Creating Bootable Pendrive By Cmd

bootable-usb-pendrive-by-cmdUsing a pendrive in a place of windows disc is a wonderful idea to choose and if you don’t have any USB Bootable Maker Software in your computer or maybe if you don’t want to use any of these software’s then there’s an another great way to create a bootable pendrive by just using your windows cmd comment prompt and also your windows setup files.

Creating a pendrive bootable by cmd is a very easy and quickest task to do and by just typing some commands on it will make your drive bootable and after that you can use it for every windows installation purpose. This cmd boot conversion will only works on Windows Vista/7/8/8.1/10 Setups and if you want to create a bootable pendrive for Windows Xpthen you’ll definitely need some software to make this bootable conversion possible for you.

Making USB bootable by cmd command prompt doesn’t require any software to use but you’ll defiantly need your windows setup files in order to make those files bootable in your pendrive. So, make sure your computer is working on windows operating system to use this cmd prompt for boot conversion and you’ll also have to make sure about you having all windows setup files in your computer for file transformation on pendrive.

STEP 1 – Open your windows cmd command prompt and run it as administrator for typing commands on it. I only suggest you to open cmd as administrator because the current user command prompt version won’t work for some administrator security reasons. There are so many ways to open cmd on your screen and some commonly used ways are mention in given picture below.

 

Run command to open cmd – “CMD”

 

different ways to open cmd as admin-min_zpspfpqifs1STEP 2 – Just after when your windows cmd opens up, then type a “diskpart” command on it and that will take you to the Disk Management Utility in the command prompt.

cmd diskpart command-min_zpsyxrmvo7k

 

STEP 3 – Now, type “list disk” to show every connect disk in your computer and after that just type “select disk #” (# Is Your Disk Or I Say Your Pendrive Disk Number). We do this to find our pendrive disk number in diskpart of cmd and tell our computer to make it as active to make some future bootable adjustment on it.

 

list disk and select disk on cmd-min_zpsxuou7ilqSTEP 4 – Selecting you’re pendrive in diskpart will makes your pendrive active for now on and after that there are some of commands you’ll have to type into it cmd for disk cleanup, partition creation and some other import process which is definitely needs for boot conversion.  So, there are some commands listed below which you’ll need to type into your command prompt.

Remaining Command for Type It –

  • Clean
  • Create partition primary
  • Select partition 1
  • Active
  • Format fs=ntfs quick
  • Assign
  • Exit

After typing these command on your cmd you’ve gonna done with this cmd process and you’ll need to go to next step listed down in this tutorial.

You can see the full command typed in cmd example below

 

full command list-min_zpssvyba2y6Now your pendrive made fully bootable and the only thing which remains now is to copy your windows setup files into the pendrive. You can use your windows installer disc to transfer setup files into your pendrive if you having one or you can use an iso image of your bootable windows image and extract it on your pendrive for files transformation propose.

So, Now You Have 3 Options to Choose and Those Are –

  • Transfer files from our computer’s drive to USB, if you having full windows setup files on your computer.

copy files from drive to usb device for bootable usb-min_zpsyctk37cx

 

  • Transfer files from Windows Disc to USB Pendrive, if you having a windows installation disc.

copy setup files from windows cd disc-min_zpsqjgtwfk0.jpg

 

  • Transfer files from ISO Disk Image to USB Pendrive by direct extracting files on USB.

iso to usb-min_zpsdhlfhlu9

 

A Useful Tip

You’ll have to make sure about that, you’ll only have to transfer windows files not a single setup folder. If you just only copied setup folder in our pendrive then your pendrive wont gonna boot when you want too.

last time  files check-min_zpsfig6uquf

 

If you like our posts please like us on facebook also.

Please share your views as comments.

The 5 Most Infamous Software Bugs in History

In the digital era, computer bugs can affect our lives, the economy of a nation and even the well-functioning of society in general. As the internet of things gradually invades all aspects of our environment, the importance of identifying and preventing computer bugs grows exponentially.

These are 5 infamous software bugs that went down in history:

1 – The “Moth-er” of all bugs

BBVA-OpenMind-ventana-primer-bug-ppal1

After finding a moth inside the Harvard Mark II computer on September 9th, 1947 at 3:45 p.m., Grace Murray Hopper logged the first computer bug in her log book. She wrote the time and the sentence: “First actual case of bug being found”. Nowadays, the term “bug” in computer science is not taken literally, of course. We use it to talk about a flaw or failure in a computer program that causes it to produce an unexpected result or crash.

You may already be familiar with this story, but is it really true…?

2 – The Y2K bug

bug02

In the last century, software developers had never thought that their code and creations would survive into the new millennium. For this reason, many assumed that writing “19” before the variable “year” was an unnecessary waste of memory. Most decided to omit these two digits.

All good until the turn of the century: the closer we got December 31st, 1999,  the more we started worrying about the fact that computer systems in New Year’s Eve would update their clock to January 1st, 1900 instead of 2000 and, because of this, major disasters would be unleashed and it would be the end of mankind.

However, we are still here to tell the tale: nuclear missiles were not fired on their own, planes did not fall from the sky and banks did not lose all the information about their clients’ savings.

The Y2K bug was real, nevertheless. Billions of dollars were spent in order to upgrade computer systems worldwide. Also, some small incidents were reported: In Spain, some parking meters failed. The French meteorological institute published on its website the weather for January 1st 19100 and in Australia, some bus-ticket validation machines crashed.

3 – The Dhahran Missile

In February 1991 (First Gulf War), an Iraqi missile hit the US base of Dhahran in Saudi Arabia, killing 28 American soldiers.

