on the Tor network, so is that of the website. So there are several layers of magnitude more secrecy than the already secret act of using Tor to visit a website on the open internet - for both parties

Not all Dark Web sites use Tor. Some use similar services such as I2P - indeed the all new Silk Road Reloaded uses this service. But the principle remains the same. The visitor has to use the same encryption tool as the site and - crucially - know where to find the site, in order to type in the URL and visit.

Infamous examples of Dark Web sites include the Silk Road and its offspring. The Silk Road was (and maybe still is) a website for the buying and selling of recreational drugs. But there are legitimate uses for the Dark Web. People operating within closed, totalitarian societies can use the Dark Web to communicate with the outside world. And given recent revelations about US- and UK government snooping on web use, you may feel it is sensible to take your communication on to the Dark Web

Dark Web or Deep Web? (Or Deepnet, Invisible Web, or Hidden Web?)

Although all of these terms tend to be used interchangeably, they don't refer to exactly the same thing. An element of nuance is required. The 'Deep Web' refers to all web pages that search engines cannot find. Thus the 'Deep Web' includes the 'Dark Web', but also includes all user databases, webmail pages, registration-required web forums, and pages behind paywalls. There are huge numbers of such pages, and most exist for mundane reasons.

We have a staging version of all of our websites that is blocked from being indexed by search engines, so we can check stories before we set them live. Thus for every page publicly available on this website (and there are literally millions), there is another on the Deep Web. The content management system into which I am typing this article is on the Deep Web. So that is another page for every page that is on the live site. Meanwhile our work intranet is hidden from search engines, and requires a password. It has been live for nearly 20 years, so there are plenty of pages there.

Use an online bank account? The password-protected bits are on the Deep Web. And when you consider how many pages just one Gmail account will create, you understand the sheer size of the Deep Web.

This scale is why newspapers and mainstream news outlets regularly trott out scare stories about '90 percent of the internet' consisting of the Dark Web. They are confusing the generally dodgy Dark Web with the much bigger and generally more benign Deep Web. Mixung up the act of delibarately hiding things, with that of necessarily keeping pages away from search engines for  reasons of security or user experience.
How to access the Dark Web

Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser Bundle, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That's it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

Depending on what you intend to do on the Dark Web, some users recommend placing tape over your laptop's webcam to prevent prying eyes watching you. A tinfoil hat is also an option.

The difficult thing is knowing where to look. There, reader, we leave you to your own devices and wish you good luck and safe surfing. And a warning before you go any further. Once you get into the Dark Web, you *will* be able to access those sites to which the tabloids refer. This means that you could be a click away from sites selling drugs and guns, and - frankly - even worse things.

Aggregation sites such as Reddit offer lists of links, as do several Wikis, including http://thehiddenwiki.org/  - a list that offers access to some very bad places. Have a quick look by all means, but please don't take our linking to it as an endorsement.

Also, Dark Web sites do go down from time to time, due to their dark nature. But if you want good customer service, stay out of the dark!

Monday 18 April 2016


           The Large Hadron Collider

The Large Hadron Collider (LHC) is the world’s largest and most powerful particle accelerator. It first started up on 10 September 2008, and remains the latest addition to CERN’s accelerator complex. The LHC consists of a 27-kilometre ring of superconducting magnets with a number of accelerating structures to boost the energy of the particles along the way.
Inside the accelerator, two high-energy particle beams travel at close to the speed of light before they are made to collide. The beams travel in opposite directions in separate beam pipes – two tubes kept at ultrahigh vacuum. They are guided around the accelerator ring by a strong magnetic field maintained by superconducting electromagnets. The electromagnets are built from coils of special electric cable that operates in a superconducting state, efficiently conducting electricity without resistance or loss of energy. This requires chilling the magnets to ‑271.3°C – a temperature colder than outer space. For this reason, much of the accelerator is connected to a distribution system of liquid helium, which cools the magnets, as well as to other supply services.
The Large Hadron Collider is the world's largest and most powerful particle accelerator (Image: CERN)
Thousands of magnets of different varieties and sizes are used to direct the beams around the accelerator. These include 1232 dipole magnets 15 metres in length which bend the beams, and 392 quadrupole magnets, each 5–7 metres long, which focus the beams. Just prior to collision, another type of magnet is used to "squeeze" the particles closer together to increase the chances of collisions. The particles are so tiny that the task of making them collide is akin to firing two needles 10 kilometres apart with such precision that they meet halfway.
All the controls for the accelerator, its services and technical infrastructure are housed under one roof at the CERN Control Centre. From here, the beams inside the LHC are made to collide at four locations around the accelerator ring, corresponding to the positions of four particle detectorsATLAS, CMS, ALICE and LHCb.
HOW YOUR FACEBOOK ACCOUNT CAN BE HACKED
NB DO NOT CLICK ON ANY PORN RELATED CONTENT AND DONOT LOGIN TO LIKE SITES BECAUSE YOUR ACCOUNT WILL BE
COMPROMISED
Their are a number of ways your face book account can be hacked, Today we have decided to share with you The " Phishing Method" Please take Note of posts with links containg links that tell you to re-login to your facebook account this may just be a phishing websites Aimed at stealing your login details so if possible never click on posts containg porn videos or images,how to get lots of likes, which redirect you to another website many people of recent have been fallen victims of this donot fall for this if you accidentally loged in such a website you can quickly change your log in details if the login details have been changed there still hope just follow this to help get your account back
Step 1:
First goto this link. https://www.facebook.com/hacked
Click the button "Your account has been Compromised".

