Top 10 Well Known Hacking Groups Of All Time

hqdefault.jpg

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these hacker groups operate against the law. Some of the hacker groups have since disbanded after being in public eye. The prime example of infamous hackers group is Lizard Squad. They DDoSed the PlayStation and Xbox servers right during the time of Christmas weekend earning them many villains.

Today we are listing top such 10 most notorious hackers of all time.

1. Lizard Squad

The DDoS attack on Facebook that lowered the popular social media network as well the cyber attacks on Malaysia Airlines website that directed visitors to a page which read “404 – plane not found,” were carried out by the Lizard Squad. While Facebook refused to accept being hacked, Malaysia Airlines stated that their domain had been temporarily redirected elsewhere and that they had not been hacked. Lizard Squad has also hacked Microsoft and Sony.

The intentions of Lizard Squad look dark and gloomy due to the diverse history of their work. They are not totally computer hackers as most of the hack they do is comedy. The group is responsible for a high-profile hack of Microsoft Xbox Live and Sony’s Playstation Network. In August 2014, the group posted the ISIS flag on Sony’s servers and made other indirect references to the “cyber caliphate.” The group was arrested by the authorities in the U.S. and England after the Xbox and Playstation hacks.

2. Syrian Electronic Army

The Syrian Electronic Army claims to target political opposition groups and claims to support the Syrian President Bashar al-Assad. It calls itself “a group of enthusiastic Syrian youths who could not stay passive towards the massive distortion of facts about the recent uprising in Syria”.

It becomes involved in the use of malware, phishing, defacement, spamming, and denial of service (DDoS) attacks with often posting the Syrian flag on a victim’s website. Some have even assumed as a fact that the group is connected with the Syrian state. The group have targeted the Facebook pages and Twitter accounts of President Barack Obama and French President Nicolas Sarkozy, as well as technology companies and news organizations. Their tone is “serious and political to ironic and humorous.”

3. LulzSec

After the HBGary Federal hack of 2011, LulzSec – Lulz Security abbreviated – formed as an Anonymous spinoff. It’s slogan was “Laughing at your security since 2011.” The group announced itself with a hack against Fox.com, then Sony Pictures in 2011. The group took the CIA website offline.

LulzSec had become well known for ridiculing its victims after an attack, which made the analysts compare them to the hacks to internet pranks. In June 2011, a ‘50 days of Lulz’ statement announced that the group had fallen out. However, on July 18, the News Corporation was hacked by the group, who had posted false news about the death of Rupert Murdoch.

In 2012, the LulzSec members were arrested by the FBI after the group’s leader, Sabu, turned them in. Prosecutor Sandip Patel said the group thought of themselves as “latter-day pirates.”

4. Anonymous

“We are Anonymous. We are Legion. We do not forgive. We do not forgive…. Expect us.”

Known most for its hacking and Guy Fawkes masks, Anonymous is a decentralized open online creation group. Reports conceive that Anonymous is made up of thousands of “hacktivists.” The group has compromised religious, corporate and government websites.

The group has declared war on Scientology and hacked the Pentagon. In 2012’s Operation Payback, they also attacked MasterCard, Visa and PayPal for refusing to process payments to WikiLeaks, which in turn led WikiLeaks to choose the cryptocurrency Bitcoin. Anonymous supported Occupy Wall Street and hacked the New York Stock Exchange website in 2011.

For being involved in Anonymous, individuals have been arrested in the U.S., UK, Netherlands, Australia, Spain, and Turkey.

5. The Level Seven Crew

Rumored to be encouraged by the seventh level of hell from Dante’s Inferno, ‘the violent’ level, this hacking group hacked 60 high profile computer systems (NASA, The First American National Bank, Sheraton Hotels) in 1999. They also hacked into the US Embassy in China’s website. However, this group broke up and stopped functioning in 2000.

6. Network Crack Program Hacker (NCPH) Group

It was alleged that the NCPH Group was formed in China in 1994, whose leader Tan Dailin was apparently working for the Chinese army. It is believed that the People’s Liberation Army was funded by the NCPH. The group appears to be based out of Zigon in Sichuan Province.

7. Chaos Computer Club (CCC)

The mission of the Chaos Computer Club is to uncover the security flaws, which basically does not only depend upon illegal activities. It was founded in Berlin during the early 1980s and is one of the largest European hacking groups. The group made its point after they used the Bildschirmtext page to steal 134,000 Deutsch Marks from a Hamburg bank, only to send the money back after having completed its mission the next day, which was to expose a security flaw.