Following an investigation, it was determined that the base’s antiballistic system failed to launch because of a computer bug: the Patriot missile battery, whose role is to detect and intercept enemy missiles by “crashing” against them in mid-air, had been running for 100 hours straight. After every hour, the internal clock drifted by milliseconds and that had a huge impact on the system (a delay of  ⅓ of a second after 100 hours).

For a person, 0.33 seconds is an infinitesimal amount; but for a radar that tries to track anAl Hussein Scud missile –  that reaches Mach 4.2 (1.5 km per second / 0.88 miles per second ), this “micro-delay” translates into a “600 meter” error. In the case of the Dhahran incident, the radar first identified an object in the sky but didn’t manage to track it due to the error, and thus, the missile didn’t launch itself.

 

4 – Feet or meters? The Mars Climate Orbiter nav bug

bug03.jpg

The Mars Climate Orbiter was launched in 1998 with the goal of studying climate on Mars, although it never managed to fulfill its mission.

After traveling through space for several months, the probe was destroyed because of a navigation error: teams who controlled the probe from Earth used parameters in imperial units meanwhile the software calculations were using the metric system. These miscalculations had an impact on the flight path. In the end, the probe was destroyed because of friction with the Martian atmosphere (an error of almost 100 km).

5 – Too many digits for Ariane 5

bug04.jpg

When coding, a developer has to define variables the program will use and also the size those variables will take in the computer’s memory. The amount of memory required by the variable is expressed in bits.

A 16 bits variable can have a value of −32.768 to 32.767.

On the other hand, a 64 bits variable can have a value of −9.223.372.036.854.775.808 to 9.223.372.036.854.775.807 (that’s almost an infinity of options).

On June 4th, 1996 and only 30 seconds after the launch, the Ariane 5 rocket began to disintegrate slowly until its final explosion. Simulations with a similiar flight system and the same conditions revealed that in the rocket’s software (which came from Ariane 4), a 64-bit variable with decimals was transformed into a 16-bit variable without decimals.

These variables, taking different sizes in memory, triggered a series of bugs that affected all the on-board computers and hardware, paralyzing the entire ship and triggering its self-destruct sequence.

 

 

 

If you like our posts please let us know in comments.

Best 5 memory debuggers for Linux coding

As a programmer, I’m aware that I tend to make mistakes — and why not? Even programmers are human. Some errors are detected during code compilation, while others get caught during software testing. However, a category of error exists that usually does not get detected at either of these stages and that may cause the software to behave unexpectedly — or worse, terminate prematurely.

If you haven’t already guessed it, I am talking about memory-related errors. Manually debugging these errors can be not only time-consuming but difficult to find and correct. Also, it’s worth mentioning that these errors are surprisingly common, especially in software written in programming languages like C and C++, which were designed for use with manual memory management.

Thankfully, several programming tools exist that can help you find memory errors in your software programs. In this roundup, I assess five popular, free and open-source memory debuggers that are available for Linux: Dmalloc, Electric Fence, Memcheck, Memwatch and Mtrace. I’ve used all five in my day-to-day programming, and so these reviews are based on practical experience.

Dmalloc

Developer: Gray Watson
Reviewed version: 5.5.2
Linux support: All flavors
License: Creative Commons Attribution-Share Alike 3.0 License

Dmalloc is a memory-debugging tool developed by Gray Watson. It is implemented as a library that provides wrappers around standard memory management functions like malloc(), calloc(), free() and more, enabling programmers to detect problematic code.

cw_dmalloc-output-100627040-large.idge.png

As listed on the tool’s Web page, the debugging features it provides includes memory-leak tracking, double free error tracking and fence-post write detection. Other features include file/line number reporting, and general logging of statistics.

What’s new

Version 5.5.2 is primarily a bug-fix release containing corrections for a couple of build and install problems.

What’s good about it

The best part about Dmalloc is that it’s extremely configurable. For example, you can configure it to include support for C++ programs as well as threaded applications. A useful functionality it provides is runtime configurability, which means that you can easily enable/disable the features the tool provides while it is being executed.

You can also use Dmalloc with the GNU Project Debugger (GDB) — just add the contents of the dmalloc.gdb file (located in the contrib subdirectory in Dmalloc’s source package) to the .gdbinit file in your home directory.

Another thing that I really like about Dmalloc is its extensive documentation. Just head to the documentation section on its official website, and you’ll get everything from how to download, install, run and use the library to detailed descriptions of the features it provides and an explanation of the output file it produces. There’s also a section containing solutions to some common problems.

Other considerations

Like Mtrace, Dmalloc requires programmers to make changes to their program’s source code. In this case you may, at the very least, want to add thedmalloc.h header, because it allows the tool to report the file/line numbers of calls that generate problems, something that is very useful as it saves time while debugging.

In addition, the Dmalloc library, which is produced after the package is compiled, needs to be linked with your program while the program is being compiled.

However, complicating things somewhat is the fact that you also need to set an environment variable, dubbed DMALLOC_OPTION, that the debugging tool uses to configure the memory debugging features — as well as the location of the output file — at runtime. While you can manually assign a value to the environment variable, beginners may find that process a bit tough, given that the Dmalloc features you want to enable are listed as part of that value, and are actually represented as a sum of their respective hexadecimal values — you can read more about it here.

An easier way to set the environment variable is to use the Dmalloc Utility Program, which was designed for just that purpose.

