follow

help me to improve quality

donate

Pages

Friday 24 February 2017

how to use google drive on android 2017




Using google Drive app isn’t tricky at all. In fact, it’s probably one of easiest cloud services to start using. So rather than giving you a needlessly long tutorial, above video offers a brief introduction to navigating and using the Drive interface, and also includes a few tips to help you get the most out of the service.

Google Drive is a safe place for all your files and puts them within reach from any smartphone, tablet, or computer. Files in Drive – like your videos, photos, and documents – are backed up safely so you can’t lose them. Once there, you can easily invite others to view, edit, or leave comments on any of your files or folders.
download google drive app from http://viid.me/qxAoQH
With google Drive, you can:

- Safely store your files and access them from anywhere.
- Search for files by name and content.
- Easily share files and folders with others.
- Quickly view your content.
- Set access levels for who can view, comment, or edit.
- Quickly access recent files.
- See file details and activity.
- Enable viewing of files offline.
- Use your device camera to scan in paper documents.
- Access pictures and videos from Google Photos.

►google drive features:-

-15GB space: 

Your storage works with Drive, Gmail and Google Photos, so you can store files, save email attachments and back-up photos directly to Drive. You can also purchase a larger cloud storage plan as you need it.

-keep any file:

Photos, videos, presentations, PDFs – even Microsoft Office files. No matter what type of file it is, everything can be stored safely in Drive.

-share how you want:

Files in Drive are private, until you decide to share them. You can quickly invite others to view, comment, and edit any file or folder you choose. It's online collaboration made easy.

-safe and secure:

Your file security is crucial. That’s why every file in Drive stays safe no matter what happens to your smartphone, tablet or computer. Drive is encrypted using SSL, the same security protocol used on Gmail and other Google services.


►Built to work with Google:-

-save gmail attachment:

Hover over an attachment in Gmail and look for the Drive logo. Here, you can save any attachment to your Drive to organize and share them in a single, safe place.

-powerful search:

Drive can recognize objects in your images and text in scanned documents. So you can search a word.

-google photos:

Store your photos in Drive and see them come to life with Google Photos. Get that expertly edited look without the effort, plus animations, movies, and more..

►work smarter with apps:-

-google docs,sheets,slides:

Create and collaborate with others. Share documents and files, build out spreadsheets and make a presentation on the fly with our Docs, Sheets and Slides apps.

-more google drive apps:

Edit your profile photo, do some landscaping, create a mind map and more. Over 100 Drive apps can help you do more with your stuff.

►take google drive even further:-

-scan documents:

Scan all your paper documents with Drive for Android. Just snap a photo of documents like receipts, letters and statements – and Drive will store them instantly as PDFs.

-work offline:

Make files available offline so you can view them when your phone or tablet loses service, like on a plane or in a building with a bad connection.

-see old version:

You can look back as far as 30 days on most file types, making it easy to see who has made changes and go back to previous versions.

When Google Drive first launched, it served as a place to store your files in the cloud so that they could be accessed anywhere. As Drive has evolved, it has assimilated roles of Google Docs & now serves as hub for all Google document creation & office tools.

Friday 17 February 2017

windows defender vs trend micro



should you pay money to buy trend micro maximum security instead of using free inbuilt windows 10 security?

do i need to install antivirus in windows 10?

does windows 10 need antivirus?

Is paying for antivirus a waste of money?

should you install paid antivirus in windows10?

What's the Best Antivirus for Windows 10?

trend micro maximum security 2017 vs windows 10 security(windows defender and smart screen filter of microsoft edge) ,which one is best?

if you have questions like this then you will get answer of your question in above video.

in this video,i tested trend micro maximum security 2017 and windows 10 security both.

i used same malware sample and same molecious url to test both security product.

At the very beginning of its existence Windows Defender was one of the worst antiviruses ever.You should take a look at a honest benchmark and decide for yourself how much are you willing to spend and what features do you value the most.