Early CCC member Andy Müller-Maguhn in an interview with OWNI stated: “we needed a lot of legal experts to advise us what we could or could not hack, and to help us distinguish between legal activities and grey areas of legality”. The group’s kindly approach has allowed the CCC to become “an accepted and recognized entity because it has worked to educate the public about technology since the 1980s,” Müller-Maguhn added. The group’s most recent focus has been on the mass surveillance complex, in order to fit in a German hacker ring. CCC Member Falk Garbsch stated:

There have to be consequences. The work of intelligence services has to be reviewed – as does their right to exist. If necessary, their aims and methods will have to be redefined. …We have to think about how these [shared]data are processed and where they can be allowed to resurface. And this is not just the challenge for 2015, but for the next 10 years.

The group has strongly objected French nuclear tests, made full use of COMP128 encryption algorithm of a GSM customer card, stole money on live TV via Microsoft’s ActiveX; and examined the German federal government’s own malware. The group’s press release on the topic reads:

“The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.”

The CCC may have characteristics of a Marxist, after being caught selling source code from U.S. corporations and governments to the Soviet Union’s secret police KGB.

8. globalHell

globalHell was founded by street-gang member Patrick Gregory. Data on 115 websites were reportedly destroyed by the group charging millions in damages. In order to get away from street gang life, Gregory had turned to computer. His crew of hackers behaved basically the same as a street gang. “global hell will not die” was reportedly written by the group on the United States Army’s website. Gregory confessed in court to causing $2.5 million in hacking damages.

9. Iran’s Tarh Andishan

Looks like the Tarh Andishan wants to control the world’s web-based systems. Mostly based in Tehran, Iran, the group is approximated to have 20 members. A talented hacker group, Tarh Andishan looks like grew out of a Stuxnet worm virus, which Iran claimed the US and Israel had created.

The Iranian government doubled-down on its cyber warfare. The group uses self-propagating software, backdoors, SQL injection, systems, and other techniques. The group is best known for one of the attacks called “Operation Cleaver.” This hacker group has apparently hacked security systems and airline gates. Most findings were not taken into consideration due to the “grave risk to the physical safety of the world” the group reportedly poses, according to the report.

10. TeaMp0isoN:

A 16-year-old hacker with a pseudonym TriCk started this group in 2010. TeaMp0isoN hacked into Facebook, NATO, the English Defense League, including Tony Blair’s email account. The group broke up and stopped functioning in 2012. However, in 2015, the group rebranded itself as a white-hat computer security research group.

There are several other hacking groups who may be more deadlier than the above. We have listed only those hacker groups who have consistently been able to be in public eye due to their hacking exploits.

source:TechWorm

You can list the hacker groups which you think should have been included in the top 10 list, in the comments below.

See what google does for new search queries

0827.sdt-blog-google

Most people don’t notice when Google updates its search engine with new algorithms. But in order to help users sift through the billions of sites on the Web (with 822,240 new ones added each day), the company needs to keep improving its capabilities.

Bloomberg reports that over the past few months, Google has been testing an AI-based system called RankBrain to help parse users’ queries, especially those that the search engine has never encountered before.

Of the millions of queries it receives each second, about 15 percent of them are completely new to Google. RankBrain helps the search engine better understand these ambiguous queries, such as, “What’s the title of the consumer at the highest level of a food chain?” so it can serve up useful results.

It works by embedding written language into mathematical entities that the search engine can make sense of. It also guesses which words and phrases are similar in meaning to each other so it can help simplify queries for Google to look up.

Greg Corrado, a senior research scientist at Google said that of the hundreds of ‘signals’ that go into shaping a search algorithm, RankBrain has quickly become the third most important one in contributing to the result of a search query.

When the company’s search engineers who work on said algorithms were asked to look over a few pages and predict which ones Google would rank highly in search results, they managed to guess correctly 70 percent of the time. RankBrain’s success rate was 10 percent higher.

The use of artificial intelligence in search signals how software and services will be built in the future. Implementing machine learning allows companies to understand copious amounts of data to serve a global user base.

But these powerful technologies need a lot of work before they’re useful to companies and users. RankBrain was in the works for a year before the company began testing it with a dozen users and was then rolled out across all of Google Search.

Corrado notes, “Machine learning isn’t just a magic syrup that you pour onto a problem and it makes it better. It took a lot of thought and care in order to build something that we really thought was worth doing.”

 

If you like to help us improve our story please let us know in comments

Most expensive domain names of all time

Domains-for-Sale.jpgIt is a known fact that people create Website and then sell them for money. People also purchase exclusive Domain names and later sell them for a huge lump sum. There is a lot of money in Website flipping and Domain flipping and some people really make good money in this business.