Bottom line

Dmalloc’s real strength lies in the configurability options it provides. It is also highly portable, having being successfully ported to many OSes, including AIX, BSD/OS, DG/UX, Free/Net/OpenBSD, GNU/Hurd, HPUX, Irix, Linux, MS-DOG, NeXT, OSF, SCO, Solaris, SunOS, Ultrix, Unixware and even Unicos (on a Cray T3E). Although the tool has a bit of a learning curve associated with it, the features it provides are worth it.

 

 

Electric Fence

Developer: Bruce Perens
Reviewed version: 2.2.3
Linux support: All flavors
License: GNU GPL (version 2)

Electric Fence is a memory-debugging tool developed by Bruce Perens. It is implemented in the form of a library that your program needs to link to, and is capable of detecting overruns of memory allocated on a heap ) as well as memory accesses that have already been released.cw_electric-fence-output-100627041-large.idge

As the name suggests, Electric Fence creates a virtual fence around each allocated buffer in a way that any illegal memory access results in a segmentation fault. The tool supports both C and C++ programs.

What’s new

Version 2.2.3 contains a fix for the tool’s build system, allowing it to actually pass the -fno-builtin-malloc option to the GNU Compiler Collection (GCC).

What’s good about it

The first thing that I liked about Electric Fence is that — unlike Memwatch, Dmalloc and Mtrace — it doesn’t require you to make any changes in the source code of your program. You just need to link your program with the tool’s library during compilation.

Secondly, the way the debugging tool is implemented makes sure that a segmentation fault is generated on the very first instruction that causes a bounds violation, which is always better than having the problem detected at a later stage.

Electric Fence always produces a copyright message in output irrespective of whether an error was detected or not. This behavior is quite useful, as it also acts as a confirmation that you are actually running an Electric Fence-enabled version of your program.

Other considerations

On the other hand, what I really miss in Electric Fence is the ability to detect memory leaks, as it is one of the most common and potentially serious problems that software written in C/C++ has. In addition, the tool cannot detect overruns of memory allocated on the stack, and is not thread-safe.
Given that the tool allocates an inaccessible virtual memory page both before and after a user-allocated memory buffer, it ends up consuming a lot of extra memory if your program makes too many dynamic memory allocations.

Another limitation of the tool is that it cannot explicitly tell exactly where the problem lies in your programs’ code — all it does is produce a segmentation fault whenever it detects a memory-related error. To find out the exact line number, you’ll have to debug your Electric Fence-enabled program with a tool like The Gnu Project Debugger (GDB), which in turn depends on the -g compiler option to produce line numbers in output.

Finally, although Electric Fence is capable of detecting most buffer overruns, an exception is the scenario where the allocated buffer size is not a multiple of the word size of the system — in that case, an overrun (even if it’s only a few bytes) won’t be detected.

Bottom line

Despite all its limitations, where Electric Fence scores is the ease of use — just link your program with the tool once, and it’ll alert you every time it detects a memory issue it’s capable of detecting. However, as already mentioned, the tool requires you to use a source-code debugger like GDB.

 

 

Memcheck

Developer: Valgrind Developers
Reviewed version: 3.10.1
Linux support: All flavors
License: GPL

Valgrind is a suite that provides several tools for debugging and profiling Linux programs. Although it works with programs written in many different languages — such as Java, Perl, Python, Assembly code, Fortran, Ada and more — the tools it provides are largely aimed at programs written in C and C++.

The most popular Valgrind tool is Memcheck, a memory-error detector that can detect issues such as memory leaks, invalid memory access, uses of undefined values and problems related to allocation and deallocation of heap memory.

What’s new

This release of the suite (3.10.1) is a minor one that primarily contains fixes to bugs reported in version 3.10.0. In addition, it also “backports fixes for all reported missing AArch64 ARMv8 instructions and syscalls from the trunk.”

What’s good about it

Memcheck, like all other Valgrind tools, is basically a command line utility. It’s very easy to use: If you normally run your program on the command line in a form such as prog arg1 arg2, you just need to add a few values, like this: valgrind –leak-check=full prog arg1 arg2.

cw_memcheck-output-100627037-large.idge

(Note: You don’t need to mention Memcheck anywhere in the command line because it’s the default Valgrind tool. However, you do need to initially compile your program with the -g option — which adds debugging information — so that Memcheck’s error messages include exact line numbers.)

What I really like about Memcheck is that it provides a lot of command line options (such as the –leak-checkoption mentioned above), allowing you to not only control how the tool works but also how it produces the output.

For example, you can enable the –track-origins option to see information on the sources of uninitialized data in your program. Enabling the –show-mismatched-frees option will let Memcheck match the memory allocation and deallocation techniques. For code written in C language, Memcheck will make sure that only the free() function is used to deallocate memory allocated bymalloc(), while for code written in C++, the tool will check whether or not thedelete and delete[] operators are used to deallocate memory allocated by newand new[], respectively. If a mismatch is detected, an error is reported.

But the best part, especially for beginners, is that the tool even produces suggestions about which command line option the user should use to make the output more meaningful. For example, if you do not use the basic –leak-check option, it will produce an output suggesting: “Rerun with –leak-check=full to see details of leaked memory.” And if there are uninitialized variables in the program, the tool will generate a message that says, “Use –track-origins=yes to see where uninitialized values come from.”

Another useful feature of Memcheck is that it lets youcreate suppression files, allowing you to suppress certain errors that you can’t fix at the moment — this way you won’t be reminded of them every time the tool is run. It’s worth mentioning that there already exists a default suppression file that Memcheck reads to suppress errors in the system libraries, such as the C library, that come pre-installed with your OS. You can either create a new suppression file for your use, or edit the existing one (usually /usr/lib/valgrind/default.supp).

