SectorD w w w .sectord.in
Join Our Official Fan page
www.facebook.com/SectorDe
table of
CONTENTS
5 7 9 10 14 15 17 20 23 27
31
Assassin’s Creed 4
April Release
Dynamic IP vs Static IP. Google Vs Yahoo
Send A Free Fax
11
Contacts on a Google Map JAVA :
The Programmer’s Language
Social Engineering
BIG DATA.
33 7
Sector-D //About Sector-D Sector-D is nourished by the gratitude of its benefactors and powered by the reach of social networking; this community has produced awide variety of high-quality hacks, resources and tools, available to everybody. Every single contribution supports the entire community, and the community supports these contributors with traffic and word-of-mouth advertising: the networking effect at its best. Our contributors—Software developers, professional hackers, Network admin, web developer, Graphic designer—are top experts in their fields. It is our hope that our efforts go a long way in promoting critical thinking, solving problems and surprising people with various computer tricks. Our aim is to inform our readers about the latest trends and techniques in Web development. We try to persuade you not with the quantity, but with the quality of the information we present. Our readers can live more sustainable lives and connect with ongoing efforts for change. Don’t worry – there’s no big dollar training
Parag Shinde admin@queans.in Ironhide Rocklife ironhiderocklife@gmail.com Ronnie Bora ronnie.bora@facebook.com Ritumoni Bhuyan ritu.bhuyan18@gmail.com Rafiq Ahmed ghylive@gmail.com Amartya Saikia apple.skull000@gmail.com Hitesh Das hitesh40533@gmail.com Kakul Sarma kakul232@hotmail.com Anwesha Goswami anweshagoswami26@gmail.com Azrael D Vrykolaka fatekiller196@gmail.com
www.sectord.in admin@sectord.in
Parag Shinde Admin - SectorD
The £1billion ‘time mac hine’
MIG&MAGZ Magazine template 1 01www.sectord.in
Magazine template
MIG&MAGZ
02
LETTER FROM THE EDITOR
S
Our Team is Incomplete Without -
Amrit Deb Gaurab Shivam Sam Ironhide Indukalpa Hazarika Subham Rajak Jyotishman Dutta Bhargab Hazarika Punk Puskar Sourav Jyoti Roshan Singh Rabi Mondal Bhaskar Jyoti
Sector-D started as a small group in facebook which envisioned reaching out to the masses and sharing computer and technology related knowledge and tricks for free. It has been our foremost concern to answer to the queries and problems of our group members in the best ways possible and to provide them with adequate guidance and information on the latest available technologies in the market. We believe that sharing is an invaluable experience as it multiplies happiness and spreads a sense of brotherhood and mutual satisfaction among people. In the wake of the 21st century, when the internet has revolutionized the way we think and connect, Sector-D has made optimum use of this medium to reach out to technology-obsessed people, geeks and common-men alike! We have grown step by step, but assure to put giant strides towards reaching out our desired goals and spreading our domination over the techno-world. Though still a long way to go, we as a team are positive and determined in our endeavors. Till date, we have released three editions of our magazine on a monthly basis, starting from January 2013. This is the fourth issue of the Sector-D magazine for the month of April. Our previous women’s day special issue of March 2013 got a good response from our
readers and so we pledged to provide an even better issue this month. Hope we can come up to your expectations and we promise to share even better contents and tricks in the coming editions. We need your support and positive feedback to grow and get better. Feel free to share your opinion about our magazine and about the improvements that we should make in the upcoming editions to live up to the mark. We thank you for your gracious support and kind consideration of our ever-growing group. We give our word to please your techno-buds in the coming days too! Till then, go flip the pages and enjoy!
Priyojit Deb
Ritumoni Bhuyan Editor - SectorD
03
MIG&MAGZ
Magazine template
Magazine template
MIG&MAGZ
04
Assassin’s Creed 4: Black Flag
Assassin’s Creed 4: Black Flag release date Assassin’s Creed 4: Black Flag will be available on 1 November for Xbox 360, PS3, Wii U and PC. It has also been announced for the next-generation of consoles, including the PlayStation 4 and Xbox 720, both of which are rumoured to make an appearence at the annual games expo, E3, in June.Although an official release date is yet to be given, chances are the next-gen console version of AC4 will arrive on our shores in 2014, as the PS4’s UK release date is rumoured for Q1 2014. Previously, rumours suggested that Ubisoft was considering skipping a year in the Assassin’s Creed launch cycle to focus on making the franchise bigger. Fortunately for us, that rumour turned out to be false. Assassin’s Creed 4: Black Flag features
Ironhide Rocklife Content Writer
Ubisoft has finally put us all out of our misery by formally announcing the next addition to the Assassin’s Creed franchise – Black Flag The French firm made the announcement this week and even released a teaser trailer and screenshots (below) to get fans’ juices flowing. Black Flag will revolve around Edward Kenway, a former Royal Navy privateer turned notorious pirate, and will centre around 1715 Caribbean waters. According to Ubisoft, it will play heavily on the naval elements seen in Assassin’s Creed 3 – although on-land missions will still make up the majority of the story. But what else can we expect from the upcoming title? We round up all the latest announcements, news and rumours to find out.Aliquam gravida, erat eget dictum rhoncus, nunc lectus scelerisque felis, vel porttitor neque eros vitae libero. Ut est sem convallis congue metus.
