What is a Salami Attack?

Aj Maurya. An Engineer.

What is a Salami Attack?

A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type of cyber crime. It also known as salami slicing. Although salami slicing is often used to carry out illegal activities, it is only a strategy for gaining an advantage over time by accumulating it in small increments, so it can be used in perfectly legal ways as well .The attacker uses an online database to seize the information of customers that is bank/credit card details deducting very little amounts from every account over a period of time. The customers remain unaware of the slicing and hence no complaint is launched thus keeping the hacker away from detection.

View original post 373 more words

Owning mistakes carries a lot of weight. Kudos for transparency to Gitlab

It was a normal day for me, I reached at my work place and started working, As part of our job we put all our project code backups on Git.
We use Gitlab and Source tree to push our codes on Git.

As soon i tried to push my code it encountered an Internal Server Error. This error never encountered to me. So just for curiosity i went on the  Gitlab website to see whats wrong.

The website was down and it had a message saying

GitLab.com is currently offline due to issues with our production database.

We’re working hard to resolve the problem quickly. Follow GitLabStatus for the latest updates.

down

Continue reading

Guess What Facebook Can See Inside Your Photographs

Facebook uses image recognition technology to accurately determine the content of your photographs. You can view these machine generated captions to know how Facebook sees your own photographs.

 

When you upload any photograph to your Facebook account, they look at the actual content of the photograph and try to determine what objects and scenes are inside the image. You may not have added any description, yet Facebook can determine what that picture is all about.

Continue reading

How to unlock an iPhone Passcode?

Follow these simple steps and you are good to go.

  1. Go to icloud.com/find
  2. If Prompted, sign in with your iCloud Apple ID
  3. Click ALL Devices at the top of your browser window.
  4. Select the device you want to erase.
  5. Click “Erase [device]” to erase your device and its passcode.
  6. Use the setup Assistant on your device to restore the most recent backup.

Look to hear from you in Comments..

Android Vs iOS – Which is more secure.

Most of the applications in our Smartphone like Snapchat , Flipkart, Facebook are manually downloaded by us.

Prior to their installation such apps always demand certain kind of permissions.

  • Access to Messages
  • GPS Location
  • Contacts
  • Call details
  • Photos
  • Videos
  • And many more

Continue reading

Mozilla Firefox

Firefox Turns Black …

What a difference a decade makes. This week, the Firefox web browser turned 10. That anniversary, though, marked something more than the birth of a web browser. It marked a push by Mozilla to try to keep the web open. In this blog post, Mozilla’s CEO Chris Beard reflects on where Mozilla and Firefox have been, and where they’re going.

Elsewhere on the web, Mozilla’s Mitchell Baker writes at re/code about Mozilla and Firefox’s work to create an open internet. And Mashable  has put together a timeline with fun facts and notable accomplishments.

Check Out The Developer Version It’s Kickass