For those seeking advanced functionality, it’s worth knowing that Memcheck can also detect memory errors in programs that usecustom memory allocators. In addition, it also provides monitor commandsthat can be used while working with Valgrind’s built-in gdbserver, as well as aclient request mechanism that allows you not only to tell the tool facts about the behavior of your program, but make queries as well.

Other considerations

While there’s no denying that Memcheck can save you a lot of debugging time and frustration, the tool uses a lot of memory, and so can make your program execution significantly slower (around 20 to 30 times, according to the documentation).

Aside from this, there are some other limitations, too. According to some user comments, Memcheck apparently isn’t thread-safe; it doesn’t detect static buffer overruns). Also, there are some Linux programs, like GNU Emacs, that currently do not work with Memcheck.

If you’re interested in taking a look, an exhaustive list of Valgrind’s limitations can be found here.

Bottom line

Memcheck is a handy memory-debugging tool for both beginners as well as those looking for advanced features. While it’s very easy to use if all you need is basic debugging and error checking, there’s a bit of learning curve if you want to use features like suppression files or monitor commands.

Although it has a long list of limitations, Valgrind (and hence Memcheck) claims on its site that it is used by thousands of programmers across the world — the team behind the tool says it’s received feedback from users in over 30 countries, with some of them working on projects with up to a whopping 25 million lines of code.

 

Memwatch

Developer: Johan Lindh
Reviewed version: 2.71
Linux support: All flavors
License: GNU GPL

Memwatch is a memory-debugging tool developed by Johan Lindh. Although it’s primarily a memory-leak detector, it is also capable (according to its Web page) of detecting other memory-related issues like double-free error tracking and erroneous frees, buffer overflow and underflow, wild pointer writes, and more.

The tool works with programs written in C. Although you can also use it with C++ programs, it’s not recommended (according to the Q&A file that comes with the tool’s source package).

What’s new

This version adds ULONG_LONG_MAX to detect whether a program is 32-bit or 64-bit.

What’s good about it

Like Dmalloc, Memwatch comes with good documentation. You can refer to the USING file if you want to learn things like how the tool works; how it performs initialization, cleanup and I/O operations; and more. Then there is a FAQ file that is aimed at helping users in case they face any common error while using Memcheck. Finally, there is a test.c file that contains a working example of the tool for your reference.cw_memwatch_output-100627038-large.idge.png

Unlike Mtrace, the log file to which Memwatch writes the output (usually memwatch.log) is in human-readable form. Also, instead of truncating, Memwatch appends the memory-debugging output to the file each time the tool is run, allowing you to easily refer to the previous outputs should the need arise.

It’s also worth mentioning that when you execute your program with Memwatch enabled, the tool produces a one-line output on stdout informing you that some errors were found — you can then head to the log file for details. If no such error message is produced, you can rest assured that the log file won’t contain any mistakes — this actually saves time if you’re running the tool several times.

Another thing that I liked about Memwatch is that it also provides a way through which you can capture the tool’s output from within the code, and handle it the way you like (refer to the mwSetOutFunc() function in the Memwatch source code for more on this).

Other considerations

Like Mtrace and Dmalloc, Memwatch requires you to add extra code to your source file — you have to include the memwatch.h header file in your code. Also, while compiling your program, you need to either compile memwatch.calong with your program’s source files or include the object module from the compile of the file, as well as define the MEMWATCH and MW_STDIO variables on the command line. Needless to say, the -g compiler option is also required for your program if you want exact line numbers in the output.

There are some features that it doesn’t contain. For example, the tool cannot detect attempts to write to an address that has already been freed or read data from outside the allocated memory. Also, it’s not thread-safe. Finally, as I’ve already pointed out in the beginning, there is no guarantee on how the tool will behave if you use it with programs written in C++.

Bottom line

Memcheck can detect many memory-related problems, making it a handy debugging tool when dealing with projects written in C. Given that it has a very small source code, you can learn how the tool works, debug it if the need arises, and even extend or update its functionality as per your requirements.

 

 

Mtrace

Developers: Roland McGrath and Ulrich Drepper
Reviewed version: 2.21
Linux support: All flavors
License: GNU LGPL

Mtrace is a memory-debugging tool included in the GNU C library. It works with both C and C++ programs on Linux, and detects memory leaks caused by unbalanced calls to the malloc() and free() functions.cw_mtrace-output-100627039-large.idge

The tool is implemented in the form of a function calledmtrace(), which traces all malloc/free calls made by a program and logs the information in a user-specified file. Because the file contains data in computer-readable format, a Perl script — also named mtrace — is used to convert and display it in human-readable form.

What’s new

The Mtrace source and the Perl file that now come with the GNU C library (version 2.21) add nothing new to the tool aside from an update to the copyright dates.

What’s good about it

The best part about Mtrace is that the learning curve for it isn’t steep; all you need to understand is how and where to add the mtrace() — and the corresponding muntrace() — function in your code, and how to use the Mtrace Perl script. The latter is very straightforward — all you have to do is run themtrace() <program-executable> <log-file-generated-upon-program-execution> command. (For an example, see the last command in the screenshot above.)

Another thing that I like about Mtrace is that it’s scalable — which means that you can not only use it to debug a complete program, but can also use it to detect memory leaks in individual modules of the program. Just call themtrace() and muntrace() functions within each module.

Finally, since the tool is triggered when the mtrace() function — which you add in your program’s source code — is executed, you have the flexibility to enable the tool dynamically (during program execution) using signals.