MIG&MAGZ Magazine template 5 07www.sectord.in
Although naval-based missions will get a lion’s share of the story, about 60 per cent of missions will still be based on land as there will be over 50 locations to explore. Alas, our favourite hooded hero, Desmond, won’t be making an appearance in AC4 but expect to see a few famous faces floating about including Benjamin Hornigold and the notorious sea devil Black Beard. Many weapons will return, including hidden blades, swords, spear dart and so on, as well as new additions like a blowpipe and pistols. The game will also bring back more of a focus on stealth, something that the last couple of games have embraced less and less. Yves Guillemot, chief executive officer at Ubisoft said. “With the new hero and new setting we are creating the boldest and most unique Assassin’s Creed game yet, while still respecting the pillars of the franchise that have made it such a fan favorite. “Assassin’s Creed IV: Black Flag is based on a true, harsh and exciting part of a legendary era and will thrill longtime fans and newcomers alike.”
opportunity to play online against – or with – their friends (much like BlackOps, but minus the flesh-eating zombies). According to the article, Ubisoft released a poll which gauged players for their opinion on whether they’d like their friends to join them in “solving puzzles and missions”. Adding weight to the rumours, Assassin’s Creed mission director Philippe Bergon recently revealed that the 2007 Altair-led Assassin’s Creed once featured an ‘ambitious’ co-op component but was later shelved to make room for Desmond’s Animus storyline. Speaking to games site OXM, he said: “Before we knew about the Desmond story and Animus link, we had a huge co-op component in there but it just became too hard to do: the engine couldn’t support it, and then the metaphor we had above it didn’t support it.” He added: “Co-op was one of those big things at the beginning that just didn’t make sense in the end. For us it was really part of the single player experience. To have in-and-out coop, and in the end we never thought it made sense in the storyline that we had for the Animus.”
Assassin’s Creed 4: Black Flag co-op mode It didn’t come directly from the horse’s mouth but games site The Gaming Liberty claims the next Assassin’s Creed could come equipped with a co-op mode, giving gamers the
Magazine template MIG&MAGZ 08 6 www.sectord.in
April Release Five friends head to a remote cabin, where the discovery of a Book of the Dead leads them to unwittingly summon up demons living in the nearby woods. The evil presence possesses them until only one is left to fight for survival.
Evil Dead (2013) Stars:Jane Levy, Shiloh Fernandez, Jessica Lucas, Lou Taylor Pucci
A couple begin to experience some unusual activity after bringing their newborn son home from the hospital. With the help of home-surveillance cameras and a team of experts, they learn they’re being stalked by a nefarious demon.
Scary Movie V (2013)
O
Oblivion is an upcoming 2013 science fiction film based on the Radical Comics graphic novel Oblivion by Joseph Kosinski and directed and co-produced by Kosinski. It stars Tom Cruise, Olga Kurylenko, Andrea Riseborough, Morgan Freeman, Melissa Leo, ZoĂŤ Bell, and Nikolaj Coster-Waldau. The film was initially scheduled to release on July 10, 2013. Since the 3D re-release of Jurassic Park was set for a July 19, 2013 release date, the project was moved forward to April 19, 2013.According to Kosinski, Oblivion pays homage to science fiction films of the 1970s.
MIG&MAGZ Magazine template 7 11www.sectord.in
Stars:Simon Rex, Ashley Tisdale, Charlie Sheen, Lindsay Lohan
A trio of bodybuilders in Florida get caught up in an extortion ring and a kidnapping scheme that goes terribly wrong.
Pain & Gain (2013)
Stars: Mark Wahlberg, Dwayne Johnson, Rebel Wilson, Mindy Robinson Magazine template
MIG&MAGZ
Dynamic IP vs Static IP.
Static IP addressing is for one customer on one IP address and Dynamic IP addressing assigns a different IP address each time the ISP customer logs on to their computer, but this is dependent upon the Internet Service Provider (ISP) because some ISP’s only change the IP address as they deem it necessary. If you have Dynamic IP Addressing through your Website Host it means that you are sharing an IP Address with several other customers. If you are a beginner on the internet, an avid internet user, are entertaining the thought of starting your own website business, are a gamer, use VOIP or VPN there are several things you should know about IP Addressing. - Ironhide Rocklife
5 Things that Yahoo! Search can do but not Google - Parag Shinde Google is the world’s favorite web search engine but there are a couple of cool things that you can do only in Yahoo!. Take a look:
1. Compose emails from the Yahoo! search box. Static IP Addressing : If you feel the need to always know what your IP address is then you need a Static IP address, because it is constant. Static IP addresses are more reliable for Voice over Internet Protocol (VOIP), more reliable to host a gaming website or to play X-Box, Play Station, use Virtual Private Network for secure access to files from your company network computer, etc. Static IP addresses are also great if you use your computer as a server, as it should give your file server faster file uploads and downloads. Another plus with Static IP’s, when hosting a website you are not sharing your IP with another company who sends out a lot of E-mail SPAM and not only has their website been shut down but in turn gets your IP address blacklisted. In contrast a static IP address can become a security risk, because the address is always the same. Static IP’s are easier to track for data mining companies. Static IP addressing is less cost effective than Dynamic IP Addressing.
TAGLINE HERE :
Dynamic IP Addressing : The biggest advantages of Dynamic IP Addressing are less security risk as the computer is assigned a new IP address each time the customer logs on, they are cost effective and there is automatic network configuration (the less human intervention with network configuration the better). Dynamic addressing is usually used by ISP’s so that one IP address can be assigned to several users, however some ISP’s use Sticky Dynamic IP Addressing and do not change the IP address very often. Dynamic IP Addressing can be used by families with several computers or by a small business owner who has a home office. The software that comes with a router allows for Dynamic Host Configuration Protocol (DHCP) setup and assigns each computer attached to the router an IP address automatically. In contrast, Dynamic IP addressing should not be used for VOIP, VPN, playing online games or game hosting because Dynamic IP addressing is less reliable then Static IP addressing and could cause the service to disconnect while you are on a VOIP, VPN or gaming
MIG&MAGZ Magazine template 9 13www.sectord.in
Type !mail abc@xyz.com in the Yahoo! search box and it will automatically compose a new email message for you in Yahoo! mail.