Then type in your email address, Login name , Full Name or your specified Phone No.
Then facebook would search for matching users. If you still don't see your account, try entering something else other than the one you entered.
( for example if you entered your phone number and it didn't work try entering your email or Login name.) Most of the time using your email would be the wisest choice.)
And hit Search. smile emoticon
Step 2:
Well now the kind of difficult part begins. But I don't think it would be for you.
Now for this step you got to enter your account's password. Well if you knew the password you won't be here anyway, cause you don't know your new password the Hacker's changed, enter your old password. The password that you use, to enter into your account before you got HACKED
Step 3:
Then cause you entered an old actually now wrong password this page will come up.
Well no need to be down yet. Just click the reset my password button.
Step 4:
Your primary email would be changed so well of course you don't want to send your reset your password link to the hacker's account so, Click "no longer have access to these?" link.
Step 5:
Well now you almost got your account back.
Now write your new email address that you want to send the change password link as well set as your primary email.
Step 6:
Well now, follow the next steps and you would have your account back in 24 hours.
Please Remember to SHARE THIS POST

Saturday 9 April 2016

Android Studio 2.0 released by Google, brings new features like ‘Instant Run’

Android App and games developers will have a new tool to play with. Google has just released Android Studio 2.0, the second major iteration of “the official IDE (integrated development environment) from Google”.
The new IDE contains a number of new features, such as Instant Run, which allows the developer to see changes to their app in real-time, similar to Apple’s Playground. There’s also a new Android Emulator that promises to be three times faster than the old one.
Android Studio 2.0 includes the following new features that Android developer can use in their workflow :
  • Instant Run – For every developer who loves faster build speeds. Make changes and see them appear live in your running app. With many build/run accelerations ranging from VM hot swapping to warm swapping app resources, Instant Run will save you time every day.
  • Android Emulator – The new emulator runs ~3x faster than Android’s previous emulator, and with ADB enhancements you can now push apps and data 10x faster to the emulator than to a physical device. Like a physical device, the official Android emulator also includes Google Play Services built-in, so you can test out more API functionality. Finally, the new emulator has rich new features to manage calls, battery, network, GPS, and more.
  • Cloud Test Lab Integration – Write once, run anywhere. Improve the quality of your apps by quickly and easily testing on a wide range of physical Android devices in the Cloud Test Lab right from within Android Studio.
  • App Indexing Code Generation & Test – Help promote the visibility your app in Google Search for your users by adding auto-generated URLS with the App Indexing feature in Android Studio. With a few click you can add indexable URL links that you can test all within the IDE.
  • GPU Debugger Preview – For those of you developing OpenGL ES based games or apps, you can now see each frame and the GL state with the new GPU debugger. Uncover and diagnosis GL rendering issues by capturing and analyzing the GPU stream from your Android device.
  • IntelliJ 15 Update – Android Studio is built on the world class Intellij coding platform. Check out the latest Intellij features here.
The standout feature of Android Studio 2.0 is the Instant Run. Like the Apple Playground feature, Android Instant Run will analyze the changes you have made and determine how it can deploy your new code in the fastest way.
After you update to or download Android Studio 2.0, you should upgrade your projects to use Instant Run, and create a fresh Android Virtual Device (AVD) for the new Android emulator and you are on your way to a fast Android development experience.

Tuesday 5 April 2016



  Communications on WhatsApp are now fully end-to-end encrypted, the company announced on Apirl 5, completing an integration that has lasted for nearly a year and a half. The company began rolling out encrypting text messages in November 2014, as part of a partnership with Open Whisper Systems, but those protections now extend to voice calls, video, and multi-party chat rooms, for users on both iOS and Android.
Deploying universal encryption allows for a number of new protections. Once communications with a user are encrypted, the WhatsApp client will now notify the user and refuse to send any unencrypted messages, addressing previous concerns that the system might be vulnerable to a downgrade attack.

It's still hard to say for sure that WhatsApp is entirely immune to warrant requests. New attacks and vulnerabilities are common in the security world, and governments have been known to purchase and stockpile such attacks for law enforcement purposes. WhatsApp's system still manages messages centrally, coordinates key exchanges, and has significant control over the code that runs on both servers and phones, so any attacker with WhatsApp's cooperation would be well-placed to execute any newly devised attacks. Still, such an attack would likely require extraordinary cooperation from WhatsApp, akin to the measures demanded in Apple's San Bernardino case, measures that would be vigorously resisted in courts and elsewhere.
The result is strong security for WhatsApp users, and potentially a template that could be applied to other services going forward. Open Whisper's protocol is open source, and the group has pledged to help other messenger services employ the same protections going forward. "Over a billion monthly active users across the world are now using the Signal Protocol for end to end encryption," Open Whisper wrote in its blog post announcing the change. "Over the next year, we will continue to work with additional messengers to amplify the impact and scope of private communication even further."