Other considerations

Because the calls to mtrace() and mauntrace() functions — which are declared in the mcheck.h file that you need to include in your program’s source — are fundamental to Mtrace’s operation (the mauntrace() function is not always required), the tool requires programmers to make changes in their code at least once.

Be aware that you need to compile your program with the -g option (provided by both the GCC and G++ compilers), which enables the debugging tool to display exact line numbers in the output. In addition, some programs (depending on how big their source code is) can take a long time to compile. Finally, compiling with -g increases the size of the executable (because it produces extra information for debugging), so you have to remember that the program needs to be recompiled without -g after the testing has been completed.

To use Mtrace, you need to have some basic knowledge of environment variables in Linux, given that the path to the user-specified file — which themtrace() function uses to log all the information — has to be set as a value for the MALLOC_TRACE environment variable before the program is executed.

Feature-wise, Mtrace is limited to detecting memory leaks and attempts to free up memory that was never allocated. It can’t detect other memory-related issues such as illegal memory access or use of uninitialized memory. Also,there have been complaints that it’s not thread-safe.

Bottom line

Mtrace is a good option if all you’re looking for is an easy-to-use memory-leak detector in Linux. Since it comes as part of the GNU C library, it will likely be pre-installed on your Linux system anyway, so why not use it?

Conclusions

Needless to say, each memory debugger that I’ve discussed here has its own qualities and limitations. So, which one is best suited for you mostly depends on what features you require, although ease of setup and use might also be a deciding factor in some cases.

Mtrace is best suited for cases where you just want to catch memory leaks in your software program. It can save you some time, too, since the tool comes pre-installed on your Linux system, something which is also helpful in situations where the development machines aren’t connected to the Internet or you aren’t allowed to download a third party tool for any kind of debugging.

Dmalloc, on the other hand, can not only detect more error types compared to Mtrace, but also provides more features, such as runtime configurability and GDB integration. Also, unlike any other tool discussed here, Dmalloc is thread-safe. Not to mention that it comes with detailed documentation, making it ideal for beginners.

Although Memwatch comes with even more comprehensive documentation than Dmalloc, and can detect even more error types, you can only use it with software written in the C programming language. One of its features that stands out is that it lets you handle its output from within the code of your program, something that is helpful in case you want to customize the format of the output.

If making changes to your program’s source code is not what you want, you can use Electric Fence. However, keep in mind that it can only detect a couple of error types, and that doesn’t include memory leaks. Plus, you also need to know GDB basics to make the most out of this memory-debugging tool.

Memcheck is probably the most comprehensive of them all. It detects more error types and provides more features than any other tool discussed here — and it doesn’t require you to make any changes in your program’s source code.But be aware that, while the learning curve is not very high for basic usage, if you want to use its advanced features, a level of expertise is definitely required.

 

 

If you have some of your favorites please share with us in comments

The best open world games

GTA 5:

 

StalkerKgNfsHYhJpQz.840x0.Vdef9Kkm.jpg

Assassin’s Creed 4: Black Flag24wkZOIm-reR.840x0.Vdef9Kkm.jpg

The Witcher 3

Just Cause 2

 

Saints Row 48Ah_CyqAl5dF.840x0.Vdef9Kkm.jpg

 

Batman: Arkham Knight5ssqO_YBw5eO.840x0.Vdef9Kkm

Dwarf Fortress

 

Far Cry 42CogvDyeCXWT.840x0.Vdef9Kkm

Minecraft

 

If you have some of your favorites please let us know in comments.

Coinbase launches the first ever Bitcoin debit card

ruth-1.jpg

Today Coinbase announced a new Bitcoin debit card that will allow U.S. users to pay with Bitcoin anywhere Visa is accepted.

The new Bitcoin card is the result of a partnership with Shift Payments, a Y Combinator-backed startup that has been working on a cryptocurrency credit card for well over a year. Shift teamed up with Visa on this new card, giving card users the ability to pay with Bitcoin at 38 million merchant locations.

The card will be available to Bitcoin owners in 24 states in the U.S. and can be used to make purchases both at physical retailers and online. To get the card, Coinbase users need to connect their account to the Shift payments system, provide an address, and pay a $10 card-issuing fee (paid for with Bitcoin, of course).

For the Bitcoin ecosystem, the Shift Card marks a major step forward, giving Bitcoin owners more opportunity to spend their Bitcoin easily.

Bitcoin is a digital-only currency allegedly developed by someone named Satoshi Nakamoto. It is a democratized currency, meaning it is regulated by a community of people rather than a government. It has a transparent transaction network maintained by a group of people called miners that earn Bitcoin in exchange for their work. Miners process Bitcoin transactions and then post them to a public ledger called the blockchain. The system relies on a community to ensure that money in the system is accounted for and tracked, instead of using a private institution like a bank.

An increasing number of businesses both large and small have begun accepting Bitcoin, including PayPal, Microsoft, Reddit, Overstock, and Amazon. Bitpay and Coinbase both provide solutions for accepting cryptocurrency, as do a few smaller players. For example, the San Francisco, California-based startup Snaps set up area merchants with point-of-sale systems that accept Bitcoin last holiday season. But these systems haven’t really encouraged Bitcoin owners to pay with Bitcoin at stores.

In this way, the Shift Card could be a game changer. It takes an existing behavior — swiping a credit card — and applies it to a totally new form of currency. It may be somewhat counterintuitive, but it is exactly the kind of innovation that Bitcoin needs in order to become more widely used.

Shift Card holders will be subject to some restrictions. For instance, users won’t be able to spend more than $1,000 a day, and ATM withdrawals from a Coinbase account will be limited to $200 a day. However, if you link the card to a Dwolla account, you can withdraw up to $500 daily.