2. Get Lyrics of any song or your favorite artist.
Type madonna lyrics (for lyrics of Madonna songs) ormadonna material girl lyrics (for lyrics of a particular song)
3. Specifiy the order of search keywords in queries
Say you want only web pages where word x comes before y but not vice versa, then just put the search query in Square Brackets. An example: [Sylvester Stallone] – will only return web pages where the word Sylvester appear before Stallone.
4. Search your favorite websites from Yahoo! itself.
For instance, type !wiki google in Yahoo! search box to search Google in Wikipedia.com. Other popular shortcuts are !ebay, !amazon, and !flickr. You can also execute these from the Firefox search box without changing the default search engine.
5. linkdomain – An undocumented Yahoo Web search operator.
A quick question – Can you find the number of articles on Wikipedia website that link to CNN.com ? It’s almost impossible to get this data from Google but you can do so quite easily in Yahoo! with the incredibly useful linkdomain operator. The answer is: linkdomain:cnn.com site:wikipedia.org Or take another example – How many stories on TechCrunch actually link to the PayPerPost, Arrington’s favorite topic. The answer here is: site:techcrunch.com linkdomain:payperpost.com
Magazine template MIG&MAGZ 14 www.sectord.in 10
THE FUTURE OF GRAPHICS CARDS IN 2013
Today we are taking a closer look at the most powerful graphics card ever created, the ASUS Ares II. While AMD never formally introduced the Radeon HD 7990 graphics card, a number of them have already become available. As if combining two Tahiti GPUs wasn’t enough for ASUS, the manufacturer has now launched the ASUS Ares II which fuses two complete Radeon HD 7970s and is overclocked. ASUS claims it’s the fastest graphics card they’ve ever developed, and they’re right. So what happens when you put two of these ASUS Ares II cards in a PC? Read on to find out... The original Ares card came out in 2010, at a time when the Radeon HD 5870 was the fastest single-GPU AMD graphics card. There was a dual-GPU card called the Radeon HD 5970 based on the same 3D chip, but to keep the energy consumption reasonable the clock speed was reduced. ASUS took a different approach, and create a true double 5870, costing around $1,600. The Ares 2 is just as exclusive as the Ares was, and that’s reflected by - let’s be honest - the exorbitant price tag of about about $1,800. ASUS is also only making 1,000 copies of this beast, and has equipped the Ares II with water cooling. We were lucky enough to get our hands on two out of the 1,000 available Ares IIs, and put them through our tests to find out whether this really is the fastest graphics card ever made. - Ironhide Rocklife.
MIG&MAGZ Magazine template 1115www.sectord.in
Magazine template MIG&MAGZ 16 www.sectord.in 12
Send a Free Fax to Anywhere in the World Send A Free Fax If you don’t have a fax machine at hand, or if the cost of sending an international fax seems prohibitive, this should interest you. - Parag Shinde
Send an online fax for free to any fax machine in the world
What is Firewall The term “firewall” originally referred to fireproof walls that were designed to prevent the spread of fire from one room or building to the next. They were typically made of brick, steel, or another type of inflammable material that would effectively limit the spread of the fire. In the IT world, firewalls do not involve any fire or pyrotechnics, but they serve a similar purpose. A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users. Firewalls can be either hardware or software-based. A router is a good example of a hardware device that has a built-in firewall. Most routers can be configured to limit traffic from certain IP addresses or block requests based on other criteria. Software programs that monitor and restrict external access to a computer or network can also serve as firewalls. A network firewall only allows authorized traffic from the Internet to flow in and out of the network. - Ironhide Rocklife.
MIG&MAGZ
Magazine template
HelloFax, the online fax company, has recently partnered with Microsoft and now lets you send up to 50 pages per month to any fax machine in the world for free. All your need is a web browser and a Microsoft account (your Hotmail or Windows Live ID should also work). To get started, go to hellofax.com/skydrive and click the “Sign-up with Microsoft” link. Once you are signed in, just upload any document and put in a fax number (with country code) to send your first online fax. Once your fax has been successfully delivered, a copy of the outbound fax document will be automatically saved in your SkyDrive. You can use HelloFax to send Word documents, PDFs, text files, images and several other popular formats. You can also pull in documents directly from your SkyDrive, Box, Dropbox, Evernote and Google Drive accounts for faxing. Update – If you don’t have a Microsoft account, go to hellofax.com/googledrive and use your Google Account to sign-up for HelloFax. You will still get credit for sending up to 50 faxes per month for free for a maximum of 6 months.
Magazine template MIG&MAGZ 18 www.sectord.in 14
Create a Map of your Google Contacts If you have been using Google Contacts (or any other address book*) to store the postal addresses of your friends and colleagues, you can easily create an online Google Map with all these address or even view them inside Google Earth. Here are the steps: - Parag Shinde
See all your Google Contacts on a Google Map *Make a copy of this Google Sheet in your own Google Docs account. *From the Google Contacts menu in the sheet, choose Initialize and authorize the script (see source code) to access your Google Contacts. *Next choose Generate KML under the same menu and the script will send a KML file to your email account. Go to your mailbox and download the KML file to the desktop. You can double-click this file to directly open it inside Google Earth. You can click the pin /marker to read the full address and name of the contact. Alternatively, you can upload the KML file to the web and copy-paste the URL of the KML file into the Google Maps Search box as shown below (see a sample map).
Also see: Google Maps Address Lookup Internally, the Google Apps Script reads the home /work postal addresses of your Google Contacts and then uses the geocoding service** of Google Maps to transform these human-readable address into latitudes and longitude values. These points (or placemarks) are finally put in a KML file that you can open inside Google Earth or Google Maps. [*] If you aren’t using Google Contacts, you can still use the script. Export the contacts data from your existing address book (like Hotmail or Yahoo Mail) as a CSV file and import the file into Google Contacts. [**] Google’s Geocoding service allows you make 2,500 requests per IP per day.
