#Technology |
- How to write a bug report
- Hacker search engine Shodan is the Scariest Search Engine on Internet
- Samsung Launches Samsung Pay Which May beat Android Pay to market
- Kali Linux Commands
- Chennai Bloggers ShoutMeet – My Experience
- Clash of clans mod apk v7.156.10 september 2015 Unlimited Gems Gold Elixr
- Malicious text messages can hack android phones
- How to report bug ?
- Moto X play review
- IDS,Firewalls & Honeypots
Posted: 19 Sep 2015 08:43 AM PDT How to write a bug report !!!1) Report the problem immediately: Well If you found any 2) Reproduce the bug three/four times before writing a bug report: Your bugs should always be reproducible. Make sure your steps are most robust enough to
3) Test the same bugs occurrence on other similar module Sometimes developer use same code for different similar modules. So 4) Write a good bugs summary for Bug reports
5) Read bugs report before hitting Submit button Read all sentences, wording, steps used in bug reports. See if any 6) Do not use Abusive languages on bug report It is nice that you did a good work and found a bug but do not use this Conclusion No doubt that your bugs report should be a high quality documents. Focus For better productivity write a better bug report The post How to write a bug report appeared first on Madhnw0rm. | ||
Hacker search engine Shodan is the Scariest Search Engine on Internet Posted: 18 Sep 2015 12:16 AM PDT Shodan is the Scariest Search Engine on Internet Shodan also allows users to filter their searches based on a range of criteria such as location, IP address and even searches which identify those devices with little or no security settings. Shodan, named after the main antagonist of the cyberpunk-horror video game System Shock, has been called the “scariest search engine on the internet” but has said his pet project is about highlighting the problem, not allowing people to take advantage of it. Shodan is more of a prying eye across the world through the IoT rather than just a simple search engine Shodan is living up to his name. Already designated as 'world's scariest search engine', it is commonly called the hacker search engine.
The post Hacker search engine Shodan is the Scariest Search Engine on Internet appeared first on Madhnw0rm. | ||
Samsung Launches Samsung Pay Which May beat Android Pay to market Posted: 16 Sep 2015 11:13 PM PDT Samsung Launches Samsung Pay Which May beat Android Pay to market Coming to new S6 EDGE+, Galaxy Note 5 , along with Galaxy S6 and S6 Edge Samsung Pay is expected to be available in the US on September 28 and will come bundled with the Galaxy S6 Edge+ and the Galaxy Note 5; it will also be downloadable to two older but-still-new Galaxy devices: the S6 and S6 Edge Samsung Pay seems to have going for it is its ability to send payment information over MST (Magnetic Secure Transmission), a technology that predates NFC and is supported by a much larger subset of older card readers. This could potentially boost Samsung Pay's acceptance rate, since it could be used in places without the NFC-equipped readers required for Android Pay to work. Samsung's presentation highlighted the universal acceptability of Samsung Pay (leaning on MST). The company also claims that it's the first mobile payment solution to come to market with support for store-branded credit cards, store membership cards, and gift cards. Card information is protected with Samsung's “KNOX” technology (the same tech Samsung has been toying with for dual-role work/home devices for years) and is accessed with a fingerprint scan Simple Steps to Pay
Samsung Pay is accepted virtually anywhere you can swipe or tap your card.* Samsung Pay makes transactions super easy — Swipe. Secure. Hover. Pay. And it's safe; your purchases remain yours alone; Samsung Pay doesn't store or share your payment information, so you can pay without worry. *Only compatible with select cards and Samsung devices; check back soon for compatibility list. The post Samsung Launches Samsung Pay Which May beat Android Pay to market appeared first on Madhnw0rm. | ||
Posted: 16 Sep 2015 10:17 PM PDT Kali Linux (Formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.