Transactions are free, but you’ll pay between $2.50 and $3.00 when you take money out at an ATM. International transactions incur a 3 percent charge.

The Shift Card is available to residents in Alabama, Arizona, Delaware, Georgia, Idaho, Iowa, Kansas, Maine, Minnesota, Nevada, New Jersey, North Carolina, North Dakota, Oklahoma, Pennsylvania, Puerto Rico, South Dakota, Texas, Vermont, Washington, Washington D.C., and West Virginia, and in limited testing in California.

 

If you like our posts please let us know in comments

Facebook launches messenger for people at work

work_chat_app_screenshot_google_play.jpg

Facebook has launched a version of Messenger that’s meant for the office. The app, first spotted by TechCrunch, is an expansion of Facebook at Work, a business platform Facebook has been testing that allows co-workers to talk and collaborate. Everything about Facebook at Work and its new Work Chat app looks almost identical to the Facebook and Messenger we all know — which means, thankfully, you can still use stickers — the only real difference is that the network is limited to people within a single company. Right now, Work Chat is only available on Android and only for people in companies using the limited Facebook at Work beta. TechCrunch reports that an iOS app is in the works.

Messaging had already been built inside of the core Facebook at Work app, but like with the standard Facebook app, it’s being unbundled, seemingly because the stand-alone app is a bit more capable. There’s also a larger battle around workplace chat that Facebook wants to be part of. Most notably, Slack has been storming the startup world as the chat app to replace basically every other communications tool in your business. Slack doesn’t do much on its own other than chat, but it can be integrated with many other popular tools, like Trello. Facebook at Work, on the other hand, has the advantage of already being familiar to people and offering many of its own built-in tools, like event invites and team pages.

source:TechCrunch

If you like our posts please let us know in comments.

Access PC files on smartphones

Yes, you heard that right. You can access your computer’s hard drive with your smartphone in few simple steps.  For this, you don’t have to download or install any big software on your PC or  smartphone. Your Android’s file explorer can do the task easily.

The good thing with this tutorial is that you can copy and paste big files, software, and other things easily to your phone at high speed. Let’s take a look at how this works:

To make this trick work, you should be connected to same network (Wi-Fi).

Step 1: Right click on the drive you want to share.  Use the below-mentioned path to share this folder. You will see an icon appeared which mean the drive is shared.

Properties> Sharing> Advance sharing>share this folder.

public-access.jpg

Step 2: In order to access files from hard drive with smartphone open ES file explorer.  Now click on the three line hamburger symbol then click on LAN

access-files-PC-android-1.jpg

Step 3: Now perform a scan and you will see  your PC if it’s connected to the same network. Now enter the username and password of your PC.  There you will see the shared folder. 

access-files-PC-android-2.jpg

Step 4: Here you will all the items in your computer’s drive. You can tap and hold to copy or cut any folder to your smartphone.

access-files-PC-android-31

I performed copy action and achieved nearly 5 Mbps speed.

 

access-files-PC-android-4.jpg

 

 

If you like our post please let us know in comments

Know about CyanogenMod

Install-Official-CM-12-Android-5.0.2-Nightly-ROM-for-Sprint-Galaxy-Note-3-LTE-600x340CyanogenMod is one of the best known custom ROMs out there, enabling millions of users around the world to customize their devices to the fullest. With the popularity of CyanogenMod, the developer community enjoyed great success over the years. So much so, that the people behind CyanogenMod started Cyanogen Inc, and developed partnerships with phone manufacturers to have CyanogenMod as the default operating system.

What is a custom ROM?

CyanogenMod started out as a simple alternative to stock Android on the HTC Dream and HTC Magic.

Google releases the source code for Android via the Android Open Source Project (AOSP), which allows anyone to download the source code for stock Android and modify it to their liking. Many people add features or try to further optimize the operating system to improve performance. When people talk about flashing ROMs, they are referring to overwriting the old version of Android that is installed and replacing it with a third party alternative, like CyanogenMod. This sounds sketchy in a way, but just because the ROM is supported by the community, rather than a commercial entity, it does not mean that they are any less stable. In my experience, custom ROMs have been just as stable if not more so than OEM supplied ROM, depending on the ROM of course.

However, the term “ROM” is not necessarily used correctly when talking about the third party custom firmware. A “ROM” in computer science is “Read-Only Memory” which can only be read and not written to more than once in the most basic sense. Smartphones and tablets use flash memory to store the Android OS, so the correct term should be “custom firmware”. This naming convention may lead to some confusion when talking about custom ROMs, just remember, the firmware is being changed, not any ROMs that might be in the device.

The roots of CyanogenMod

CyanogenMod started out as a simple alternative to stock Android on the HTC Dream and HTC Magic with the initial release of CyanogenMod 3.1 in 2009. With Android’s open source nature and the ability to obtain root access, anything is possible, and with the popularity of the custom ROMs, the CyanogenMod community blossomed. CyanogenMod really started to be recognized with CyanogenMod 7, based on 2.3 Gingerbread. This release added new and improved features over stock Android like BusyBox in the shell, as well as improving the stock apps.

CyanogenMod release cycle and style

CyanogenMod version numbers work just like Android version numbers, i.e. CyanogenMod A.B means that “A” is the major release number and “B” is a minor release number. From version 9 to 10.2, there were a few different types of releases. These included:

  • Nightly – A build generated every 24 hours, newest features but HIGHLY unstable in most cases, not good enough for a daily driver.
  • Experimental – More stable than the nightlies and may be used in other custom ROMs as a base.
  • M Snapshot – More stable than the last two, but still may have some minor issues.
  • Release Candidate – Basically stable, some very minor issues may be present, good enough for daily use.
  • Stable – Pretty much all of the bugs have been squashed. These builds will take a very long time to actually be released.