MIG&MAGZ Magazine template 1519www.sectord.in
YouTube Video Backgrounds You are probably using a single static image as the background for your website but it may offer a slightly more richer experience if you could consider placing moving images, like an animation or a self-playing video clip, in the background of your web pages. The Bing homepage frequently uses video backgrounds, like those penguins jumping out of an ice hole one after another, and so can you on your own website. There are several approaches here: *Bing uses the standard HTML5 <video> tags to serve videos on the homepage. The embedded video has a fixed size and it doesn’t resize itself with the browser. *There are ready-to-use jQuery plugins, Tubular and BigVideo.js for example, that let you easily use any video, or a series of videos, as page backgrounds. *The other more simple approach, as you can see in this demo, uses HTML and CSS tags (no JavaScript) to help you place any YouTube video in the page background. YouTube Video Backgrounds To get started, simply paste the code below near the opening <body> tag of your web template. You should also replace the ID with the actual video ID of the YouTube video that you would like to use in the background. <div style=”position: fixed; z-index: -99; width: 100%; height: 100%”> <iframe frameborder=”0” height=”100%” width=”100%” src=”https://youtube.com/embed/ID?autoplay=1&controls=0&showinfo=0&autohide=1”> </iframe> </div> Internally, we are using YouTube’s IFRAME tags to embed that video such that it occupies the entire page (both width and height are set to 100%). Also, the z-index is set to negative so the YouTube video layer will appear several levels below the main content of your page. The downside is that your background video won’t work on mobile devices and it is not possible to mute the sound of a video without using JavaScript. Bonus Tip: Embed Background Music with YouTube Remember the Geocities era when websites would automatically play background music as soon as you opened them much to the embarrassment of office workers. They mostly used raw audio files, like MP3, WAV or even the MIDI format, to embed music but you can even use any of your favorite YouTube tracks for embedding background audio. The trick is that you embed a regular YouTube video (with autoplay=1) and set the height & width of the video player to zero so it stays invisible. This can be achieved with a single line of code which you can add anywhere on your web page. <embed height=”0” width=”0” src=”http://youtube.googleapis.com/v/VIDEO_ID&autoplay=1&loop=1” /> -- Parag Shinde Magazine template MIG&MAGZ 16 20 www.sectord.in
JAVA : The Programmer’s
Language
Java availability
Oracle Corporation is the current owner of the official implementation of the Java SE platform, following their acquisition of Sun Microsystems on January 27, 2010. This implementation is based on the original implementation of Java by Sun. The Oracle implementation is available for Mac OS X, Windows and Solaris. Because Java lacks any formal standardization recognized by Ecma International, ISO/IEC, ANSI, or other third-party standards organization, the Oracle implementation is the de facto standard. The Oracle implementation is packaged into two different distributions: The Java Runtime Environment (JRE) which contains the parts of the Java SE platform required to run Java programs and is intended for endusers, and the Java Development Kit (JDK), which is intended for software developers and includes development tools such as the Java compiler, Javadoc, Jar, and a debugger.
JVM A Java virtual machine is a program which executes certain other programs, namely those containing Java bytecode instructions. JVMs are most often implemented to run on an existing operating system, but can also be implemented to run directly on hardware. A JVM provides a run-time environment in which Java bytecode can be executed, enabling features such as automated exception handling, which provides rootcause debugging information for every software error (exception). Oracle Corporation, the owner of the Java trademark, produces the most widely used JVM, named HotSpot, that is written in the C++ programming language. JVMs using the Java trademark may also be developed by other companies as long as they adhere to the JVM specification published by Oracle Corporation and to related contractual obligations.
Features of java:
simple
Java was designed to be easy for the professional programmer to learn and use effectively. Assuming that a person has some programming experience,he will not find Java hard to master.
object-oriented
java is object oriented language means To modify the data, you can build on what you already have, rather than scrap everything you’ve done and start over each time you need to do something new. In an objectoriented language, objects and classes are used to organize the data. The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as high performance non objects. Polymorphism, Encapsulation, and Inheritance are three main pillars of object oriented nature of java.
Distributed
Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java (Oak) included features for intra-address space messaging. This allowed objects on two different computers to execute procedures remotely. Java has recently revived these interfaces in a package called Remote Method Invocation (RMI). This feature brings an unparalleled level of abstraction to client/server programming.
MIG&MAGZ Magazine template 25 www.sectord.in 17
Robust
The multiplatformed environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. To gain reliability, Java restricts programmers in a few key areas, to force to find the mistakes early in program development. At the same time, Java frees you from having to worry about many of the most common causes of programming errors. Because Java is a strictly typed language, it checks code at compile time as well as in run time. Knowing that what you have written will behave in a predictable way under diverse conditions is a key feature of Java. In a well-written Java program, all run-time errors can—and should be managed by the program.
secure
As we know that every time we download a “normal” program, we are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scanned them for viruses prior to execution. still, most users still worried about the possibility of infecting their systems with a virus.Java assures security by providing a “firewall” between a networked application and the user’s computer. Java achieves this protection by confining a Java program to the Java execution environment and not allowing it access to other parts of the computer. Thus java applets can be downloaded with confidence that no harm will be done to the system and that no security will be breached .
Architecture-neutral
java is a “”write once; run anywhere, any time, forever” Language. a program written today, can run tomorrow— even on the other machine.Operating system upgrades, processor upgrades, and changes in core system resources can also dos not make a program malfunction.
Portable
As many types of computers and operating systems are in use throughout the world. For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, java uses portable executable code.
Interpreted and High Performance
Java enables the creation of cross-platform programs by compiling into an intermediate representation called Java byte code. This code can be interpreted on any system that provides a Java Virtual Machine. Java was designed to perform well on very low-power CPUs. The Java byte code was designed in such a way so that it would be easy to translate directly into native machine code for very high performance by using a just-in-time compiler.
