Saturday, October 19, 2013

As stated on edudemic.com, we bring to you here the 25 best online websites that can assist you in strengthening your fundamentals in Computer Science. Looking at them below:-

1. MIT OpenCourseWare: This has the widest collection of open courseware along with a number of offerings in computer science from some of the pioneers in the field.

2. Stanford Engineering Everywhere: You can opt for online courses in basic computer science, artificial intelligence, linear systems along with other engineering topics here.

3. Academic Earth: This site has over 12 free lectures on computer science from renowned colleges like Stanford, MIT, and Berkeley.

4. MIT World: This site offers lectures, conferences, and demonstrations on a wide range of topics, including computer science.

5. Harvard Extension School: This provides access to some of the free Ivy League educational resources collecting course materials from a host of different computer science courses having been held over the past years.

6. UC Berkeley Engineering: You can look into UC Berkeley’s iTunesU archive for an amazing collection of computer science and engineering lectures.

7. The Open University: This is a great place to search for free educational resources on any topic with a good amount of computer science material too.

8. UC Irvine: By using UC Irvine’s online resources, you can get intro to AI, Machine Learning, Kernel-Based Learning, or Bayesian Statistical Analysis.

9. w3schools : The site has tutorials to learn HTML, CSS, AJAX, and a number of other programming languages.

10. Wikibooks: This site helps you in supplementing any of the courses undertaken by you for free online with the help of textbooks from Wikibooks.

11. Google Code University: This has a host of resources to assist computer science students with courses on programming, web security, algorithms, and a lot more.

12. ArsDigita: This is based on the undergrad computer science program at MIT and offers good courses worth checking out.

13. Grinnell College: You can find a number of computer science classes taught at Grinnell between 1997 and to date over here.

14. Codeacademy : For assistance in learning a coding language, you can check out this site for guidance to make everything easier.

15. Swinburne University of Technology: This is an Australian school offering free courses on topics including HTML, web graphics, higher level math, Java, and much more.

16. iTunesU: You can search for computer science for locating over hundreds of lectures on the subject to opt from.

17. UMass Boston: For acquiring skills about artificial intelligence, one can go to UMass-Boston’s OCW site for free course materials.

18. Udacity: This was started by a professor at Stanford and is an essential resource for any CS student offering courses in cryptography, web application engineering, computer program design, programming languages, including programming robotic cars.

19. Caltech: You can get sample what computer science classes are like over here tuition-free, for a limited time. 

20. Sofia: On this site you can opt for a course in Java programming, Macromedia Flash, statistics, network security, or webpage authoring.

21. Carnegie Mellon OpenLearning Initiative: At this time, it only offers a few CS-related courses, but plan to add more over the years.

22. University of Notre Dame OCW: The two notable courses in computer science here are Applied Multimedia Technology and Applied Multimedia.

23. Saylor.org: This is an introductory course in computer science utilizing great free resources on the site.

24. Khan Academy: This site offers a number of courses covering topics like Fibonacci functions, Python programming, and binary numbers.

25. Higher Computing for Everyone: The site offers a course in writing basic programs. It is a great introduction for anybody entering programming. 

Friday, October 18, 2013

Work online for money

The Internet is full of bogus companies that promise to pay you for work but never will. For instance, all places that offer money to fill surveys or those that require payment up front are scammers. Two popular and reliable places to find work are www. odesk.com and www.elance.com.

Both have a similar system: set up a profile and take tests to prove your proficiency in certain areas. Once done, you'll be listed as a contractor/freelancer and people can hire you for an hourly rate. You can get paid more by working hard, getting better at what you do and getting good feedback (ratings) from your clients.

Thursday, October 17, 2013

10 Greatest Open Source Big Data Tools   
 
We bring to you some of the best data tools in the expanding Hadoop ecosystem.  
Rate this news:   (0 Votes)
Thursday, October 17, 2013:  MapReduce was rolled out to cater to the limitations of traditional databases. Tools including Giraph, Hama, and Impala catered to the limitations of MapReduce running on Hadoop. Apart from these, graph, document, column, and other NoSQL databases may also be part of the mix. The options are expanding faster than you think. Here’s looking at them in detail.
Data tools, Open source, MapReduce, Databases, Giraph, Apache Hadoop, Apache Sqoop,  Apache Hama, Cloudera Impala, Apache Drill.




1. Apache Hadoop – As cited on infoworld.com, Hadoop refers to the MapReduce framework with the project having important tools for data storage and processing. There are not a lot of Apache projects that can support even one heavily capitalized startup whereas Hadoop can support many. It is estimated by analysts that the market for Hadoop will be worth tens of billions per year.

2. Apache Sqoop - This enables quick data transfers from relational database systems to Hadoop through concurrent connections, customizable mapping of data types, and metadata propagation. It allows you to import to HDFS, Hive, and HBase. It also exports results back to relational databases. It takes care of all the complexities present in the use of data connectors and mismatched data formats.

3. Talend Open Studio for Big Data – This allows you to load files into Hadoop without the use of manual coding. The graphical IDE produces native Hadoop code that makes use of Hadoop's distributed environment for data transformations on a large scale.

4. Apache Giraph – This is a graph processing system designed for high scalability and high availability. It is the open source equivalent of Google’s Pregal and is used by Facebook for analyzing social graphs of users and their connections. The system blocks the problem of using MapReduce to process graphs by implementing Pregel's efficient Bulk Synchronous Parallel processing model.

5. Apache Hama – This is very much like Giraph and brings Bulk Synchronous Parallel processing to the Hadoop ecosystem and runs on top of the Hadoop Distributed File System. But where Giraph is focused exclusively on graph processing, Hama is a generalized framework for performing massive matrix and graph computations.

6. Cloudera Impala - The Impala engine is situated atop all the data nodes in your Hadoop cluster keeping an ear out for queries. Post parsing of each query and optimization of an execution plan, it coordinates parallel processing between the worker nodes in the cluster resulting in a low-latency SQL queries across Hadoop with near-real-time view into big data. As Impala can be accessed from any ODBC/JDBC source, it is a good companion for BI packages like Pentaho.

7. Serengeti – This allows you to spin up Hadoop clusters in a dynamic manner on a shared server infrastructure. It leverages the Apache Hadoop Virtualization Extensions that is created and contributed by VMware which makes Hadoop ready for virtualization. You can use this tool to deploy Hadoop cluster environments quickly without giving away configuration options like node placement, HA status, or job scheduling.

8. Apache Drill – This is created for low-latency interactive analysis of big data sets. It supports multiple data sources, including HBase, Cassandra, and MongoDB along with traditional relational databases. Using Hadoop, you can obtain huge data throughput.

9. Gephi – This has been made by a consortium of academics, corporations, and individuals. It is a visualization and exploration tool supporting many graph types and networks that are as big as huge as one million nodes.

10. Neo4j – This is a quick and very-fast graph database that can be used in many ways which include social applications, recommendation engines, fraud detection, resource authorization, and data center network management. This has made steady progress accompanied with performance improvements and better clustering/HA support. 

Monday, October 14, 2013

12 Steps To Become A Hacker!   
 
Here we bring to you 12 steps to become a hacker, together with all the books, tutorials and resources that you need to learn in the process. So pack your bags and get set for the journey!  
Rate this news:   (0 Votes)
Monday, October 14, 2013:  Hacking is a fascinating field but it definitely isn't easy. Here we have listed 12 of the most important steps essential to become a hacker, together with all the resources that you need for learning.

Here we focus on the skills and attitude needed to become a hacker. Breaking the security system and entering into the system is not the only thing a hacker does. One requires knowledge of a wide variety of subjects and in depth knowledge of programming languages and operating systems. And needless to say, learning is essential in the journey...
hacking, learn hacking, Unix, Linux, cryptography, books on hacking, tutorials on hacking, how to become a hacker




Here are the 12 steps:

It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading thehacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude.

Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.

The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and we do not recommend you to get involved into such activities.

Step 1: Learn To Program In C

C programming is one of the most powerful languages in computer programming. It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.

Here are 35 ebooks on C programming

Step 2: Learn More Than One Programming Language

When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.

Here are 32 free ebooks on JAVA
Here are 24 free ebooks on Perl
Here are 21 free ebooks on PHP
Here are 50 free ebooks on Python

Step 3: Learn UNIX

UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.

Here are 33 free ebooks on UNIX

Step 4: Learn More Than One Operating Systems

There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence, it is good to learn hacking Microsoft systems, which are closed-source systems.

According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.

Windows OS installers are distributed in binary, therefore, it is not easy for you to read the code. Binary code is basically the digital representation of text and data that computer understands. However, knowing how programs are written for Windows and how different applications behave on this operating system will help.

One of the recent vulnerabilities of a popular OS was that Java Web Start applications get launched automatically even if the Java plug-ins are disabled. How to be a hacker is about knowing the weaknesses of these operating systems and targeting them systematically.

Step 5: Learn Networking Concepts

The networking concept needs to be sharp when you want to be a hacker.

Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.

Understand what is subnet, LAN, WAN and VPN.

The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it.

Apache Httpd is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other application layer protocol related endeavors.

Also Nmap is a powerful network scanning tool that is used by hackers and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics.

Step 6: Start Simple: Go Through Tutorials About Hacking

This is the simple and best way to start. Read as many tutorials as possible that are meant for hacking. These articles will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet; Both text and video tutorials are available for you to answer your question how to be a hacker.

Here are some of the video tutorials
Here are some of the text tutorials

Step 7: Learn Cryptography

As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption.

Understand various techniques used for password cracking. There are dozens of tools available to do password cracking, and using it is not hacking. To be expert at hacking its important for you to understand how to create a program that can crack a password from cypher text.

Here are 20 free ebooks on Cryptography

Step 8: Experiment A Lot

This is an important step for setting yourself up as an expert hacker. Setup a laboratory on your own to experiment the learning on the practical applications. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.

It is good to try experimenting on your own computers, where you can rectify if you have done any mistake. Many hackers initially start off by downloading virtual lab applications such as Oracle VirtualBox. You require at least 3 GBs of RAM and a comparatively powerful processor to carry out your hacking experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, applications and different servers without affecting your own PC.

Some of the things you may need to keep in mind when doing experiments

- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks

Step 9: Read Some Good Books From Experts

Reading will always enhance your knowledge. Try to read as many books and articles as possible written by the experts in the field field of ethical hacking and enterprise security

Reading a lot about anything related is so important in the world of hacking that you must also consider enhancing your reading speed. If your reading speed is slow, then you may not be able to progress fast in this field. Practice speed reading techniques like skimming, chunk reading etc.

When it comes to reading a lot, it's also important to know that a majority of content on web is not worth your time. Many people use search engine tricks to attract traffic but have little value in it. If you skim through an article within seconds and decide not to read that is going to save you a lot of time for some really well researched content.

Step 10: Go Next Level: Write Vulnerability

Vulnerability of a program is the weakness of the program. It is a good approach to look for the vulnerability of an existing program and share the same with others. In this way you will have the option to collect varied opinions from different sources, enabling you to hone your current skill set.

The examples of computer vulnerabilities include memory safety violation, input validation error, privilege confusion bugs and user interface failure. For instance, Microsoft’s Internet Explorer 11 had the vulnerability bug in its preview version which several hackers exploited.

Identifying a new weakness in any software is the real work any expert hackers would perform.

Step 11: Contribute To Open Source Security Projects

Contributing to an open-source computer security project is a great platform to test your skills. This is not everyone’s cup of tea. Many organizations like Mozilla and Apache offer these types of open source projects. Try to be a part of these projects and add a valuable contribution to the benefit of the community.

Participating in the open source security projects such as anti-spam, anti-virus, firewall and data removals help you augment your dexterity as a hacker. Contribute your vulnerability findings to the global vulnerability databases and give back to the community.

Remember that it does not matter if your contribution is small, as long as you participate and add value it helps.

Step 12: Continue Learning And Keep Listening To Security Talks

The key to success in the hacking career is continuous learning. Reading blogs for hacking available at sites such as hackerfactor blog and IKEA hacker blog; participating in the forums such as hackforums.net and elite hack are great ways to refresh your knowledge as a hacker. The online video forums like TED or TechTalk are good sources to know more about the emergent hacking techniques and technologies that are being deployed. You should also try following the posts of famous hackers such as Adrian Lamo, Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.

Friday, October 11, 2013

If You Want to Code

The best open source contributors are also open source users. When you are already familiar with a program, you are in the best position to develop new ideas and fix existing bugs. Once you've chosen an open source application you want to contribute code toward:

- Get to know the source. Take time to read through the existing source code so you can communicate coherently about the project.

- Develop a patch. Identify a small bug or feature that you feel could enhance the software, and develop the code to do it. You will want to package your code into a "patch" that others can download and incorporate into the project.

- The precise steps for creating a patch will differ depending how the project source code is managed.

- Submit your patch. Some open source projects will have a formal process for submitting projects, but others may not. If the website for the project does not describe a clear process, you should open a dialogue with the community around that project.

- Look for a message board or IRC group where people discuss the project. Here you can describe your patch and the motivation behind it, and hopefully receive a receptive audience. If the project is small enough to be run by one person, you may need to e-mail them directly.

- Starting with small patches, you will become a more trusted contributor to the project community and work up to larger code contributions.

Tuesday, October 8, 2013

8 Simplest Sources To Hunt Open Source Software   
 
Searching for that perfect open source project? Here's where to look..  
Rate this news:   (0 Votes)
Wednesday, October 09, 2013:  A will to use, participate in, and contribute to free and open source software is a great thought, but wondering where to find the best software? Well, here's a sorted list of the websites that have everything you need to find for the perfect open source project.
Linux, Open source, Open Source Software, software source, source code, open source project, open source game




End-User Friendly

Just like proprietary software, open source software is written for many different audiences and uses. These three resources have a little something for everyone.

1. SourceForge: Broken down into categories like "Audio & Video," "Home & Education," and "Security & Engineering," SourceForge is one of the oldest and most complete free and open source software lists. It's also a great place to get started.

2. Open Source Software Directory: Boasting more than 1,000 applications, this directory divides software up by its intended audience rather than by the job it does. That can make browsing projects easier when you don't have anything specific that you're looking for.

3. Open Source Alternative: OSAlt.com's tagline reads, "open source as alternative," and that's exactly what makes this website unique. Search for proprietary software that you use, and OSAlt.com will tell you the equivalent open source project.

Fun and Games

Computers are for work, problem solving, and other serious things...except when they're not. If you're looking for some lighthearted entertainment, these directories have the open source games, puzzles, and fun that you need.

4. Open Source Arcade: The more technically-minded will appreciate the ability to search games by development platform while everybody will appreciate the sheer number of entries listed here. But, don't be intimidated by having to search by programming language. Spend a little time with this site, and these games will have you bouncing, bowling, and blasting your troubles away in no time.

5. LinuxGames: While not specifically a download directory like the other resources on this list, sometimes you need to know what's out there to know what you want. This website will point you to the hottest new games and make sure you know what's going on in the Linux gaming world.

Developer Central

Although these three websites aren't aimed solely at software developers, they tend to lean that way. From programming language libraries to tools for programmers, these projects are a great place to look if you're interested in contributing code to a free and open source software project.

6. GitHub: Part software repository, part social network for open source developers, this website uses the popular version control system, Git, to make global sharing of and collaborating on free and open source projects easier than ever before.

7. The Free Software Directory: Compiled by the Free Software Foundation (FSF) itself, over 6,500 entries make up this extensive directory. Licenses are the focus here. Rest assured that everything you find on this directory grants you every liberty you'd expect from free software.

8. Freecode: Need a thread caching library or a way to manage zfs filesystem replication? Freecode is your place. Organized by date, popularity, and tag, this website calls itself the "Web's largest index of Linux, Unix and cross-platform software, and mobile applications."

Monday, October 7, 2013

I. What is STEALTH DNS or SPLIT-BRAIN DNS?
Split-brain DNS is a configuration method that enables proper resolution of names (e.g., www.hackinsight.org) from both inside and outside of your local network. In this architecture we keep the external clients requests away from our secured internal DNS servers. For external clients (like company employee working from home or some different public location) we host a External DNS in the DMZ Network which will reply to all queries coming from public network. For Internal clients we have a DNS server in the Private network. This DNS server will be responsible for all the queries coming from internal clients.
II. So what we need to configure a Split-Brain DNS Infrastructure?
1) A Private Network: Keep all internal clients, A DNS Server with all Private IP host records for resources, Database Servers etc in this Private Network. DNS in this network is responsible for all internal clients query.
2) A DMZ Network: This is an internet facing network, which is between 2 firewalls, 1 facing internet other one facing internal secured network. In this DMZ we usually keep all our Web servers. Here you have to implement a DMZ DNS Server which will contain all Public IP host records for resources. This DNS is responsible to handle all external clients query.
III. Let's take a secnario!
When I come to office I am connected to my companies private network. Whenever I query for www.hackinsight.org, the Internal DNS server will respond back with the web servers private IP address and later I reach web server with the information and get my desired web page.
When I logout and login from home (a public network) and query forwww.hackinsight.org, the query is responded back by the External DNS Server with web server Public IP information and then I get the desired web page.
IV. What did we achieve?
~In the above scenario, we kept our Internal DNS server information hidden from external clients and responded back with Public IP information. We achieved Security goals.
~Also, we are dividing the name resolution load for external and internal users between external and Internal DNS servers. We achieved fast name resolution goals.
--
~Enjoy! 
This Is How You Can Create Your Customised Version Of Android  
 
You can run stock Android, and then create the ideal OS for using the Xposed Framework and its modules. Here's what you'll require...  
Rate this news:   (0 Votes)
Monday, October 07, 2013:  If you really want to customise your Android experience, you have to root your phone and sport a new ROM – actually a completely new version of Android – with all the features you want. In case, you don’t want to go that far, or you only want to make changes in certain parts of Android, you have an option: It's called the Xposed Framework. This option can be used to customize your phone from top to bottom, that too without flashing a new ROM.
Android, customize android, Xposed Framework. ROM, , Xposed's modules, Xposed Framework, XDA Developer Forums, XHaloFloatingWindow




Getting started: Rather than installing apps to get required features, or flashing a ROM, Xposed's modules give user the power to customize your device-- and the apps.

Imagine it: You can run stock Android, and then create the ideal OS for you using the Xposed Framework and its modules. Here's what you'll require:

- The recent version of the Xposed Framework
- A rooted Android phone running Android 4.0 (Ice Cream Sandwich) or advanced is all you need.

How to Install the Xposed Framework and Modules 
Make sure to back up your phone before doing anything else. Next, head over to the Xposed Framework thread at the XDA Developer Forums. The recent version of the Xposed Installer is posted there, and since Xposed isn't accessible at Google Play, you'll require to sideload it.

It is possible to visit on your phone directly, or download the APK (application file) and add to Dropbox or another storage service that you can access on your phone.
* Open the Xposed Installer APK on your phone, and install it.
* Launch the Xposed Installer, then tap "Framework."
* Tap "Install/Update."
* After the actual framework is installed, reboot your device.

When it comes back up, the framework will be active!

To install a module:
* Download and launch its APK file on your device (you can also install it directly from the Play Store).
* Open the Xposed Installer and tap "Modules."
* Check the checkbox displayed next to each module that needs to be enabled.
* Reboot your device.
* If your device fits the criteria, it would be quick and simple to install the framework and add modules, plus you get a customization options out of it.

Seven useful Xposed modules to try 

After you have the Xposed Framework installed, you must give a few modules a try. Modules can provide an unbelievable degree of control on your device.

Remember, modules are like apps: They're independently supported by the developer who wrote them, so you should ensure the developer is accessible if you have problems, specifically related to a module. Listed below are our favorites you can install to get started:

Wanam Xposed is a module that provides several visual tweaks and feature updates. If you are looking for visual controls, Wanam Xposed features a full color wheel to change the colors of system text across all apps or status bar text.

XHaloFloatingWindow brings Paranoid Android's Halo to any phone 

Halo pop-up is a floating launcher that can be used to jump across apps, to open contacts, or open settings, no matter what app you're in. XHaloFloatingWindow provides functionality to any device, as long as you have the Xposed Framework installed.

MoDaCo toolkit unlocks location-restricted apps

The MoDaCo Toolkit features all-in-one tweaking toolkit with a ton of options and tweaks you can play with, but it's also designed with some special tweaks for the HTC One such as you can use its option to make your status bar transparent, enable ADB with a safe lock screen etc.

Flashify makes backups a snap

On installation, Flashify can make boot and recovery images without the need to boot into recovery first. Flashify is free, but if you want to unlock as many as you want, you'll need to pay.

XPrivacy gives you full control over app permissions 

XPrivacy provides you control over all of the permissions each app on your phone needs. If an app seeks location, XPrivacy will provide it resolutely wrong location data. If an app wants access to your contacts list, XPrivacy will give it an empty list.

Tweakbox optimizes your status bar 

Tweakbox is a compilation of hacks and customization options that allows you customize the status bar indicator, change the status bar background colour and appearance. It also incorporates some more goodies such as vibrating when there's a call waiting.

XBlast tools gives your phone a personal touch

XBlast is a compilation of personalisation tools that mostly allow you control the way you interact with your device and how it looks and operates. It is possible to customize the clock size and text, add flavour text to the lock screen or the status bar. You can even add your own fonts for other apps to use and make the notifications bar transparent. 
Monday, October 07, 2013:  Are you an aspiring hacker who wants to get as much info on hacking from online free ebooks as possible but doesn’t know where to get them? We bring you a list of 25 great e-books on hacking with links for their free downloads. Happy reading!
Hacking, ethical hacking, learn hacking, hacking tips, hacking tricks, hacking tips and tricks, Ethical Hacking, Ethical hackers, E-books, Free E-Books




1. Black Book of Viruses and Hacking : In print for over five years, the book opens a door to answering questions on whether or not it is better to make technical information about computer viruses known or not.

2. The Beginner’s Guide To Hacking Computers Systems : This is a great book for guiding beginners through the basic and advanced steps of hacking. It helps develop user knowledge on various types of hacking including windows, Linux installation & use, Linux hacking, virus programming, malware programming and Trojan programming among other things.

3. Penentration Testing With Backtrack : The book has been written in Packt's Beginner's Guide format and helps the reader gain knowledge of concepts and understand the techniques to perform wireless attacks in your lab.

4. Hacker’s High School : This book is used by over a quarter of a million students every year and is a straightforward, inexpensive quick reference, with content flexible enough to suit the needs of writers in the humanities, social sciences, sciences, health professions, business, fine arts, education, and beyond.

5. Black Belt Hackers And Complete Hacking : The book addresses the fundamental question of what is ethical hacking in its most elementary form and is a great reference book for beginners.

6. Secrets Of Super And Professional Hackers : The book covers hacking scenarios ranging from the merely mischievous to the criminal, the super hacker known as the Knightmare gives step-by-step instructions in meaningful hacking from a personal computer.

7. Dangerous Google Hacking Database and Attacks: The book takes a look into several case studies on dangerous attacks that have been carried out in the past and how these could have been prevented.

8. Internet Advanced Denial of Service (DDOS) Attack : This book sheds light on the complex form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide.

9. Computer Hacking & Malware Attacks for Dummies: This is a book on preventive techniques and examines some great security measures which are present across the world. The great thing is that it has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

10. G-mail Advance Hacking Guides and Tutorials : Another great book on preventive techniques, the book is a lesson on how to secure Gmail, the world’s most used emailing service.

11. Vulnerability Exploit & website Hacking for Dummies : The book has some brilliant insights into Metasploit, and its commercial equivalent CORE IMPACT. It provides the ultimate ethical hacker's pot of gold — a screenshot of a critical server's command prompt.

12. Web App Hacking (Hackers Handbook): This is a highly successful book and now comes with great insights into web applications, which are now the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users.

13. Security Crypting Networks and Hacking: Now in its second edition, the book offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking.

14. Botnets: The Killer Web Application Hacking: The book is based on real world cases of botnet attacks to underscore the need for action and used public domain tools like OurMon.

15. Hacking Attacks and Examples Test: The book is a step by step on how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites.

16. Gray Hat Hacking and Complete Guide to Hacking: This is an insight into thwarting malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws.

17. Advance Hacking Exposed Tutorials: This book works brilliantly for those looking to finding out about how a fail-safe system was cracked and how one can better protect oneself.

18. 501 Website Hacking Secrets: "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook. One needn’t say more.

19. Internet Security Technology and Hacking: The book addresses questions on whether hacking attacks are morally justified? Hacking, Counterhacking, and Society is a valuable addition to the library of anyone concerned with the growing number of Internet security issues and intrusions facing society today.

20. CEH Certified Ethical Hacker Study Guide: The books lets you prepare for the challenging CEH Certified Ethical Hackers exam and provides a full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards and a glossary of key terms.

21. Advanced SQL Injection Hacking and Guide: The book ensures that IT professionals apply security principles in the context of their daily job scope

22. Web Hacking & Penetration Testing: The books serves as an introduction to the steps required to complete a penetration test or perform an ethical hack.

23. OWASP Hacking Tutorials and Web App Protection: The book gives detailing on the different tools for exploitation, about metasploit and armitage.

24. CEH - Hacking Database Secrets and Exploit: This book gets into the latest edition gets into current threats and details the new menace of APT (advanced persistent threats), embedded hacking, database hacking, and significant coverage of mobile devices. 

Sunday, October 6, 2013

1. Tamper Data: This is one of the most used Addons for Pentesters, who traditionally make use of it for viewing and modifying HTTP/HTTPS headers and post parameters, trace and time HTTP response or requests, security test web applications by modifying POST parameters and a lot more. The add-on can be downloaded here

2. Hack Bar: Another well known and very often used tool, it is mostly used for security audit , and comes strongly recommended for installation and XSS, SQL Encoding/Decoding - MD5, SH1, Base64, Hexing, Splitting etc. The add-on can be downloaded here.

3. Live HTTP Headers: Similar to the Tamper Data add-on, the one big difference this add-on has is that it allows for viewing HTTP headers of a page while browsing. The add-on can be downloaded here.

4. User Agent Switcher: This particular add-on works wonders in adding a menu and a toolbar button to switch the user agent of a browser. This is, in turn, helpful in the changing of a User Agent to IE, Search Robots, I-Phone (I-OS). Besides this, the user can also use this add-on in the creation of his or her own User Agent. The add-on can be downloaded here.

5. Cookie Manager+: This is a great add-on for viewing, editing, creating and injecting cookies. The best thing about the add-on is the fact that it displays extra information about cookies, allows edit multiple cookies at once & backup/restore. 

6. HTTP Fox: This add-on works for those looking to monitor and analysing all incoming and outgoing HTTP traffic between the browser and the web servers. The aim of the add-on is to bring the functionality known from tools like Http Watch or IE Inspector to the Firefox browser. The add-on can be downloaded here.

7. Passive Recon: This add-on gives its users the capability of performing "packetless" discovery of target resources utilizing publicly available information. The add-on can be downloaded here

Saturday, October 5, 2013

37 Coding Contests And Puzzles To Enhance Your Programming Skills   
 
These will not only help you get familiar with new programming languages, but also help speed up the learning process. Try out and have fun!  
Rate this news:   (0 Votes)
Saturday, October 05, 2013:  Learning programming becomes fun when you participate in coding contests and compete with other coders and solve programming puzzles, where you get a chance to develop your logics and problem solving abilities.

Keeping the try-and-error spirit of programming in mind, we are presenting 37 coding contests and puzzles, that will not only help you get familiar with new programming languages, but also helps speed up the learning process. Try on and have fun!

Annual contests:

1. International Conference on Functional Programming (ICFP) This has been running for a decade and happens in June or July each year. Though it's based in Germany, anyone can enter using any programming language, from any location. It's free to enter and your team isn't limited by size.
Coding contests, C, C++, C#, Programming puzzles, C programming, Programming languages, How to learn programming




2. The BME International: The BME International is an intense free to enter contest that takes place in Europe once a year for teams of three, and you have to bring your own computers and software. This year, the 7th edition took place in Budapest. This contest has had some interesting challenges in the past including driving a car over a virtual terrain? Other past tasks included controlling an oil-company, driving an assembly line robot and programming for secret communication. All programs were written in a 24-hour intense period!

3. International Collegiate Programming Contest: One of the longest running- this contest started in 1970 at Texas A&M and has been run by the ACM since 1989 and has IBM's involvement since 1997. One of the bigger contests, it has thousands of teams from universities and colleges competing locally, regionally and ultimately in the a world final. The contest pits teams of three university students against eight or more complex, real-world problems, with a grueling five-hour deadline.

4. The Obfuscated C contest: The Obfuscated C contest has been running for nearly 20 years. This is done on the internet, with email submissions. All you have to do is write the most obscure or obfuscated Ansi C program in under 4096 characters length according to the rules. The 19th contest took place back in January/February 2007.

5. The Loebner Prize: The Loebner Prize is not a general programming contest but an AI challenge to enter a computer program that can do the Turing test, i.e. talk to a human sufficiently well to make the judges believe they are talking to a human. The Judge program, written in Perl will ask questions like "What time is it?", or "What is a hammer?" as well as comparisons and memory. The prize for the best entrant is $2,000 and a Gold Medal.

6. Chatterbox Challenge: It is similar to the Loebner Prize is the Chatterbox Challenge. This is to write the best chatter bot- a web based (or downloadable) application written in any language that can carry on text conversations. If it has an animated display that syncs with text then that is even better- you get more points!

7. International Problem Solving Contest (IPSC): This is more for fun, with teams of three entering via the web. There are 6 programming problems over a 5 hour period. Any programming language is allowed.

8. The Rad Race: Competitors in teams of two have to complete a working business program using any language over two days. This is another contest where you have to bring along equipment, including a router, computer(s), cables, a printer etc. The next one will be in Hasselt, Belgium in October 2007.

9. The Imagine Cup: Students at school or college compete by writing software applicable to the set theme which for 2008 is "Imagine a world where technology enables a sustainable environment." Entries started August 25th 2007.

10. ORTS Competition: ORTS (Open Real Time Strategy game) is a programming environment for studying real-time AI problems such as path-finding, dealing with imperfect information, scheduling, and planning in the domain of RTS games. These games are fast-paced and very popular. Using the ORTS software once every year there is a series of battles to see whose AI is best.

11. The International Obfuscated C Code Contest: Abbreviated IOCCC is a programming contest for the most creatively obfuscated C code. It started in 1984 and the 20th competition started in 2011. Entries are evaluated anonymously by a panel of judges. The judging process is documented in the competition guidelines and consists of elimination rounds. By tradition, no information is given about the total number of entries for each competition. Winning entries are awarded with a category, such as "Worst Abuse of the C preprocessor" or "Most Erratic Behavior", and then announced on the official IOCCC website. There's no prize except if your program is featured on the site then you won!

12. Google Code Jam: Running since 2008, it's open to anyone aged 13 or above, and you or a close relative don't work for Google or you don't live in a banned country: Quebec, Saudi Arabia, Cuba, Syria, Burma (Myanmar). (The contest is prohibited by law). There's a qualification round and three other rounds and the top 25 travel to a Google office for the Grand Final.

Ongoing contests:

13. Hutter Prize: If you can improve on the compression of 100 MB of Wikipedia data by 3% or better then you can win cash prizes. Currently the smallest compression is 15,949,688. For every 1 per cent reduction (minimum 3 per cent) you win €500.

14. Project Euler: This is an ongoing series of challenging mathematical/computer programming problems that will require more than just mathematical insights to solve. computationally the problems should be solvable in less than a minute. A typical problem is "Find the first ten digits of the sum of one-hundred 50-digit numbers."

15. Sphere Online Judge. Run at Gdansk University of Technology in Poland, they have regular programming contests - with over 125 completed. Solutions are submitted to an automatic online judge that can deal with C, C++ and C# 1.0 and many other languages.

16. Intel's Threading Programming Problems: Running from September 2007 until the end of September 2008 Intel have their own Programming Challenge with 12 programming tasks, one per month that can be solved by threading. You get awarded points for solving a problem, coding elegance, code execution timing, use of the Intel Threading Building Blocks and bonus points for posting in their problem set discussion forum. Any language but C++ is probably the preferred language.

17. Codechef: Codechef is India's first, non-commercial, multi-platform online coding competition, with monthly contests in more than 35 different programming languages including C, C++ and C#. Winners of each contest get prizes, peer recognition and an invitation to compete at the CodeChef Cup, an annual live event.

Puzzles

1. Code Chef

Code Chef has lots of practice puzzles, and monthly competitions with cash prizes. The site officially supports over 35 programming languages!

2. Google Code Jam

The code jam is a programming contest from Google. The top 25 contestants get to travel to Google's HQ in California. Entries are accepting in any programming language.

3. Timus Online Judge

An online competition site that automatically checks your submissions. Supports Java, C#, Pascal, C and C++.

4. Uva Online Judge

Over 2600 great programming puzzles, and also regular contests. Submissions in C, C++, Java or Pascal are automatically checked for you.

5. Code Golf

The aim with code golf is to submit a solution using the fewest characters possible.Solutions can be submitted in Perl, Python PHP or Ruby.

6. SPOJ

The Sphere Online Judge contains 1871 different programming problems. More points are awarded for better performing solutions, which can be submitted in a range of languages.

7. USA Computing Olympiad

Programming puzzles designed to provide "pre-college students with opportunities to sharpen their computer programming skills". The puzzles are still interesting and fun even if you've got a CS degree!

8. Java Bat

A site dedicated to practical Java programming problems. You can type your code directly into the website, and it'll tell you if you've solve the problem correctly or not.

9. Informatics Olympiad

A British version of the computing olympiad. Again aimed at school and college students, but fun and interesting for everyone.

10. Programming Challenges in C, C++ and C#

11. Code Chef

Code Chef has lots of practice puzzles, and monthly competitions with cash prizes. The site officially supports over 35 programming languages!

12. Google Code Jam

The code jam is a programming contest from Google. The top 25 contestants get to travel to Google's HQ in California. Entries are accepting in any programming language.

13. Timus Online Judge

An online competition site that automatically checks your submissions. Supports Java, C#, Pascal, C and C++.

14. Uva Online Judge

Over 2600 great programming puzzles, and also regular contests. Submissions in C, C++, Java or Pascal are automatically checked for you.

15. Code Golf

The aim with code golf is to submit a solution using the fewest characters possible.Solutions can be submitted in Perl, Python PHP or Ruby.

16. SPOJ

The Sphere Online Judge contains 1871 different programming problems. More points are awarded for better performing solutions, which can be submitted in a range of languages.

17. USA Computing Olympiad

Programming puzzles designed to provide "pre-college students with opportunities to sharpen their computer programming skills". The puzzles are still interesting and fun even if you've got a CS degree!

18. Java Bat

A site dedicated to practical Java programming problems. You can type your code directly into the website, and it'll tell you if you've solve the problem correctly or not.

19. Informatics Olympiad

A British version of the computing olympiad. Again aimed at school and college students, but fun and interesting for everyone.

20. Programming Challenges in C, C++ and C#

About.com's C/C++/C# section regularly posts interesting programming puzzles. Successful solutions get acknowledged on the site once the deadline has passed.