After 10.2, CyanogenMod has changed the release cycle and the names of everything to simplify the process. This time there are only two options:

  • Development Channel – Same as the nightlies from before, every 24 hours and are highly unstable.
  • Release Channel – M snapshots are made each month which are suitable for daily use, although they lag behind the nightly builds by two weeks as far as features and improvements.

Impact on the dev community

Being the biggest custom ROM, there is obviously an impact on the rest of the dev community, XDA is full of custom ROMs that are based on CyanogenMod. Even the custom ROM that I helped on was based on CyanogenMod for certain devices. Getting everything set up and working from a CyanogenMod base is easier than using stock Android, since a lot of stuff like the theme chooser is already built in, so there is no need to add it.

Advantages over stock Android

cmbootanimation-531x302

The whole reason behind installing a custom ROM is to add features, improve performance, or change the look of stock Android. This is exactly what you get to do with CyanogenMod. There are features in CyanogenMod that are simply not available in stock Android, like the ability to change the status bar to your liking, or apply different themes.

CyanogenMod brings a lot to the table in terms of options, but one of the biggest advantages is root access. Root gives you administrative rights (in Windows terms) to your file system. This means that you can access all of the system files, which in turn allows allows app to do more. For example, there is no official way to backup app data easily, however you can use Titanium Backup and its “root needed” features. This is one of the best apps I have ever used and it should be standard for all devices, you can backup apps no problem and transfer them to any device without fail. There are many other apps like this that just make your life a lot easier. However, a word of warning, root access is not as secure as non-rooted.

How to flash

The first thing you need to do is download the ROM from the development channel or release channel. The general download page can be found here, it is helpful to know your device’s codename, which can easily be looked up with a quick Google. From this page you can download the latest nightly, the option to download a M snapshot or experimental build on the left panel. The next steps can get complicated, but it gets easier once you get used to it. Quick note, this WILL NOT work on all devices, only supported ones.

  • Kiss your warranty goodbye (Android Authority is not responsible for your device, proceed at your own risk.)
  • Unlock your device’s bootloader – This can be very difficult in some cases and is pretty much different for all devices. This will wipe the device clean, so make sure to backup any important data.
  • Install a custom recovery like TWRP or CWM Recovery. This can be done a few different ways, but the best way is through the terminal. Simply download the .img file from the respective site then save it to your computer in a convenient location. once downloaded, make sure ADB and the Android SDK are installed on your computer and working properly. In the terminal or command prompt type “fastboot flash recovery (location of recovery on computer)“. An example would be: “fastboot flash recovery c:\recovery.img”. Once this is finished, reboot your device. The device should boot normally.
  • Flash the ROM zip file, it is basically the same for each recovery, just click “install” then navigate to the folder with the file or if you are using CWM Recovery click “Install” then “Choose zip from SDCard” then navigate to the folder with the file. Then accept the prompt to install it, do not reboot yet, stay in recovery.
  • Flash GApps zip – GApps stands for Google Apps, since these are owned by Google, CyanogenMod can not come pre-installed with them, so just simply flash the zip like you would for the ROM right after installing CyanogenMod. Android 5.1.x GApps and Android 6.0 GApps can be found here, just select the options you want.
  • Reboot! If everything went according to plan, the device should boot into CyanogenMod.

Wrap-Up

CyanogenMod started as an alternative to stock Android and grew into a company that influences a lot of the dev community, it even has phone manufacturers backing them. While flashing CyanogenMod may be sketchy to install at first, once master it is worth it. With the customizability of CyanogenMod and the things you can do with root, the sky’s the limit.

source:AndroidCentral

If you have some of your own views about cyanogenmod, please share in the comments.

10 Powerful hacking tools for Kali linux

maxresdefault

Kali Linux, the hacker’s operating system is very powerful Linux distro and it is my favorite OS, not only my favorite but also many Hackers and pentesters choosing Kali Linux as their favorite hacking tool. The main reason hackers and newbies like Kali is because it is blessed with 300+ hacking tools and it has developed by Offencive Security team, so today i want to introduce you the top 10 tools i like most in kali linux. Here i am giving tutorials for each hacking tools so everybody can understand it well.

1. Metasploit

Metasploit has become over the years the best framework to conduct penetration testing on network systems and IT infrastructure. The Metasploit Project, or better known as simply ” is a hugely popular pentesting or hacking tool that is used by cyber security professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

Metasploit is in fact a sub-project of the Metasploit Framework. This hacker tool and framework is best known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

2. THC Hydra

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH.

 
 

3. Sqlmap

Basically its just a tool to make Sql Injection easier. Their official website introduces the tool as -“sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.”

 

4. Nikto

There are a number of tools and applications to find vulnerabilities in websites, but one of the simplest (and one of my favorites) is nikto.

This small and simple tool examines a website and reports back to you the potential vulnerabilities that it found that you could use to exploit or hack the site. In addition, it’s one of the most widely used website vulnerabilities tools in the industry and in many circles considered the industry standard.

 

5. Ettercap

Ettercap has a huge following and is widely used by cybersecurity professionals. Ettercap works by placing the users network interface into promiscuous mode and by ARP poisoning the target machines, i.e. facilitating a ‘Main In The Middle’ or MITM attack. Once successfull Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

 
 

6. BeEF

 

BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.