-The choice of the best antivirus depends on the personal needs and preferences of the particular user:

•Some antiviruses exceed at being fast and efficient, those are well suited for older computers.
•Some are easy to manage, those are well suited for inexperienced users.
•Some have lots of additional features like secure payment processing, browser protection etc.
•Some have a very good value to price rating.
▬▬▬▬▬▬▬▬▬ஜ۩۞۩ஜ▬▬▬▬▬▬▬▬▬▬
join me on facebook at https://www.facebook.com/pctricks.and.cyber.securit.test/
my twitter link is https://twitter.com/patelking724

my other websites are as follows:
https://pctricksandcybersecuritytest.blogspot.com-my blogger

https://in.pinterest.com/pctricksbest/-follow me on pintrest

http://vk.com/id331791136-follow me on ВКонтакте
▬▬▬▬▬▬▬▬▬ஜ۩۞۩ஜ▬▬▬▬▬▬▬▬▬▬

This Ransomware Malware Could Poison Your Water Supply If Not Paid



Ransomware has been around for a few years, but in last two years, it has become an albatross around everyone's neck, targeting businesses, hospitals, financial institutions and personal computers worldwide and extorting millions of dollars.

Ransomware is a type of malware that infects computers and encrypts their content with strong encryption algorithms, and then demands a ransom to decrypt that data.

It turned out to be a noxious game of Hackers to get paid effortlessly.

Initially, ransomware used to target regular internet users, but in past few months, we have already seen the threat targeting enterprises, educational facilities, and hospitals, hotels, and other businesses.

And now, the threat has gone Worse!

This PoC Ransomware Could Poison Water Supply!




Researchers at the Georgia Institute of Technology (GIT) have demonstrated the capability of ransomware to take down the critical infrastructure our cities need to operate, causing havoc among people.

GIT researchers created a proof-of-concept ransomware that, in a simulated environment, was able to gain control of a water treatment plant and threaten to shut off the entire water supply or poison the city's water by increasing the amount of chlorine in it.

Dubbed LogicLocker, the ransomware, presented at the 2017 RSA Conference in San Francisco, allowed researchers to alter Programmable Logic Controllers (PLCs) — the tiny computers that control critical Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) infrastructure, like power plants or water treatment facilities.

This, in turn, gave them the ability to shut valves, control the amount of chlorine in the water, and display false readouts.

Sounds scary, Right?

Fortunately, this has not happened yet, but researchers say this is only a matter of time.The simulated attack by researchers was created to highlight how attackers could disrupt vital services which cater to our critical needs, like water management utilities, energy providers, escalator controllers, HVAC (heating, ventilation and air conditioning) systems, and other mechanical systems.


Over 1500 PLC Systems Open To Ransomware Attack




LogicLocker targets three types of PLCs that are exposed online and infects them to reprogram the tiny computer with a new password, locking the legitimate owners out and demanding ransom while holding the utility hostage.

If the owners pay, they get their control over the PLC back. But if not, the hackers could malfunction water plant, or worse, dump life-threatening amounts of chlorine in water supplies that could potentially poison entire cities.

GIT researchers searched the internet for the two models of PLCs that they targeted during their experiment and found more than 1,500 PLCs that were exposed online.
"There are common misconceptions about what is connected to the internet," says researcher David Formby. "Operators may believe their systems are air-gapped and that there's no way to access the controllers, but these systems are often connected in some way."
Targeting industrial control and SCADA systems is not new, cybercriminals and nation-state actors are doing this for years, with programs like StuxnetFlame, and Duqu, but ransomware will soon add a financial element to these type of cyber attacks.

Therefore, it is inevitable that money-motivated criminals will soon target critical infrastructure directly. Additionally, the nation-state actors could also hide their intentions under ransomware operators.

So, it is high time for industrial control systems and SCADA operators to start adopting standard security practices like changing the PLCs default passwords, limiting their connections by placing them behind a firewall, scanning their networks for potential threats, and install intrusion monitoring systems.

Thursday 16 February 2017

New MacOS Malware linked to Russian Hackers Can Steal Passwords & iPhone Backups



Security researchers have discovered a new Mac malware allegedly developed by APT28 Russian cyber espionage group who is believed to be responsible for 2016 presidential election hacking scandal.

A new variant of the X-Agent spyware is now targeting Apple macOS system that has previously been used in cyber attacks against Windows, iOS, Android, and Linux devices.