People usually would buy the domains with a vision that it will fetch good value and thus this is a sort of investment for some who are involved in this business. What you need to do is, purchase a website or domain with some exclusive name and then wait for some time till it gains popularity or till you get some good buyer.

This article brings to its readers the Top 20 most expensive million dollar Domain names of all the time which have been sold till date. Surprisingly some of these sites were sitting for almost two decades and have been purchased recently; besides it was also found that all these sites fall in the ‘.com’ category. It was also found that gambling and sex related domains are the ones which have fetched one of the best prices!

VacationRentals.com :

Sold for $35 million and Year: 2007: The new owner of this website is Brain Sharples, CEO of HomeAway. Sharples confirmed he purchased the domain because he did not want Expedia, competitor of HomeAway to acquire it.

PrivateJet.com:

Sold for $ 30.18 million and Year: Feb 2012Nations Luxury Transportation, LLC (Nations) acquired the domain name http://www.PrivateJet.com, from Don’t Look Media.com which is a leading intellectual property holding firm.

Insure.com:

Sold for $ 16 million and Year: 2009: The domain name was purchased by marketing firm QuinStreet. It was the second highest deal of all times and this record was broken by PrivateJet.com.

Sex.com:

Sold for $13 million and Year: Oct 2010: One of the first domains related to porn industry to be sold was Sex.com. Due to this high value transaction Sex.com also entered the Guinness Book of World Records. Escom LLc, sold it to Clover Holdings Ltd, as it had gone bankrupt. Being linked to ‘sex’ the domain is just doing well and is one of the most searched words on the search engines!

Fund.com:

Sold for $9.9 million and Year: 2008: Major purpose of this domain is financial service. Clek Media brokered a deal and it seems the domain was purchased by a company known as Fund.com, in the year 2008. However, after this all cash deal, the company seems ran in a lot of trouble and declared most of its financials unreliable in 2009. As of now if one checks the site it displays a white background with a phrase: “Please come back later to check FUND.com”. The domain thus is not live and there is no idea if the owner is waiting to resell the domain.

Porn.com:

Sold for $9.5 million and Year: 2007: During the time of sale, this sale was a biggest all-cash transaction for domain name and the next to Sex.com. The domain was purchased by MXN Limited and Moniker helped to sell this domain. Needless to say the domain is just flourishing and this is another domain related to porn and most searched in the search engines.

Fb.com:

Sold for $8.5 million and Year: Nov 2010: Fb.com was purchased by Facebook from American Farm Bureau Federation. Presently, the domain has been redirected to http://www.facebook.com.

Porno.com:

Sold for $8.9 million and Year: Feb 2015: Rick Schwartz, the ‘Domain King’ had bought the website from a college kid in 1997 for mere$42,000. Surprisingly, the kid had snagged the name for $5,000 just a week before. It seems the site earned more than $20 million in all, initially it earned over $10 million via parking and redirects without every providing actual adult content, as explained by Schwartz. The buyer of the site was a company in Prague that also owns Swingers.com and PornoTv.com.

Z.com:

Sold for $6.8 million and Year: Nov 2014:  The domain was owned by Nissan for its Z series of cars and then it was sold to Japanese domain biz GMO registry. Z.com was sold for $6.8m (£4.3m, 800m yen) thus placing it in the top ten of all time domain sales. Currently, there exists only three single character domain names and Z.com is one of these in the .com space.

Diamond.com:

Sold for $7.5 million and Year: 2006: Currently, the domain is in use and acts as an online shopping site for diamonds. This shows why the buyer paid a huge amount for the domain name, well he is actually using the site to sell the precious stones!

Casino.com:

Sold for $5.5 million and Year: 2007: The domain was purchased by Mansion Limited of Gibraltar and has proved to be a great investment for the new owner.

Slots.com:

Sold for $5.5 million and Year: 2010: The site was purchased by a Russian online gaming site known as Bodog who also created new game on this domain. Originally the domain name was registered way back in 1995 and is being used as an online gambling portal. Seller’s identity was not disclosed.

Toys.com:

Sold for $5.1 million and Year: 2009: Initially as a part of bankruptcy court proceedings the site was sold for $1.25 million. After some days the site was put up for auction and then Toys R Us surprised everyone when it was able to shell out $5.1 million.

Clothes.com:

Sold for $5 million and Year: 2008: Zappos, a shoe company bought the domain Clothes.com. Now, both Zappos and Clothes.com are owned by Amazon and Clothes.com still directs users to Zappos’s apparel selection.