Multithreaded
Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously.
Dynamic
Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically link code in a safe and expedient manner. Anwesha Goswami
Magazine template MIG&MAGZ 26 www.sectord.in 18
What is Social Engineering ?
S Gadget of The Month Life companion : Make your life richer, simpler, and more fun. As a real life companion, the new Samsung GALAXY S4 helps bring us closer and captures those fun moments when we are together. Each feature was designed to simplify our daily lives. Furthermore, it cares enough to monitor our health and well-being. To put it simply, the Samsung GALAXY S4 is there for you.
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. - Azrael D Vrykolaka
A social engineer runs what used to be called a “con game.” For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network’s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques. Social engineering is a component of many, if not most, types of exploits. Virus writers use social engineering tactics to persuade people to run malware-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, and scareware vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst. Another aspect of social engineering relies on people’s inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone’s shoulder (shoulder surfing), or take advantage of people’s natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people’s awareness of how social engineers operate.
Next Edition : 5 Social Engineering Exploit Techniques . MIG&MAGZ Magazine template 1927www.sectord.in
Magazine template MIG&MAGZ 28 www.sectord.in 20
7 Windows 8 Niggles Resolved Windows 8 has a number of features that can be annoying to experienced users of the traditional Windows desktop. From adding a Start menu to disabling the bulky ribbon, noisy live tiles, and unnecessary lock screen, you can easily fix a variety of problems you have with Windows 8. Disable The Ribbon :
Windows Explorer now has a new, Microsoft Office-style ribbon that aims to make its options more obvious and easier-to-use. However, the ribbon can take up a lot of screen real estate – it’s not that useful if you just want to view your files in a minimal window. To hide the ribbon, click the arrow at its top-right corner. To reveal the ribbon and access its options later, click the arrow again. You can also use the Ctrl+F1 keyboard shortcut to hide the ribbon. If you really have a vendetta against the ribbon, you can use Ribbon Disabler to disable the ribbon completely.
Disable Live Tiles :
Windows uses “live tiles” to automatically display information on your Start screen. New emails, calendar events, messages, photos, the weather, news, sports information, stock updates – let’s be honest, it can get really noisy on the start screen. When you’re trying to sit down at your computer and get something done, you don’t always need to be distracted with all this extraneous information. It’s not good for your information diet. Luckily, you can easily disable a live tile by right-clicking it and selecting Turn live tile off. The application’s icon and name will be displayed instead.
Add a Start Menu: Microsoft may have tried to remove the
29 www.sectord.in MIG&MAGZ Magazine template 21
Add a Start Menu: Microsoft may have tried to remove the Start menu forever, but you can easily add a Start menu back to Windows 8 if you miss it. We’ve covered a variety of ways to add a Start menu to Windows 8, including Stardock’s paid Start8 and the free Classic Shell. As a bonus, these tools can be used to make Windows boot straight to the desktop and disable the “hot corners” that activate the charms. They’ll help make Windows 8 feel more like a desktop operating system than the “touch-first” operating system Microsoft says it is.
Easily
Access
Power
User
Tools:
If you don’t want to use a Start menu but wish you could access power-user tools like the Control Panel more easily, use the hidden tools menu. To access it, press the Windows key and X at the same time. You can also right-click in the bottom-left corner of your screen.
Hide The Lock Screen : The lock screen may be nice on a tablet, but it just adds an additional key press to the login process if you’re using a non-touch machine. To disable the lock screen, open Notepad and copy-paste the following code into the Notepad window: Windows Registry Editor Version 5.00 [ H K E Y _ L O C A L _ M A C H I N E \ S O F T WA R E \ Policies\Microsoft\Windows\Personalization] “NoLockScreen”=dword:00000001 Save the new file with a .reg extension. For example, name it something like: nolockscreen.reg Double-click the .reg file to add its information to your registry, and then restart your computer. Your computer will always skip the lock screen and go directly to the login screen, saving you a key press. Prevent Window Snapping On The Desktop : Like on Windows 7, Windows 8 uses the Snap feature on the desktop to automatically snap windows to the edge of the screen. If you want to disable this feature, you can do so from the Ease of Access Center. Press Windows Key + U to open the Ease of Access Center, and then click the Make the mouse easier to use option. Enable the Prevent windows from being automatically arranged when moved to the edge of the screen check box. The Snap feature will be disabld. Use Keyboard Shortcuts : Keyboard shortcuts make it much easier to get around on Windows 8. Instead of accessing the charms bar by moving your mouse to the top right or bottom right corners of the screen and moving it towards the center of the screen, you can just press Windows key + C. There are also shortcuts to access the individual charms, such as the Windows key + I shortcut to open the Settings charm from wherever you are. To learn these keyboard shortcuts, download our free Windows 8 keyboard shortcuts cheat sheet. - Parag Shinde
30 Magazine template MIG&MAGZ 22 www.sectord.in
BIG DATA
Turn 12 terabytes of Tweets created each day into improved product sentiment analysis Convert 350 billion annual meter readings to better predict power consumption Velocity: Sometimes 2 minutes is too late. For time-sensitive processes such as catching fraud, big data must be used as it streams into your enterprise in order to maximize its value. Scrutinize 5 million trade events created each day to identify potential fraud Analyze 500 million daily call detail records in real-time to predict customer churn faster Variety: Big data is any type of data - structured and unstructured data such as text, sensor data, audio, video, click streams, log files and more. New insights are found when analyzing these data types together.