The malware is designed to steal web browser passwords, take screenshots of the display, detect system configurations, execute files and exfiltrate iPhone backups stored on the computer.

The X-Agent malware is tied to Russian hacking group known as APT28 — also known as Fancy Bear, Sofacy, Sednit, and Pawn Storm — that has been operating since at least 2007 and is allegedly linked to the Russian government.
"Our past analysis of samples known to be linked to APT28 group shows a number of similarities between the Sofacy/APT28/Sednit Xagent component for Windows/Linux and the Mac OS binary that currently forms the object of our investigation," Bitdefender reported in a blog post published Tuesday. 
"For once, there is the presence of similar modules, such as FileSystem, KeyLogger, and RemoteShell, as well as a similar network module called HttpChanel."
Like variants for other platforms, the Mac version of X-Agent spyware is also act as a backdoor with advanced cyber-espionage capabilities that can be customized depending on the objectives of an attack.



Moreover, X-Agent is being planted by exploiting a vulnerability in the MacKeeper software installed on the targeted computers and known malware dropper Komplex — a first-stage trojan that APT28 uses to infect machines.

Abovementioned evidence indicates that the newly discovered Mac version of X-Agent is also created by the same Russian hacking group.

Once successfully installed, the backdoor checks for the presence of a debugger and if it finds one, it terminates itself to prevent execution. But if not, the backdoor waits for an Internet connection to communicate with the command-and-control servers.
"After the communication has been established, the payload starts the modules. Our preliminary analysis shows most of the C&C URLs impersonate Apple domains," Bitdefender researchers said. 
"Once connected to the C&C, the payload sends a HelloMessage, then spawns two communication threads running in infinite loops. The former uses POST requests to send information to the C&C, while the latter monitors GET requests for commands."
The Research is still ongoing and Bitdefender security researchers right now only have the Mac malware sample and not a full picture of how an attack works.

APT28 is one of the two Russian-linked cyber-espionage groups that have been accused of hacking into the U.S. Democratic National Committee's email server last year and interfering with the 2016 presidential election.

You can read BitDefender's previous analysis on the APT28 hacking group here [PDF].

Yahoo Hacked Once Again! Quietly Warns Affected Users About New Attack



Has Yahoo rebuilt your trust again?

If yes, then you need to think once again, as the company is warning its users of another hack.

Last year, Yahoo admitted two of the largest data breaches on record. One of which that took place in 2013 disclosed personal details associated with more than 1 Billion Yahoo user accounts.

Well, it's happened yet again.

Yahoo sent out another round of notifications to its users on Wednesday, warning that their accounts may have been compromised as recently as last year after an ongoing investigation turned up evidence that hackers used forged cookies to log accounts without passwords.

The company quietly revealed the data breach in security update in December 2016, but the news was largely overlooked, as the statement from Yahoo provided information on a separate data breach that occurred in August 2013 involving more than 1 billion accounts.

The warning message sent Wednesday to some Yahoo users read:
"Based on the ongoing investigation, we believe a forged cookie may have been used in 2015 or 2016 to access your account."
The total number of customers affected by this attack is still unknown, though the company has confirmed that the accounts were affected by a security flaw in Yahoo's mail service.

The flaw allowed "state-sponsored attackers" to use a "forged cookie" created by software stolen from within the company's internal systems to gain access to Yahoo accounts without passwords.

"Forged cookies" are digital keys that allow access to accounts without re-entering passwords.

Here's how the attack works:


Instead of stealing passwords, hackers trick a web browser into telling the company that the victim had already logged in by forging little web browser tokens called cookies.

You use cookies every time you log into any service and check that box that says "keep me logged in," or, "remember me."

So, even if you close the window, or shutdown your system, you will not have to log back into your account because the cookie stored by your browser tells the online service that you already submitted your username and password.

Here's what a Yahoo spokesperson said about the recently disclosed breach:
"As we have previously disclosed, our outside forensic experts have been investigating the creation of forged cookies that could have enabled an intruder to access our users' accounts without a password." 
"The investigation has identified user accounts for which we believe forged cookies were taken or used. Yahoo is in the process of notifying all potentially affected account holders."
The warning notification has been sent out to almost all affected Yahoo users, although investigations are still ongoing.