All commands (A-Z) for Kali Linux here: A apropos : Search Help manual pages (man -k) apt-get : Search for and install software packages (Debian/Ubuntu) aptitude : Search for and install software packages (Debian/Ubuntu) aspell : Spell Checker awk : Find and Replace text, database sort/validate/index B basename : Strip directory and suffix from filenames bash : GNU Bourne-Again SHell bc : Arbitrary precision calculator language bg : Send to background break : Exit from a loop builtin : Run a shell builtin bzip2 : Compress or decompress named file(s) C cal : Display a calendar case : Conditionally perform a command cat : Concatenate and print (display) the content of files cd : Change Directory cfdisk : Partition table manipulator for Linux chgrp : Change group ownership chmod : Change access permissions chown : Change file owner and group chroot : Run a command with a different root directory chkconfig : System services (runlevel) cksum : Print CRC checksum and byte counts clear : Clear terminal screen cmp : Compare two files comm : Compare two sorted files line by line command : Run a command – ignoring shell functions • continue : Resume the next iteration of a loop • cp : Copy one or more files to another location cron : Daemon to execute scheduled commands crontab : Schedule a command to run at a later time csplit : Split a file into context-determined pieces cut : Divide a file into several parts D date : Display or change the date & time dc : Desk Calculator dd : Convert and copy a file, write disk headers, boot records ddrescue : Data recovery tool declare : Declare variables and give them attributes • df : Display free disk space diff : Display the differences between two files diff3 : Show differences among three files dig : DNS lookup dir : Briefly list directory contents dircolors : Colour setup for `ls' dirname : Convert a full pathname to just a path dirs : Display list of remembered directories dmesg : Print kernel & driver messages du : Estimate file space usage E echo : Display message on screen • egrep : Search file(s) for lines that match an extended expression eject : Eject removable media enable : Enable and disable builtin shell commands • env : Environment variables ethtool : Ethernet card settings eval : Evaluate several commands/arguments exec : Execute a command exit : Exit the shell expect : Automate arbitrary applications accessed over a terminal expand : Convert tabs to spaces export : Set an environment variable expr : Evaluate expressions F false : Do nothing, unsuccessfully fdformat : Low-level format a floppy disk fdisk : Partition table manipulator for Linux fg : Send job to foreground fgrep : Search file(s) for lines that match a fixed string file : Determine file type find : Search for files that meet a desired criteria fmt : Reformat paragraph text fold : Wrap text to fit a specified width. for : Expand words, and execute commands format : Format disks or tapes free : Display memory usage fsck : File system consistency check and repair ftp : File Transfer Protocol function : Define Function Macros fuser : Identify/kill the process that is accessing a file G gawk : Find and Replace text within file(s) getopts : Parse positional parameters grep : Search file(s) for lines that match a given pattern groupadd : Add a user security group groupdel : Delete a group groupmod : Modify a group groups : Print group names a user is in gzip : Compress or decompress named file(s) H hash : Remember the full pathname of a name argument head : Output the first part of file(s) help : Display help for a built-in command history : Command History hostname : Print or set system name I iconv : Convert the character set of a file id : Print user and group id's if : Conditionally perform a command ifconfig : Configure a network interface ifdown : Stop a network interface ifup : Start a network interface up import : Capture an X server screen and save the image to file install : Copy files and set attributes J jobs : List active jobs join : Join lines on a common field K kill : Stop a process from running killall : Kill processes by name L less : Display output one screen at a time let : Perform arithmetic on shell variables ln : Create a symbolic link to a file local : Create variables locate : Find files logname : Print current login name logout : Exit a login shell look : Display lines beginning with a given string lpc : Line printer control program lpr : Off line print lprint : Print a file lprintd : Abort a print job lprintq : List the print queue lprm : Remove jobs from the print queue ls : List information about file(s) lsof : List open files M make : Recompile a group of programs man : Help manual mkdir : Create new folder(s) mkfifo : Make FIFOs (named pipes) mkisofs : Create an hybrid ISO9660/JOLIET/HFS filesystem mknod : Make block or character special files more : Display output one screen at a time mount : Mount a file system mtools : Manipulate MS-DOS files mtr : Network diagnostics (traceroute/ping) mv : Move or rename files or directories mmv : Mass Move and rename (files) N netstat : Networking information nice Set : the priority of a command or job nl Number : lines and write files nohup : Run a command immune to hangups notify-send : Send desktop notifications nslookup : Query Internet name servers interactively O open : Open a file in its default application op : Operator access P passwd : Modify a user password paste : Merge lines of files pathchk : Check file name portability ping : Test a network connection pkill : Stop processes from running popd : Restore the previous value of the current directory pr : Prepare files for printing printcap : Printer capability database printenv : Print environment variables printf : Format and print data • ps : Process status pushd : Save and then change the current directory pwd : Print Working Directory Q quota : Display disk usage and limits quotacheck : Scan a file system for disk usage quotactl : Set disk quotas R ram : ram disk device rcp : Copy files between two machines read : Read a line from standard input readarray : Read from stdin into an array variable readonly : Mark variables/functions as readonly reboot : Reboot the system rename : Rename files renice : Alter priority of running processes remsync : Synchronize remote files via email return : Exit a shell function rev : Reverse lines of a file rm : Remove files rmdir : Remove folder(s) rsync : Remote file copy (Synchronize file trees) S screen : Multiplex terminal, run remote shells via ssh scp : Secure copy (remote file copy) sdiff : Merge two files interactively sed : Stream Editor select : Accept keyboard input seq : Print numeric sequences set: Manipulate shell variables and functions sftp : Secure File Transfer Program shift : Shift positional parameters shopt : Shell Options shutdown : Shutdown or restart linux sleep : Delay for a specified time slocate : Find files sort : Sort text files source : Run commands from a file `.' split : Split a file into fixed-size pieces ssh : Secure Shell client (remote login program) strace : Trace system calls and signals su : Substitute user identity sudo : Execute a command as another user sum : Print a checksum for a file suspend : Suspend execution of this shell symlink : Make a new name for a file sync : Synchronize data on disk with memory T tail : Output the last part of file tar : Tape Archiver tee : Redirect output to multiple files test : Evaluate a conditional expression time : Measure Program running time times : User and system times touch : Change file timestamps top : List processes running on the system trace route : Trace Route to Host trap : Run a command when a signal is set tr : Translate, squeeze, and/or delete characters true : Do nothing, successfully tsort : Topological sort tty : Print file name of terminal on stdin type : Describe a command U ulimit : Limit user resources umask : Users file creation mask umount : Unmount a device unalias : Remove an alias uname : Print system information unexpand : Convert spaces to tabs uniq : Uniquify files units : Convert units from one scale to another unset : Remove variable or function names unshar : Unpack shell archive scripts until : Execute commands (until error) uptime : Show uptime useradd : Create new user account userdel : Delete a user account usermod : Modify user account users : List users currently logged in uuencode : Encode a binary file uudecode : Decode a file created by uuencode V v : Verbosely list directory contents (`ls -l -b') vdir : Verbosely list directory contents (`ls -l -b') vi : Text Editor vmstat : Report virtual memory statistics W wait : Wait for a process to complete watch : Execute/display a program periodically wc : Print byte, word, and line counts whereis : Search the user's $path, man pages and source files for a program which : Search the user's $path for a program file while : Execute commands who : Print all usernames currently logged in whoami : Print the current user id and name (`id -un') wget : Retrieve web pages or files via HTTP, HTTPS or FTP write : Send a message to another user x xargs : Execute utility, passing constructed argument list(s) xdg-open : Open a file or URL in the user's preferred application. Run a command script in the current shell ! Run the last command again The post Kali Linux Commands appeared first on Madhnw0rm. | ||
Chennai Bloggers ShoutMeet – My Experience Posted: 16 Sep 2015 09:32 AM PDT Attended the first Blogger meet With Harsh Agarwal #ShoutMeet On 16th September 2015 . I attended an Bloggers meet In Chennai . Called as ShoutMeet . Which is an Initiative by Harsh Agarwal from Shoutmeloud . And in this Intiative .He has travelled around 6400 Kms across India . To Meet Bloggers of Different Cities . And know them . And help them out with their Blogging queries And Met Top #Bloggers ( S.Pradeep Kumar , Nirmala Santha Kumar ) and others bloggers And then we continued with we had many questions about blogging and its Techniques and he answered all of them . We had a lot of Fun . I learned many thing from him about this field .