 

7. Wireshark

Wireshark, formerly known as Ethereal, is one of the mostpowerful tools in a network security analyst’s toolkit. As a network packet analyzer, Wireshark can peer inside the network and examine the details of traffic at a variety of levels, ranging from connection-level information to the bits comprising a single packet. This flexibility and depth of inspection allows the valuable tool to analyze security events and troubleshoot network security device issues. It’s also priced right: it’s free!

 

 
 

8. Maltego

 

Maltego is capable of gathering information about either a network or an individual; here we will focus on the former and leave individual information gathering for another time. We will be looking at gathering info on all the subdomains, the IP address range, the WHOIS info, all of the email addresses, and the relationship between the target domain and others.

 

 
 

9. Msfvenom

From 8th june 2015 we will no longer receive the services of msfpayload and msfencode. They are going to retire permanently. Yeah! Permanently off course this is a bad news. These both tools are serving us since ten years but the time has come to say good bye. Thank you msfpayload and msfencode for serving us in every level of hacking or penetration testing we will never forget you.

But the good news is msfpayload and msfencode are being replaced by a new tool called msfvenom. This is the combination of both the tools, almost from three and half years this new tool is being tested and the time has come to use it.

 

10. Wireless Auditing

In this Section i am introducing you to the 3 wireless hacking tools, Aircrack-ng, Reaver, and Pixiewps. PicaTesHackZ do not condone the illicit activities of wireless auditing on unauthorized systems. We do however encourage you to use this knowledge to your benefit to learn and practice exploitation using the latest in Wireless Auditing. Although I did do a write up about using reaver and pixiewps, there has been updates, I have more tests, and more knowledge on the tools. Please keep in mind it is illegal to penetrate networks that are not your own without proper permission. This falls on you, so do what you will but we will hold no liability for your actions.
If you have some of your own favorites please let us know in comments.

5 high-tech engineering fields in demand

Engineering is, by definition, the blending of design, machines, structures and technology — so it’s no surprise that today’s rapidly evolving, technologically-driven job market means that engineers are in a prime position to move rapidly up the corporate ladder.

Engineering spans a countless number of industries and markets, from electrical engineering to software engineering, chemical engineering, mechanical engineering… the list goes on and on. And as millennials begin to take over the job market — it’s a widely cited statistic that millennials will make up 50% of the global workforce by 2020 — we’re seeing more futuristic and, dare we say, sexier-sounding job titles emerging in high-tech fields like VR and green energy.

 

For engineers drawn to the fascinatingly technical aspect of the career path, below are a few niche jobs that may be appealing.

1. Virtual or augmented reality engineering

Virtual reality is a hot topic for 2015, with a plethora of high-profile companies like Google and Nokia dabbling in the burgeoning industry. Whether it’s the task of developing the 3D models for virtual reality video game testing, or engineering the physical devices for filming and viewing an augmented reality film, engineers have their work cut out for them in this exciting field. Millennials are particularly intrigued by VR as a generation open to experimenting with and embracing new technologies.

The possibilities for a career in this field are nearly limitless as more and more companies take on virtual or augmented reality projects; even traditional industries like banking are testing VR technology in an effort to attract a younger market and help clients visualise complicated financial models or portfolios. Software engineers itching to get into the field can search for job titles ranging from 3D modeller/artist or optical design engineer, to VR developer, to multimedia engineer.

2. Drone engineering

Drone and UAV technology is another field millennials can’t seem to get enough of. A recent article on the future of retail suggests that drones may pique millennials’ interest due to the promise of instant gratification, a major appeal to a generation raised on clicks, likes and “there’s an app for that.”

Global companies are eyeing drone technology, from the expected tech behemoths like Amazon — the company plans to begin instituting drone delivery systems as soon as a year or two from now — to surprising corporations like McDonalds. Engineers interested in drone technology should concentrate on job titles such as UAV developer or UAV aerospace engineer.

3. Biomedical engineering

While healthcare or biology may initially appear on the dry end of the spectrum of engineering career possibilities, the truth is that the field is far from dull. Biomedical technologies are shaping the future of healthcare, from bionics to nanomedicine and beyond. The engineers in charge of developing, testing, maintaining and troubleshooting these technologies get a hands-on experience with some of the medical community’s most advanced and exciting projects; they’re literally shaping the future of healthcare.

 

For millennials interested in the field, a career as a biomedical engineering technician is one place to look. This job is primarily responsible for handling biomedical technology, as well as transporting, calibrating and troubleshooting such equipment.

4. Modern structural engineering

Architecture is a constantly evolving profession, and with it, city planners and structural engineers have to keep up. Recent pushes for urban sustainability and modern aesthetics mean that today’s engineers have their work cut out for them. The field is a good fit for engineers with an eye for design, a passion for sustainability and green energy, and a meticulous approach to work.

Structural engineers must be prepared to work closely with designers, as well as develop familiarity with all of the latest softwares necessary for the job. These are often roles that require working in teams, making them a fit for many millennials, who tend to thrive in collaborative environments.

5. Nuclear engineering

Few jobs sound quite as cool as a “nuclear engineer,” and the field itself is increasingly important as the need for alternative forms of energy becomes ever more pressing. Engineers in this field help with the research and development processes as well as the specific systems involved in harnessing nuclear energy, and often are tasked with finding practical uses for or repurposing radioactive materials.

The “cool factor” is just part of the appeal to a millennial job seeker: nuclear energy is often cited as a viable option for helping to mitigate climate change, and millennials tend to favor careers and companies that focus on socially impactful work.

source:Mashable

If you like to improve our posts please share your views in comments.