The notice sent to Yahoo's customers on Wednesday, the same day it was reported that Verizon is slashing the price the telecom service will pay for Yahoo by at least $250 Million, following revelations of two security breaches last year, according to a report by Bloomberg.

The price cut appears to indicate the troubled deal will go through.

With yet another disclosed security breach, one might think about closing online accounts associated with Yahoo.

Signal Messaging App Rolls Out Encrypted Video Calling



WhatsApp and Facebook have so far the largest end-to-end encrypted video calling network of all, but now another popular end-to-end encrypted messaging app recommended by whistleblower Edward Snowden is ready to give them a really tough competition.

The Signal app, which is widely considered the most secure of all other encrypted messaging apps, released video calling feature on Tuesday for both Android and iOS in a new update.

Developed by open source software group Open Whisper System, Signal is a free and open source messaging application specially designed for Android and iOS users to make secure and encrypted messages and voice calls.

Even the Signal Protocol powers the end-to-end encryption built into WhatsApp, Facebook Messenger, and Google Allo's Incognito mode as well.

Signal has already been providing fully end-to-end encrypted chat and voice calling features, but the newly added feature will make it even easier for privacy conscious people to convey their information face-to-face through video calling without compromising security.

Watch Out! There's a Privacy issue too!




This new video calling feature also comes with support for CallKit on iOS 10 devices, a new framework that makes Signal act more like the regular phone app.

Callkit in iOS 10 allows Signal users to answer calls from with one touch through their device's lock screen and lists those calls on the device's native "Recent Calls" just like regular calls, possibly making it inconvenient for privacy-minded people.

CallKit is optional, and if users decide to opt-in this feature, some of their data might sync to Apple's iCloud servers, including who the Signal users called and how long they had the conversation, Signal's pseudonymous lead designer Moxie Marlinspike explains in a blog post.

The CallKit feature can be turned off within your iOS device's settings to enhance your privacy.

Currently, Signal’s video calling feature is in beta, which means both users will have to enable the feature for video calling to work manually.

To try out video calling in Signal, you will have to go into your Signal settings and enable 'Video calling beta' under 'Advanced.'

Websites Can Now Track You Online Across Multiple Web Browsers



You might be aware of websites, banks, retailers, and advertisers tracking your online activities using different Web "fingerprinting" techniques even in incognito/private mode, but now sites can track you anywhere online — even if you switch browsers.

A team of researchers has recently developed a cross-browser fingerprinting technique — the first reliable technique to accurately track users across multiple browsers based on information like extensions, plugins, time zone and whether or not an ad blocker is installed.

Previous fingerprinting methods usually only work across a single browser, but the new method uses operating system and hardware level features and works across multiple browsers.

This new fingerprinting technique ties digital fingerprint left behind by a Firefox browser to the fingerprint from a Chrome browser or Windows Edge running on the same device.

This makes the method particularly useful to advertisers, enabling them to continue serving targeted advertisements to online users, even if they avoid them by switching browsers.

The new technique can be found in a research paper titled (Cross-)Browser Fingerprinting via OS and Hardware Level Features [PDF] by Lehigh University’s Yinzhi Cao and Song Li, and Washington University in St. Louis’ Erik Wijmans.

The cross-browser fingerprinting technique relies on "many novel OS and hardware features, especially computer graphics ones" that are slightly different for each computer.

For example, the technology can be used to identify the machine by performing 20 unique WebGL tasks while rendering 3D graphics in web browsers with carefully selected computer graphics parameters, such as texture, anti-aliasing, light, and transparency.

In total, 36 new features work independently of a particular browser, although they are not confined to one specific web browser on the machine.

The features tested currently includes time zone, number of CPU cores, GPU, hash values of GPU rendering results, plugins, fonts, audio, screen ratio and depth, WebGL, Ad blocking, canvas, cookies, encoding, and language.

The researchers provided both a practical demonstration as well as open source code online on GitHub. They performed a test which involved 3,615 fingerprints and 1,903 users and found that their method successfully identified 99.2% of users.

On the other hand, a single-browser fingerprinting technique called AmIUnique had a success rate of 90.8%.