The post Chennai Bloggers ShoutMeet – My Experience appeared first on Madhnw0rm. | ||
Clash of clans mod apk v7.156.10 september 2015 Unlimited Gems Gold Elixr Posted: 16 Sep 2015 12:02 AM PDT Clash of clans mod apk september 2015 ROOT NEEDED! The application of Clash of Clans Private Server Switcher allows you to connect to Clash of Clans Private Servers. It automatically modifying your hosts file. As well I remember in addition that the status of the server is not updated automatically, so if you try to log on and the game don’t load it may be possible that the server is offline. I’ll try to update the list of servers as much as possible, other information can be found in the relevant section of the app. The list currently contains 10 servers and was created using the information shared by users IMPORTANT NOTES : Requirements: REMEMBER TO LINK THE GAME ON GOOGLE PLAY GAMES TO AVOID YOUR VILLAGE TO BE LOST!
Screenshots :- The post Clash of clans mod apk v7.156.10 september 2015 Unlimited Gems Gold Elixr appeared first on Madhnw0rm. | ||
Malicious text messages can hack android phones Posted: 15 Sep 2015 10:39 PM PDT 900 million android phones can be hjacked by malicious text messages We Know that Almost All Android mobile devices available today are suspectible to hacks that can be execute malicious code when they are sented as an malformed text message or the user is lured to a malicious website, a security researcher reported. A fully weapon ized successful attack could even delete the message before you see it. You will only see the notification. These vulnerabilities are extremely dangerous because they do not require that the victim take any action to be exploited. Unlike spear-phishing, where the victim needs to open a PDF file or a link sent by the attacker, this vulnerability can be triggered while you sleep. Before you wake up, the attacker will remove any signs of the device being compromised and you will continue your day as usual—with a trojan ed phone. Android is designed with a security sandbox that prevents most apps from being able to access data used by other apps. That goes a long way to containing the damage Stage fright and similar code-execution exploits can do. In theory, for instance, it should prevent exploits from sniffing login credentials used by a properly designed banking app. The attacker would have remote arbitrary code execution and thus escaping the sandbox is only a small step away,” Drake said. He said existing root exploits, including those known PingPongRoot, Towelroot, and put_user, would likely help an attacker break free of the sandbox and gain much wider control over a vulnerable device The post Malicious text messages can hack android phones appeared first on Madhnw0rm. | ||
Posted: 15 Sep 2015 08:28 AM PDT WHAT IS A BUG ? If your bug report is effective, chances are higher or more higher that it will get fixed, So fixing a bug is depended on how effectively reporting it Reporting a bug is a not a hobby or a skill ,It will tell you how to achieve our skill on finding bugs on web applications or websites. THE POINT OF WRITING BUG REPORT IS TO GET BUGS FIXED If tester is not reporting bug correctly programmer will most likely reject the bug as irreproducible,This can hurt testers ability and time also. What are the qualities of a good or evil software bug report ? Anyone can write a bug report even script kindle can also write a bug report,But not everyone can write a effective bug report,The average bug report and a good bug report It is simple ,apply techniques and characteristics to report a bug
Always try to assign a unique number to each bug report,This will help to identify the bug record,if you are finding bugs manually ,you have to assign your itself.If you are using any automated bug reporting tool then the unique number will be generated automatically each time you report the bug
Well describe step by step about the bug problem is easy to reproduce and fix,If your bug is not reproducible it will never get fixed,Do not assume or skip any reproducible step.