Time has come when we come across terms like “Big Data” , “Hadoop”, “ Analytics” floating around. But what behind the Paper back cover? Lets rewind in time. Late in Early 1960’s, when corporate started in large scale, the bigening era, where corporates were expanding and moving across border, the need to accurately keep an track by management came up.It introduced , time Cards, Registers, Punching machines. But its was not enough. As we entered the era of computer development and hence ame up database to store such big scale data. DB, SQL, foxpro, were to name a few. It started a completly new generation of data storage and reporting which was shortly termed as “Reporting”, which started to come out of the Quality departments of the corporates. As we entered 90’s , the same was re-termed to be a support function on its on as MIS ( Management information System) On the same go , We started creating data on large scale as well as keeping/ Storing the previous data intact. This But PAUSE! . where is corporates related to these individual users data? and why ? Cause these individuals are nothing but consumers of on which the corporates survive. 65% of the data world wide is consumer data, 25-30% are confidential corporates in house data, remaining 15-20% are Scientific research, Public data, or scrap. BIG DATA started with a completly new straucture of profiles, who would play with the data , past and present , generate reports on current functioning of a the Business.Reports got new names, Dashboards and Snapshots. As we entered 2000, world wide web acess at an individual level, across the globe increased at an surprising rate. in Past few years (3-4 years) , we have generated 2.5 quintillion bytes of data ( My special Thanks to social Networks, Blogs, Online shopping, and easy of availability of internet) — so much that 90% of the data in the world today has been created in the last 5 years alone. This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. This data is BIG DATA. So now we have BIG DATA . What is all about analytics? Analytics : Analysis + Statistics. We must not forget the very Basic subject that we continued to learn in every important stage of our life, one or the other way, Statistics. ( Mean, Mode frequency , Average Tables. Remember ? ) Well now , what with Statistic ? That’s a gross subject , that’s what most people feel . However open up and see again . Tables you made , while you use to write with pencils, what did it had ? The very basic ? It was a set of data given to you , on which you do some tabulation ,calculation and come up with a conclusion about that data. Going ahead the same conclusion can ve used to Predict future . Well Predicting future is somewhat humanity had been chasing all this time right ? So here we are . Just like in 70’s we started with Softwares and today ended up with cloud networking with Phablets, another 30-40 years down the line we will be predicting our own future with certain probability. Big data spans three dimensions: Volume, Velocity and Variety. Volume: Enterprises are awash with ever-growing data of all types, easily amassing terabytes—even petabytes—of information.
MIG&MAGZ Magazine template 2331 www.sectord.in
*Monitor 100’s of live video feeds from surveillance cameras to target points of interest *Exploit the 80% data growth in images, video and documents to improve customer satisfaction Big data is more than simply a matter of size; it is an opportunity to find insights in new and emerging types of data andcontent, to make your business more agile, and to answer questions that were previously considered beyond your reach. Until now, there was no practical way to harvest this opportunity. Today, IBM’s platform for big data uses state of the art technologies including patented advanced analytics to open the door to a world of possibilities. Some Impacts Analytics already made on Mindset of People with 10+ Years of Exp at Global Level:“We are making fact-based decisions in less time with more accuracy and less emotion. It took an edict from the top to make it happen, and we had to learn that being directionally correct is good enough and to accept the ‘80/20 rule’ for completeness of information.” - Kathy Chou, vice president, Sales Strategy & Operations, Hewlett-Packard. ”Analytics will change the way we do business in a near future” - Tesco “ The journey has just began and its the brighter side ahead” - Yahoo Big data analytics is the process of examining large amounts of data of a variety of types (big data) to uncover hidden patterns, unknown correlations and other useful information. Such information can provide competitive advantages over rival organizations and result in business benefits, such as more effective marketing and increased revenue. The primary goal of big data analytics is to help companies make better business decisions by enabling data scientists and other users to analyze huge volumes of transaction data as well as other data sources that may be left untapped by conventional business intelligence(BI) programs. These other data sources may include Web server logs and Internet clickstream data, social media activity reports, mobile-phone call detail records and information captured by sensors. Some people exclusively associate big data and big data analytics with unstructured data of that sort, but consulting firms like Gartner Inc. and Forrester Research Inc. also consider transactions and other structured data to be valid forms of big data. Big data analytics can be done with the software tools commonly used as part of advanced analytics disciplines such as predictive analytics and data mining. But the unstructured data sources used for big data analytics may not fit in traditional data warehouses. Furthermore, traditional data warehouses may not be able to handle the processing demands posed by big data. As a result, a new class of big data technology has emerged and is being used in many big data analytics environments. The technologies associated with big data analytics include NoSQL databases, Hadoop and MapReduce. These technologies form the core of an open source software framework that supports the processing of large data sets across clustered systems. Potential pitfalls that can trip up organizations on big data analytics initiatives include a lack of internal analytics skills and the high cost of hiring experienced analytics professionals, plus challenges in integrating Hadoop systems and data warehouses, although vendors are starting to offer software connectors between those technologies. - Ronnie Bora Magazine template MIG&MAGZ 24 www.sectord.in
Use goo.gl to Know if your Email has been Read
How Can You Create Fake Screenshots by : Parag Shinde Don’t believe everything you see on the Internet because screenshots can be easily faked. Sometimes these fake images are for pure fun – like you putting your picture on the cover of TIME magazine, sometimes they may be deceptive. My favorite is Wall Machine – a service that lets you you create fake
Ticket-o-Matic lets you print boarding passes of any popular airline, Fodey generates newspaper clippings while Expense Steak creates PDF receipts of restaurant bills and office supplies for a given amount. When you print these receipts on paper, they’ll look real but there’s little potential for misuse as they carry old dates.