"This approach is lightweight, but we need to find all possible fingerprintable places, such as canvas and audio context: If one place is missing, the browser can still be somehow fingerprinted. We leave it as our future work to explore the correct virtualization layer," the paper notes.

The researchers also noted that this new cross-browser fingerprinting technique is not too bad, as in some cases, the method can be used as part of stronger multi-factor user authentications across multiple browsers.

For example, Banks can use this technique to check if a user logging into an online account is using the computer that has been used on every previous visit, making sure the login was legitimate even if the user is using a different machine to usual.

The researchers plan to present their paper at the Network and Distributed System Security Symposium scheduled for February 26 through March 1 in San Diego, California.

Friday 10 February 2017

how to backup windows 10


What is System Backup?

A System Backup involves all of the system files, boot files, and program files. Only backing up both the system and boot files can ensure that the operating system works normally when restoring the operating system. If only one of them has been backed up the operating system may not work normally after system restoring. Therefore, it is necessary for us to know what the system partition and the boot partition are.
  • System partition: Is the partition that installs the operating system, applications, and saves your personal files. That is the so-called C Drive. System files require relatively more space. For example, the system files of Windows 7 require at least 8 GB.
  • Boot partition: Is the partition that stores boot files, including boot.ini, ntldr, bcd, winload.exe, etc. Boot files require relatively smaller space, generally less than 200MB.
Before the introduction of the operating system of Windows 7, the earlier operating systems such as Windows XP, Vista, as well as Windows Server 2003, had the system and boot partitions combined together. That is to say, the boot partition was a system partition and the system partition was a boot partition. Because of this, with those earlier operating systems, it was necessary to backup only one partition during system backup. But in Windows 7 and Windows 8, the system partition and boot partition are usually separated. The System partition is the C Drive that can be accessed normally, while the boot partition is a 200MB or more partition, named "System Reserved Partition". The boot partition usually does not have a drive letter, and usually we cannot access this partition or any file on this partition. Therefore, when backing up Windows 7/8/8.1/10 OS, only backing up these two partitions can be called a complete full system backup.
However, the PC backup software - AOMEI Backupper Professional has provided the specially designed function of "System Backup", which can automatically back up both of these two partitions. In addition, during system restore, it will automatically restore the backed up files to their two respective partitions, It is a one-key operation not needing the backing-up of these two partitions separately.

What is a system image?

A system image is a backup of the partitions required for computer to run. Usually, a system image backup is a compressed file that contains operating system, boot sectors, custom settings and all programs installed & files saved on those partitions. Therefore, you can restore computer from a system image backup if Windows failed to boot or hard drive died. Normally, a system image is equal to a backup of C drive, but not all. In most situations, it also includes a backup of System Reserved Partition or EFI System Partition (ESP).
Sometimes a system image is equal to a disk image, but sometimes is not. For example, let’s assume there is only one internal disk in your computer and the partition layout is [C: drive][D: drive][E: drive]. In such case, a system image will backup only C: drive, however, a disk image will backup C: drive, D: drive and E: drive. If there is only C: drive on the disk, then the system image is equal to disk image.

When should you create a system image backup?

A system image is very useful for OS development, data backup and hardware upgrade, etc.
  • You just finished a clean install of Windows and most commonly used software on your computer. It’s probably the best time point to create a system image when everything is clean and runs smoothly on your system. Once something bad happens later, you will be able to bring computer to its original state.
  • You want to replace your slower mechanical hard drive with a speedy SSD. You can create a system image, swap hard drive out for SSD and restore the system image to the SSD. If hard drive and SSD can be plugged into computer simultaneously, you can migrate OS from HDD to SSD which will save time.
  • When receiving some error warnings, such as "SMART failure predicted on hard disk", "Hard disk failure is imminent", "Windows detected a hard disk problem", etc. You need to create a system image or disk image. Although your hard disk will not fail at once, it is failing.

Why is a Regular System Backup Needed?

