Whatsapp my personal storage.

WhatsApp is a flawless informing application for keeping in contact with loved ones. It is super-quick, takes a shot at about all mobile phones (counting desktop PCs).

You have been utilizing WhatsApp essentially for chatting  and calling yet there are a few other uses for WhatsApp that will you can make use of. Other than speaking with the outer world, you can likewise utilize WhatsApp to:

Continue reading

Advertisements

What is a Salami Attack?

Aj Maurya. An Engineer.

What is a Salami Attack?

A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type of cyber crime. It also known as salami slicing. Although salami slicing is often used to carry out illegal activities, it is only a strategy for gaining an advantage over time by accumulating it in small increments, so it can be used in perfectly legal ways as well .The attacker uses an online database to seize the information of customers that is bank/credit card details deducting very little amounts from every account over a period of time. The customers remain unaware of the slicing and hence no complaint is launched thus keeping the hacker away from detection.

View original post 373 more words

Owning mistakes carries a lot of weight. Kudos for transparency to Gitlab

It was a normal day for me, I reached at my work place and started working, As part of our job we put all our project code backups on Git.
We use Gitlab and Source tree to push our codes on Git.

As soon i tried to push my code it encountered an Internal Server Error. This error never encountered to me. So just for curiosity i went on the  Gitlab website to see whats wrong.

The website was down and it had a message saying

GitLab.com is currently offline due to issues with our production database.

We’re working hard to resolve the problem quickly. Follow GitLabStatus for the latest updates.

down

Continue reading

Guess What Facebook Can See Inside Your Photographs

Facebook uses image recognition technology to accurately determine the content of your photographs. You can view these machine generated captions to know how Facebook sees your own photographs.

 

When you upload any photograph to your Facebook account, they look at the actual content of the photograph and try to determine what objects and scenes are inside the image. You may not have added any description, yet Facebook can determine what that picture is all about.

Continue reading

How to unlock an iPhone Passcode?

Follow these simple steps and you are good to go.

  1. Go to icloud.com/find
  2. If Prompted, sign in with your iCloud Apple ID
  3. Click ALL Devices at the top of your browser window.
  4. Select the device you want to erase.
  5. Click “Erase [device]” to erase your device and its passcode.
  6. Use the setup Assistant on your device to restore the most recent backup.

Look to hear from you in Comments..

Android Vs iOS – Which is more secure.

Most of the applications in our Smartphone like Snapchat , Flipkart, Facebook are manually downloaded by us.

Prior to their installation such apps always demand certain kind of permissions.

  • Access to Messages
  • GPS Location
  • Contacts
  • Call details
  • Photos
  • Videos
  • And many more

Continue reading