How do you know if your email message has been read by the recipient(s)? One option is that you embed a tracking image in your outgoing email messages. If that image downloads on to the recipient’s computer, it is a confirmation that your email has been opened and read. Obviously, this technique will only work if the recipient has enabled automatic image downloads and that he or she is reading your email in HTML and not plain text. There’s another option as well. If your outgoing email messages include one or more hyperlinks, you may even consider taking the help of a URL shortening service like goo.gl for email tracking. The idea is pretty simple. Before including an hyperlink in your email, shorten it with goo.gl first. Now if the recipient opens your email and clicks on the link, his activity will be captured which you can see by simply adding a + sign to the Google short URL. For instance, if the short URL of your link is goo.gl/abc, you can see the click stats for that short URL on goo.gl/abc+ or goo.gl/info/abc. Hover over the click points in the graph and you’ll even get to know the time when the person clicked your link in the email. This of course is based on the assumption that your email messages have one or more hyperlinks and that the recipients are keen to click on them for you to track their activity. - Parag Shinde.
screenshots of Facebook walls and other Facebook related activity
Finally, if a web form makes it mandatory to fill the street address or the phone number, Facebook. Every part of that screenshot can be customized including use http://www.fakenamegenerator.com/ the conversation text, the profile images and you can have as many advanced.php to generate random data for putting into that form. – like X is now a friend of Y or Z changed their relation status on
comments on a Facebook post as you like.
Another service – iFakeText – lets you make screenshot images of text messages exchanged on an iPhone. Just enter the text of the SMS conversation in a proper format and generate the screenshot. I also like Fake Tweet Builder for creating screenshot images of Twitter conversations that may or may not have happened. The screenshots of individual tweets look extremely real and you may also use customize the profile pictures, the name of the Twitter client and how many times a particular tweet has been retweeted.
33 www.sectord.in MIG&MAGZ Magazine template 25
34 Magazine template MIG&MAGZ 26 www.sectord.in
The £1billion
‘time machine’
The £1billion ‘time machine’ which could finally reveal mysteries of the universe- World’s largest telescope will finally be turned on. It looks like it belongs in a science fiction film but this ‘time machine’ could provide us with the facts about where we came from. To be switched on today, the Atacama Large Millimeter Array, or ALMA, is the world’s
MIG&MAGZ Magazine template 35 www.sectord.in 27
P
most powerful telescope. It is also the highest on the planet and, at almost £1billion, the most expensive of its kind. It is hoped it will allow astronomers to learn about our origins by peering back to almost the first moments after the universe was formed. Built deep in the Chilean desert, in one of the driest places on Earth, ALMA is at an altitude of 16,400ft – roughly half the cruising height of a jumbo jet and almost four times the height of Ben Nevis. Rather than one single telescope, it is made up of 66 giant antennae which gather faint radio waves from space for processing by a supercomputer.
Costing £950million to build, including around £65million from the UK, and billed as being ‘in search of our cosmic origins’, it is hoped it will provide answers as to where the stars, the planets, and, ultimately where we came from. By collecting radio waves rather than optical light, ALMA can look through the dense dust clouds of deep space. This will give astronomers a glimpse of galaxies from just after the Big Bang. It can also look at how individual stars and planets are formed. This could shine a light on our creation as it is believed the elements spewed out by dying stars went on the seed the sun, the planets and, eventually, humans. It will also tell us more about where life came from by finding traces of compounds from water to chemicals similar those in DNA. Brian Ellison, of the Science and Technology Facilities Council and ALMA’s UK project manager, said: ‘It is said we are all made of stardust. ‘ALMA will answer certain questions about where we came from.’ The telescope, which was part-built by British companies, has yet to run at full power. But when all the dishes are operating in unison , the resulting images should be ten times sharper than those of the Hubble space telescope. To get such pictures from a single landbased radio telescope, it would have to be ten miles wide. The Chilean desert was chosen because it is one of the few places in the world where it is still possible to find a high, dry location unaffected by pollution from artificial light. Dryness is particularly important as moisture in the air absorbs the radio waves the dishes are trying to capture. But while the site promises good scientific results, the setting on the edge of the Andes poses difficulties for those who work there. To keep altitude sickness at bay, as much
work as possible is done at a control centre on lower ground. Visits to the telescope site are kept as short as possible and workers carry oxygen tanks. A spokesman for the European Southern Observatory, which co-ordinates the European investment, said: ‘ALMA contributes profoundly to the satisfaction of curiosity, not just of the professional researcher, but of the child who looks at the sky full of stars and wonders what they are and what part of the universe we occupy. - Hitesh Das
Time Travel: Fact or Fiction? We define time travel to mean departure from a certain place and time followed (from the traveller’s point of view) by arrival at the same place at an earlier (from the sedentary observer’s point of view) time. Time travel paradoxes arise from the fact that departure occurs after arrival according to one observer and before arrival according to another. In the terminology of special relativity time travel implies that the timelike ordering of events is not invariant. This violates our intuitive notions of causality. However, intuition is not an infallible guide, so we must be careful. Is time travel really impossible, or is it merely another phenomenon where “impossible” means “nature is weirder than we think?” The answer is more interesting than you might think.
Magazine template MIG&MAGZ 28 36 www.sectord.in
The titular thief,
Garret is making a return in what has been described as a â&#x20AC;&#x153;Gothic, industrial metropolis known simply as the City to steal anything and everything that will make him richerâ&#x20AC;?. Series veterans will no doubt remember the City, prominently featured in the Thief games. The report stated that the city is broiling with tension as it is ravage by a plague and lorded over by a political tyrant known only as The Baron. Garret is to pay attention to his surroundings and make use of many possible paths through the levels of the game. After the announcement Square Enix issued a press released introducing Thief 4 as a reinvention of a franchisethat helped defined an entire genre of games, and described the game as a first person adventure featuring intelligent design that allows players to take full control, with freedom to choose their path through the gameâ&#x20AC;&#x2122;slevels and how they overcome each challenge. Coming from the studio that developed Deus Ex Human Revolution, this is hardly surprising, and very good news.
MIG&MAGZ Magazine template 37 www.sectord.in 29
Magazine template MIG&MAGZ 38 www.sectord.in 30
The Saints Are Back
Saints Row is back! Volition and DeepSilver promise to deliver an even crazier and over the top game with the next instalment: Saints Row. From what we’ve seen in the teaser, it is going to be the craziest Saints game of all time. The boss of the Saints is now elected the President of the United States (you read that right, the boss, as in you, are now POTUS) but apparently this is just the start. Following the events of the third entry of the game, and rise to presidency, the USAis attacked by aliens. These aliens transport the Saints into a bizzare parallel Steelport where the Saints now have superpowers thanks to alien technology. As if the madness of Saints Row wasn’t enough. This could just be the best Saints Row game yet. It is clearly evident a lot of thought and planning has gone into pulling off this kind of a direction in avideo game, but we have faith. It’s Saints Row, the superpowers+Saints Row combination could just be what it takes to have to make us laugh so hard we forget to actually play the game. It’s no secret Saints Row prides itself on crude humour and excessive over the top action scenes, and again, judging by the trailer this is going to be both over the top and will leave us in splits for hours. We’ve seen players flying, outrunning sports cars, telekenisis, and a whole lot of other crazy stuff that simply has to be seen instead of being explained. - Roshan Singh
MIG&MAGZ Magazine template 3139 www.sectord.in
Saints Row 3 releases for all current generation platforms and PC on August 20 th .
40 Magazine template MIG&MAGZ 32 www.sectord.in
India’s Information Technology Act, 2000 After months of waiting, the government finally got into its act and notified India’s first Cyber Law. By means of a notification on October 17, 2000, the Indian government appointed 17th day of October 2000 as the date on which the provisions of the Information Technology Act, 2000 came into force. The Parliament had passed the IT Act, 2000 on May 17, 2000 and the said legislation received the assent of the President of India on 9th June 2000. Though the IT Act, 2000 technically became law of the land, yet it did not come into operation as section 1 (3) of the said Act specifically stipulated that it shall come into force on such date as the Government may, by notification, appoint. The IT Act aims to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of information and to facilitate electronic filing of documents with the government agencies. In addition, the Central Government also notified two distinct kinds of Rules. These rules are The Information Technology (Certifying Authorities) Rules, 2000 and the Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000. The Information Technology (Certifying Authorities) Rules, 2000 detail various aspects and issues concerning to Certification Authorities for digital signatures. These rules specify the manner in which information has to be authenticated by means of digital signatures, the creation and verification of digital signatures, licensing of certification authorities and the terms of the proposed licenses to issue digital signatures. The said rules also stipulate security guidelines for certification authorities and maintenance of mandatory databases by the said certification authorities and the generation, issue, term and revocation of digital signature certificates. The said rules further mandate the audit of the operations of the Certification Authority and classify various kinds of information. The said Rules also have in Schedule II the Information Technology Security Guidelines, which mandate various guidelines for the implementation and management of Information Technology Security. The said Security Guidelines are a virtual Bible for all Certification Authorities for the security aspects of their operations. The government has also specified the procedures relating to Cyber Regulations
45 www.sectord.in MIG&MAGZ Magazine template 33
Appellate Tribunal in the notified Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000. These rules specify how an application to the Cyber Regulations Appellate Tribunal has to be preferred along with relevant documents and application fee. It further stipulates how proceedings have to be conducted by the Tribunal. It has also elaborated on the powers of the Registrar of the Cyber Regulations Appellate Tribunal. The government, by another notification of 17th October 2000, has also constituted the Cyber Regulation Advisory Committee. The committee shall advise the Central Government either generally as regards any rules or for any other purpose connected with the IT Act, 2000. The said committee shall also advise the Controller for Certifying Authorities in framing the regulations under this Act. It comprises, amongst others, the Minister of IT, various Secretaries of different Ministries, representatives from different trade bodies and technical bodies, director of the Central Bureau of Investigation, police chiefs from the states and the Controller of Certifying Authorities. The overall net effect of all these notifications is that the IT Act, 2000 has come into operation. The information in the electronic format has been granted legal validity and sanction, digital signatures have been defined and made legal. It is now possible to retain information in an electronic format. Electronic contract has been recognized to be legal and binding. Some types of cyber crimes have been defined and made punishable offences like hacking, damage to computer source code, publishing of information which is obscene in the electronic form, breach of confidentiality and privacy and publishing digital signature certificate false in certain particulars and for fraudulent purpose. The appointment of the Controller for Certifying Authorities has kicked off the process of licensing of Certifying Authorities in India. It is expected that in a couple of months, Certifying Authorities, duly licensed by the Controller, would begin operations of issuing digital signature certificates in India. It has taken India nine Internet years to pass and notify the implementation of its first cyber law namely the Information Technology Act, 2000. The implementation of the IT Act is likely to throw up a gamut of complicated and complex legal issues as numerous areas have still not been covered under either the IT Act, 2000 or the various IT Rules. India has to face the challenges of cyberspace and its regulation in a very bold, prompt and decisive manner if it wants to become an IT superpower in the years to come. (Shared By Kakul Sarmah) Magazine template MIG&MAGZ 46 www.sectord.in 34
Rs.37990 Sony Xperia Z Xperia Z gives you everything you need to make work and play absolutely amazing. To start with, the phone is powered by the powerful 1.5 GHz Qualcomm Snapdragon S4 Pro with 2 GB RAM. To enhance your user-experience on the Sony Xperia Z is the 5 inch TFT capacitive, full HD touchscreen.
WE
BSIT
E FO
R YO
Starts
UR
BRA
ND
from
Rs. 1500 * cONDITIONS aPPLY
Nokia Lumia 620
Nokia Lumia 620
Rs. 14499
Micromax A90S
47
MIG&MAGZ
Magazine template
Rs. 13490
Samsung Galaxy Grand Duos I9082
Rs. 20900MIG&MAGZ Magazine template