The software of AOMEI Backupper can back up all the data in the system drive to an image file. If there is any system problem, we can employ AOMEI Backupper again to restore the operating system via the backed up image file. It can help to save a lot of time.
Generally speaking, when the operating system has been used for a period of time, most users would face the problem of system crash, as well as many other disk problems that prevent the system from working normally. In such cases it is necessary to reinstall the operating system. As known to many people, OS reinstallation is time-consuming. It requires at least half an hour at a time. And then it can take many hours installing various drivers and applications.
Therefore it can save a lot of time and effort to do a complete backup of the system (usually C Drive) immediately after the installation of a new operating system and some commonly-used applications.
Then it is wise to do a complete full system backup at intervals no matter how old the computer is, because if there is any system problem the system can be restored to the previous normal state quickly and conveniently by the backed-up image file.
 Tips: Before backup, you had better do a system cleaning and delete some useless temporary files. Because the more applications installed on system drive are, the bigger the image file will be, so does the space required by the image file. After system restore, all these useless files will be restored, too. Therefore, it is important to keep the system clean before backup.

System Backup by using AOMEI Backupper

AOMEI backup software provides a one-key function of system backup, which can backup system and boot partitions to an image file conveniently. Meanwhile, it possesses the function of compression to the image file so as to reduce the storage space required by the image file to the largest extent. It also provides advanced level users with the function of incremental backup so as to improve the backup efficiency and further reduce the storage space required by the image file.
The steps of system backup and restore process are as follows:
Good to Know: The program files and personal data (like photos, music, documents, etc) in C drive are also backed up along with system backup.
Firstdownload AOMEI Backupper, install and launch it. Then, click "System Backup" under the "Backup" tab.
Second, the "Task Name" can be modified based on personal needs, and the name is helpful for you to distinguish it from other backup tasks. The system and boot drives have been selected as source partitions automatically by AOMEI Backupper at "Step1".
At "Step2", select a destination path to save the system image file. An external hard drive, a USB drive, or a CD/DVD   can be selected. To select a NAS device or a network drive, please click "Share/NAS". And then click "Start Backup" to begin system backup.
 Tips:
  • "Backup Options" (optional) can be set based on your own needs. It includes the functions of adding comments for system backup to distinguish from other backups, compressing, encryption and splitting image file, etc.
  • "Schedule" is also optional. To make sure your system backup is up-to-date, you can create schedules to backup system automatically.
  • "Scheme" enables you to set up rules to delete older backups automatically so that there is enough space on your backup location. This amazing function can be only supported by paid editions.
At last, click "Finish" option to exit. You can tick the box before "Check backup integrity on completion" to make sure the system backup image is valid for restore. You also can choose what you need your computer to do after system backup is completed, such as shutdown, restart, etc.
In addition, the operations of system backup will not interrupt your work. That is to say, you can do system backup while working. The time for system backup is determined by the amount of the valid data. For example, if your system takes up 16GB, it may cost ten minutes to do system backup. If your system only occupies 3GB, it may just need two minutes to complete the system backup.

How to Do System Restore?

AOMEI Backupper provides different methods for you to restore system backup.
  • If your system crashes or disk fails, you can create a bootable media to restore system backup.
  • If you buy a new computer, you can use "Dissimilar Hardware Restore" using bootable media.
  • If you just want to restore individual files or folders, you can mount the system backup as virtual partitions with "Explore Image".
  • If you are a system admin or service provider who manage and maintain a large batch of computers, AOMEI Image Deploy enables you to restore system image to multiple computers simultaneously over network.

The Overview of AOMEI Backupper 

To avoid data loss or recover crashed system, you need to make images of them before accidents happen in your daily life. Thus, once bad things occur, you can make complements and restore both system and data back immediately without any loss.
  • Backup and restore files/folders, system, partitions and disks
  • Clone your system, hard drive and partition/volume
  • Support incremental backup, differential backup and schedule backup
  • Support multiple languages: English, French, German, Japanese, Chinese, Chinese Traditional.
  • NEW:Support to choose a network mapped drive as the destination, and simultaneously choose multiple files on the network drive as the backup source.

►Supported Items:
-Operating Systems
Windows 10/8.1/8/7/XP/Vista

-File Systems
NTFS, FAT32, FAT16, EXT2, EXT3 and other file systems

-Supported Storage Devices
Internal hard disks, External hard disks, Solid-state drive (SSD), USB flash drives, Thumb Drives, Network-attached storage (NAS), Hardware RAID, Dynamic Disk & Virtual machine system, etc.