Medicare.com: 

Sold for $4.8 million and Year: May 2014: As per Domain names sales report, the domain Medicare.com has been bought by eHeathInsurance.com. Further, the company has paid $4.3 million in cash and $300,000 in debt as per the reports.

IG.com:

Sold for $4.7 million and Year: Sep 2013: The domain was earlier owned by Brazil search engine iG and was purchased by London’s IG Group. Igloo/NetNames helped to sell this domain.

Icloud.com:

Sold for $4.5 million and Year: 2011: After acquiring the ‘iphone.com’ domain Apple was searching for all the domains with prefix “i” and ultimately it acquired this domain. Though for Apple this deal seems to be sort of peanuts!

Whisky.com: 

Sold for $3.1 million and Year: March 2014: The domain was purchased way back in March 1995 by Michael Castello. As per Castello he had registered it for free! He also wrote in DN Journal: “I always liked Scotch whisky, but the real reason I registered Whisky.com was because of the Whisky a Go Go night club in Hollywood. I always enjoyed ‘The Whisky’, with its musical heritage and scene where the likes of The Doors and Janis Joplin played. Years later, I even offered Whisky.com to the owner’s son and he told me he didn’t need it since they already registered WhiskyaGoGo.com. That rejection would prove to be good for me.” Finally in 2014, Whisky.com was sold by Castello Cities Internet Network in a domain-only sale.

MI.com: 

Sold for $3.6 million and Year: Apr 2014: Xiaomi, the Chinese smartphone maker purchased this domain through a private sale. This was one of the most expensive purchases by a Chinese Internet company. Xiaomi contemplates to use this as their brand name as it is much easier to remember.

Candy.com:

Sold for $3 million and Year: 2009: The owner of this domain, Rick Schwartz sold Candy.com to G&J Holdings for an amount of $3 million in 2009. Greg Balestrieri and Joe Melville own the G&J Holdings, a candy company. The cousins wanted a simple domain which could provide easy access to sugary sweets online and hence they purchased this domain.

 

 

These are just Top 20 domain names given here, there are many others in the list which can be found in the DN Journal.

 

If you like to improve our posts please share your views as comments below.

 

The Top Hacker Tools you need to know!!!

blackhat

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.

If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2. Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4. Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6. THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7. Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the Concise list)

9. Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10. Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.

 

source: Techworm,Concise

 

If you have any favorite tool of your own which we have not mentioned in the article, kindly mention it in the comments so that we can include it in our next list.

Boost your Wi-Fi easily!!!

 

Are you bogged down by your slow Wi-Fi internet connection, chances are most of you are, since speed can never be enough for most of us. Jokes apart, there might be some issues interfering with your Wi-Fi network leading to slow speeds. However, if you’re 100 per cent sure of your network and are looking for manual tweaking of the network to increase your speed, well, we have got some tricks just for you!

 

1.Using that handy tinfoil!


This is a quick and easy way to get more range for pennies. Did you know you can use a little tinfoil to increase your signal strength by several decibels. Cheack the following video out by clicking here

 

2.Sharing your Mac’s internet connection wirelessly

System Preferences > Sharing > Internet > Add Source (Ethernet) and the way the other computer will connect (Wi-Fi) > Check Internet Sharing to create a Wi-Fi hotspot

3.NetStumbler

NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.

4.Turn off SSID broadcasting

Access point admin page > Uncheck ‘Enable SSID Broadcast’ to prevent devices from listing your network as one of the detected options.

5.Limit devices that can connect to your wireless network

Create a device access list of MAC addresses that can access your network.

6.WPA Encryption

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).

To switch to WPA: Access point’s admin page > set your WPA passphrase to something difficult to crack.

7.Wireshark

Wireshark is a free and open-source packet analyser. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is cross-platform, using the GTK+ widget toolkit in current releases, and Qt in the development version, to implement its user interface, and using pcap to capture packets; it runs on GNU/Linux, OS X, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows.

8.Wireless signal repeater

A wireless repeater takes an existing signal from a wireless router or access point and rebroadcasts it to create a second network. When two or more hosts have to be connected with one another over the IEEE 802.11 protocol and the distance is too long for a direct connection to be established, a wireless repeater is used to bridge the gap. It can be a specialiSed stand alone computer networking device. Also, some WNICs optionally support operating in such a mode. Those outside of the primary network will be able to connect through the new “repeated” network.

Best 10 antivirus and antimalware free opensource applications

antivirus

Contrary to what many people think, anti-malware programs do not end with Symantec, McAfee etc. The world of open source has quite a few options in the anti-malware and anti-spyware segment. Here are 10 of the best that you can use!