Do not combine multiple problems even they seem to be similar.Do not write a essay about the problem. Be Specific and to the point. How to Report a Bug To Companies? Use Always Simple Bug report Template : Well This is a simple bug report format, if you are writing bug report manually then some fields should need to specifically mention like bug number which should be assigned manually… For bug reporting use Bug report Tool. Reporter : Your Name and mail address. Product : In which product you found this bug Version : The product version if any Component : These are the major sub modules of the product Platform : Mention the hardware platform where you found this bugs.The Various platforms like Mac,HP,PC,Sun etc… Operating System: Mention all operating systems where you found the bug. operating systems like Linux,Unix,SunOs,Mac os,Windows. Mention the different OS versions also if applicable like windows NT, Windows 2000, Windows XP etc.. Priority : When bug should be fixed ? Priority is generally set from P1 to P5 as fix the bug with highest priority and P5 as Fix when time permits. Severity : This describes the impact of the Bug Types of Severity
Status: When you are logging the bug in any bug tracking system then by default the bug status is new Later on bug goes through various stages like FixedmReopen,Verified,Won’t Fix etc.. Assign to: If you know which developer is responisible for that particular module in which bug occured,else keep it blank this will assign bug to module owner or manager will assign bug to developer,possibly add the manager email address in cc list,then you can specify email address of that developer. URL: The page url on which bug occured Summary: A brief summary of the bug mostly in 80 or below words. Make sure your summary is reflecting what the problem is and where it is. A detailed description of bug, Use following fields for description field: Actual result : What is the actual result on running above steps These are the important steps in bug report, You can also add the report type as one more field which will describe the bug type. The report Types are Typically
The post How to report bug ? appeared first on Madhnw0rm. | ||
Posted: 15 Sep 2015 04:50 AM PDT Motorola is here with another wonderful mid-range smartphone in Moto X series, the Moto X Play. They have launched the product few hours ago into the market through the ecommerce giant Flipkart. The first official sale is going to start this 16/09/2015 mid-night on Flipkart and thanks to Motorola for not bringing up a flash-sale system. This Moto device looks way better than the Moto G3 (3rd generation) and has some exciting features compared to it. Let's take a peek through of specifications of this product and see if it is worthy to buy at the price point.
DESIGN Carved 8.9-10.9mm thinner, with 75mm horizontal width and 148mm length, Moto X Play weighs 169gms i.e., 5.96oz. It feels lighter than some other mid-range phones in the market. It is available in two colors, black & black and while & winter white as for now. STORAGE Moto X Play comes with 16 GB & 32 GB internal memory on board of which user can use only8.2 GB & 23 GB respectively and the rest is occupied by the operating system. Memory can be expanded through microSD card up to 128 GB OPERATING SYSTEM Moto X Play comes with latest Android 5.1.1 Lollipop operating system on board. This helps in conserving the RAM and battery better than the previous 5.0 Lollipop version. Motorola always encourages pure Android experience on their devices and so they would be in the first row to take the upgrades. BATTERY Motorola took the concerns over the battery life seriously with Moto X Play. They've added 3630mAh Li-ion battery that lasts long almost 2 days on moderate usage. The operating system, Lollipop 5.1.1 helps in managing the battery juice well. NETWORK & CONNECTIVITY X Play comes supports 4G LTE SIM in both the slots. It comes with common connectivity features like Bluetooth v4.0, Wi-Fi 802.11 a/g/b/n, 3G HSPA+, micro USB, USB and Wi-Fi Tethering and GPS (A-GPS, GLONASS, BeiDou, with Google Maps). It also have NFC unlike many other mid-range smartphones in the market today. PRICE Moto X Play is announced at the price of 18,499 INR for 16 GB version and 19,999 INR for 32 GB version The post Moto X play review appeared first on Madhnw0rm. | ||
Posted: 15 Sep 2015 02:26 AM PDT IDS,Firewalls & Honeypots Intrusion Detection System An intrusion detection system is a device or software application that monitors network and or system activities for malicious activities or policy violations and produce reports to a management station An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. NIDS is a network security system focusing on the attacks that come from the inside of the network (authorized users). When we classify the designing of the NIDS according to the system interactivity property, there are two types: on-line and off-line NIDS. On-line NIDS deals with the network in real time and it analyses the Ethernet packet and applies it on the some rules to decide if it is an attack or not. Off-line NIDS deals with a stored data and pass it on a some process to decide if it is an attack or not. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPS es for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization Evasion techniques There are a number of techniques which attackers are using, the following are considered 'simple' measures which can be taken to evade IDS:
Insertion Attack
Obfuscating
Session Splicing A technique used to bypass ids where an attacker splits the packets that has no single packet triggers the IDS UNicode Evasion Technique Unicode is a character coding system to support the worldwide interchange processing and display of the written texts Overlapping Fragments An IDS evasion technique is to craft a series of packets with TCP sequence numbers configured to overlap TIME TO LIVE ATTACKS These attacks requires the attacker to have a prior knowledge of the topology of the victim network This Information can be obtained using tools such as trace route which gives information on the number of routes between the attacker and the victim The post IDS,Firewalls & Honeypots appeared first on Madhnw0rm. |
You are subscribed to email updates from Madhnw0rm. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |