Friday, November 16, 2012

Python for biginners

Most Universities offers languages such as C++, VB, and many more languages which are more complicated for beginner students whom are new to programming world. As a person who have been in this industry for so long I suggest that all first year students must learn python as their foundation language. Python is simple and straight forward language with less line of codes, compared to other languages that many universities tend to offer in their curriculum. If you want to be flexible with your programing just try Python first, and many hacker train their selves using Python.

Thursday, October 25, 2012

More secured than ever before

Microsoft Window 7 was built with security in mind and if it is confuged correctly malicious softwares can be history. The problem is not the OS it self but the people using it. In most cases since Microsoft is GUI and user friendly many people whom does not have deep knowledge when t come computers turn to it. 90% of them does not config their computers correctly and then end up being victims of crackers and viruses. Just do everything correctly and then you'll have peace of mind.

Wednesday, August 29, 2012

Tuesday, August 21, 2012

The recent mine tragedy made realise the important of hacking, If those miners ( may their soul RIP) has the black hat skills they could have protested siting right at their home and no one could have been killed. It time people look at us not as criminals but as individuals who can go beyond, think ahead and very smart. I (We) can build or destroy the system, so let understand the traditional meaning of the term HACKER.

Live your life
Perfect your life
Value other people's culture and religion
And die like a hero

Monday, July 16, 2012

Don't shoot them but listen to their rules

Usually network administrator have one word I their vocabulary which give, most of them the sleepless night. The term hacker they don't want to hear it yet they always think about it mostly if S/He does not have the required skilled when it comes to network security. Hackers and network administrators have one thing in common, they all concern with the security, but network administrator work from 8AM to 5PM whereas Hackers work 24/7 particularly at night where traffic is too law. hackers does not need permission to access any file in any computer but administrator do, and even tide with group policies.

 Most hackers are skilled in all the aspect of computers which means they can make any system listen to them. So why do most of the people hate such skilled personals? I really don't understand. Most of us who are skilled are not interested in a personal data but to the one that can help the nation and society. Steve when developing first Apple computer he was inspired by Captain Crunch, the father of hackers I guess (phreak). The mean of the term hacker have been shifted from it real meaning to something else. My suggestion is that people should not shoot us (hackers) but follow us and work with to build a one standard machines because the current one possesses number of vulnerabilities. The truth is no can stop can you can arrest one but there number of younger Bill Gates growing out there. If you can not beat them follow them.

Monday, July 2, 2012

South Africa on the spot

The SKA board decision to bring SKA to South Africa(SA) has shown that  though SA is still developing but it the strength to do big things. Successfully hosting 2010 world cup now we will lead the way to the space, definitely we have place the African Continent as a whole on the mark .




Tuesday, May 15, 2012

Smart move SA

From dompass to smart card this is a smart move for South Africans, well we have thank Nkosazane Dlamini Zuma for this but for me personally I would take off my hart for IT guys who are pioneers of this move. The problem every South Africans knows about our former ID was their vulnerable to duplicates and corruption they possessed. Although in most cases their duplicates were the result of owners carelessness. Some of the advantages of these smart card is that they will not be lost easy as they are bank card size. The other advantage according to Nkosazane Dlamini Zuma is that they will be able to tell in real time whether a person is a foreigner or not and what status they have, this means they will less if no bribes as  this system will not allow someone to move from one category to another.
From IT point of view this will also minimise cyber securities and net crime. As this is still a piloted program which will be test on those applying for IDs for the first time I have my all hopes on it and positive it will work. http://www.techcentral.co.za/id-smart-cards-on-the-way-for-sa/31355/

Wednesday, May 9, 2012

Protect your system from internet threats

For system administrators who are deeply trained about security loopholes in a computer, it is so easy to figure out if the computer is being compromised, but for normal Users who only knows how to run certain program not how program run it might be slightly difficult if not a nightmare.

These are things to consider in order to be safe
  • For Windows users I think they must be family with different antivirus since they on the list of the tools that can protect your system.
  • Firewall help protect both networked or standalone computer since it control inbound and outbound traffic, therefore it must be configured and running properly. Conveniently for Windows users all antivirus comes with firewall configured therefore you only needs to have activate Antivirus to be secured.
  • Enabling File and Print service in a standalone computer is not required so it must disabled as so doing causes easy access to your computer from Internet users.
  • Last but not least, knowing how to run applications at User level must not make think you know better and stop learning, you must have the desire to know the inside part.

Thursday, May 3, 2012

How to see if you guest in your pc

Believe it or not,billions of computers around the world are just victims of being compromised every day. It does not matter whether you connect to the internet just once off or you always connected, in fact it only takes below 15 second for a good hacker to get into your system and compromise it.

 Now hire is how you will see if you have a visitor in your computer.

If you connect to internet through modem (3G on any other), well every modem has all light which shows if you connected or not. Some lights are blue and are amber, but it is unfortunate that mostly people does not understands some other meaning of these lights. It is nomarly for the modem to flash now and then, let say every 20 minites mostly if you are have your email opened because you might be receiving some mail now and then. Importantly if it flash every two minutes or less that it simple means you are sending or receiving data, well if you know you not sending or receiving anything that might signals that someone has just got into your computer and he or she sending you some data or taking some from you.

On DSL/ADSL you can see the above by looking at the right corner of your taskbar. You simple see two monitor like screens which shows network connection. Again if these two screens flash all the time with errows going up and down, well my friends you in a big trouble ance again. Now that you know how see if you being attacked now I will tell you how to protect you privacy but you have to wait because that will be on my next attitle.

Tuesday, April 24, 2012

SQL Injection

We all want to own websites these days yet only minors knows how to protect themselves again threat posed by owning the website. This article might only be relevant those who own dynamic website having databases, since they are most targeted as these kind of websites hold some crucial information. SQL injection is the most used method that almost all hackers use to gain access to the website. In most cases website designer does not take security into consideration when developing website which in turn exposes their customer's data into vulnerable. Though not many people are expert when it comes to SQL server as SQL injection is more orientated to it but one not need to be expert to learn some of it commands. SQL statement such select, union, and ordered by are the most used statement in this attack.

Select from User_table_Id where name= "user" and password="anything"
The above statement if typed correctly might gain you access to username Table store in the database.

To protect your website your to limit the amount of commands or statement that can be run in your website and auto hides all tables. Unfortunately Firewalls and IDSs provide little or no protection against this attack. You need to keep you knowledge regarding security updated since more and more tricks are invented daily.

Monday, April 16, 2012

Microsoft contributed at last

If you ca not beat them, join them. This saying looks pretty old but can we regard  Microsoft followed it when at last they contributed on Linux kernel construct. Linux foundation announced Microsoft as the 17th  contributor to the construction of their kernel. I think from now on we will see more collaborations between these two. I remember that Microsoft's Steve bellmer once called Linux a cancer, I guess now the cancer has been cured. No more viruses for Windows

Tuesday, April 10, 2012

Microsoft back on track.

I am positive that Windows 8 will bring back Microsoft to top on the OS game (it's still on the top though some might deny it but it's a truth every one knows).

Some new features on windows are the followings

  • Its support both x86 pc and ARM tablets
  • Window to go


This is the best tool I reckon, which allow window to boot  from the USB device and they refers to it as live USB



  • Window Store
This is the equivalent of mac App Store. Now people will have a reason to stay on Windows.

Its looks like Microsoft has recty the mistake they did with Windows 7 where they failed to market some of best features of Windows 7 such as PSR tool which I think work the same as keyloger.

Wednesday, April 4, 2012

Threat to Mac people

For the past few years people it has been known that Apple PC are not affected by the viruses or there was no known virus that could affect the system (well that might be a history). The truth that most people seems to ignore is this one, Programmers work on new things every day, in fact they come up with new softwares everyday some are good whereas some are malicious and very dangerous. Now back to Mac story there has been a report lately about Trojan horse that is affecting Mac machine. This Trojan horse has gain access to mac system via word document, which means it uses MS office to attack. http://www.winlinhack.com/

Friday, March 23, 2012

System File Checker

Most people if they find issue with their system files or those files become corrupted they run for third party programs to sort that issue. In most cases they might lack the knowledge that  Microsoft has the number of builtin utilities that they can simple use to sort any Windows related issue. In most cases when Windows protected files are deleted, the system automatically restore it ( to prove this just delete any DLL file and then check it on it original location you will find it still there. If you think you have a problem with your systems file or you think they are corrupted Microsoft has a very powerful utility that can make job much simpler for you.

System File Checker is a very powerful utility that you can use to scan and rectify your files systems. To use this utility you need to open Run and type SFC/scannow then press OK. When running this utility make sure no window is open.

Monday, March 12, 2012

MS Antivirus utility

I am happy to see that Microsoft has now realise the mistake they did when they stop their antivirus utility which they used on Windows pre Window 9x such as Windows 95. Their free downloadable antivirus utility from www.microsoft.com I hope will came to rescure to none technical Users who does not take into consideration to update their Antiviruses program often. The only issue I have with this utility is it active duration which is 10 days thereafter you have to download a new one. Acording to me 10 day seems to be pretty short but I hope they will extend maybe later to atleast a year active usage.

Thursday, March 8, 2012

Speed up your PC

Some computer issues are minor things that can be resolved without the need that one should have any sort of technical knowledge. Some of them are just that people can not or just do not know all, how to manage their computers  ( they just clueless). Well if you one of those non technical people, I think I have the good news for you. Some software engineers don't rest, they work extra hour even at knight just to develop programmes/software that will make your computer run smooth and faster as new. If your computer is slow, freeze at some point. The problem might be your computer is filled with much temporary file, viruses or your registry is corrupt.

Well the followings software will definitely assist you:

  1. C Cleaner
  2. SpeedMaxPC

Try them out now and please this is not the secret so tell the others with the very problem.

Friday, February 3, 2012

IOT

I hope all developers and people who love innovations will make 08-09 April 2012 a day to remember in history. visit https://pachube.com for more details.

Wednesday, January 25, 2012

World within Technology: Are Windows always the target?

World within Technology: Are Windows always the target?

World within Technology: Are Windows always the target?

World within Technology: Are Windows always the target?

Are Windows always the target?

When Bill started MSDOS it was a revolutionary development and later some people complained that it was difficult to use because is was a CLI type which required many commands to remember and some to know by heart. Al of a sudden malicious softwares were created and till date only Windows are getting affected by these codes.

No known virus that has ever affected Lunix, Unix, and Aple OS systems till today. I know almost all these codes are executable or batch files which Windows mostly is built on. Why hackers do not target the other systems other than windows? Though Microsoft alway patches their softwaes and provide update almost dailly but the viruses are still affecting their system almostly every time.

Windows are so easy to use because they are Graphical User Interface(GUI). It just click click click more,   you do not have to think, microsoft has created everything for you. The other sytems are difficult to use, trust me on that one, some take even  years to master linux. Exe and Bat files are what make the communication between Windows and malicious codes so easy. Though introducing GUI on MSDOS was a smart move for Bill but it also pave the way fro threats.

Monday, January 23, 2012

What all this really about?

Just a few days after Google remove their email link or associate to facebook users, now there are romours seculating about Facebook .Inc planning to start email service anytime soon for their users that will compete with google. Though Facebook spokesperson is denying it, but where ever there is a smoke there is always fire. I wonder where all this will end.

Friday, January 20, 2012

Are you secured?

Some people when get internet connection they bcome too excited to an extent that they even forget to secure their system from outsiders. These outsiders can be intruders or mllisious softwares, whom or which might try to take control  of your sytem on even crashed it. When we talk about intruder the first people who come into mind are hacker, and incase of malisious software it can be viruses, trap doors, trojan horsse, logical bombs, and so forth.

To be protected from intruders consider the ff:
Never use a weak password, your passoword should be atleast in alfanumeric formet.
Most hackers try to gain access to the sytem via IP address and opened unattended port. So try to close all the unused port and implement security in all those that are being used often.

Incase of malisious software:
try to implement software restriction policy that prevent any unknown or sign script to be runed on your system.

Hope you will now secure your systems.

Monday, January 16, 2012

Arfa Karim was the youngest MSCE from 2004 to 2008. Unfoutunately she died in the past few days. The IT industry lost a genious indeed.