1. ClamWin Free Antivirus


This is an app that works only on the Windows platform and works on the well known ClamAV engine in order to detect spyware and viruses. It has a Microsoft Outlook plug-in, automatic downloads and other useful features.

2. ClamAV

This is an open source product that is based on the Clam Antivirus engine. It is specially designed in order to protect email gateways. It has features like command line scanners, automatic updates. It works on Linux, Unix and BSD platforms.

3. Moon Secure Antivirus

This open source app is based on ClamAV and works on the Windows platform. Although it is based on ClamAV, developers usually use an alternate antivirus engine.

4. Rootkit Hunter

This is an open source tool that is used for scanning the system for rootkits and unwanted tools. You can not use it for scheduled or live scanning but you can still run Rootkit hunter daily. It works on Linux and Unix platforms.

5. AMaVis

AMaVis is short for A Mail Virus Scanner. As the name suggests, this app stands between your anti-virus software and email client, scanning incoming emails for viruses. It is compatible with all platforms.

6. ClamMail

This is a free antivirus software that protects messages that you receive on Thunderbird, Outlook, Eudora dn other POP3-based applications. It operated on the Windows platform and is a combination of the POP3 email proxy and the ClamAV engine.

7. P3Scan

This is an email proxy serve that can be used for scanning both outgoing and incoming messages. It cans for malware, trojans, viruses, spam and worms. It operates on the Linux platform and is also based on the ClamAV engine.

8. Viralator

This is an open source app that works alongside your anti-virus and supplements you computer’s protection. It blocks malware, which may have evaded your anti virus. It is compatible with Linux and Unix platforms.

9. xpy

This is a tiny program, which is less than 60 KB in size. It adds to your computer’s performance and improves its security by closing vulnerabilities that may lead to spyware creeping across your Windows-based system.

10. Nixory

This is a open source app that has been designed for improving the protection for Firefox users. It blocks unwanted spyware and cookies and works along side other anti spyware programs.

 

If you have some suggestions of your own please let us know in comments!

 

 

 

18 Free Game Development tools for every game developer!

Game engines give developers the tools required to pull the several elements of a game together into one unit. With mobile gaming picking up, more developers are paying attention to Android and iOS platforms. Game development is an ever expanding universe with various free tools to get the job done.

 

1.PuzzleScript

PuzzleScript is a puzzle game engine created by Stephen Lavelle. Games are written in the PuzzleScript scripting language and can be compiled to a standalone HTML5 application.

2.GameMaker

GameMaker allows users to create a cross-platform video game using drag and drop or a scripting language known as Game Maker Language, which can be used to develop more advanced games that could not be created just by using the drag and drop features. GameMaker was designed to allow novice computer programmers to be able to make computer games without much programming knowledge by use of these actions.

3.Construct 2

Construct 2 is a powerful ground breaking HTML5 game creator designed specifically for 2D games. It allows anyone to build games— no coding required!

4.Stencyl

Stencyl is a game creation platform that allows users to create 2D video games for computers, mobile devices, and the web. The software is available for free, with select publishing options available for purchase.

5.Twine

Twine is a tool for making hypertext games in the form of webpages created by Chris Klimas.Twine is available as a free software download for Mac OS X and Windows, and there is also a command-line interface called twee.

6.Inform 7

Inform is a programming language and design system for interactive fiction originally created in 1993 by Graham Nelson. Inform can generate programs designed for the Z-code or Glulx virtual machines.

7.Ren’Py

Ren’Py is a visual novel engine that helps you use words, images, and sounds to tell stories with the computer. These can be both visual novels and life simulation games. The easy to learn script language allows you to efficiently write large visual novels, while its Python scripting is enough for complex simulation games.

8.Adventure Game Studio

Adventure Game Studio is an open source development tool that is primarily used to create graphic adventure games. It is aimed at intermediate-level game designers, and combines an Integrated development environment (IDE) for setting up most aspects of the game with a scripting language based on the C language to process the game logic.

9.FlashPunk

FlashPunk is a free ActionScript 3 library designed for developing 2D Flash games. It provides you with a fast, clean framework to prototype and develop your games in. This means that most of the dirty work is already done, letting you concentrate on the design and testing of your game.

10.Unity

Unity is a cross-platform game engine with a built-in IDE developed by Unity Technologies. It is used to develop video games for web plugins, desktop platforms, consoles and mobile devices.

11.RPG Maker XP

RPG Maker XP gives you the power to create your own original RPG on Windows. Its popular and user-friendly interface has been carried over from RPG MAKER 2000, and its graphic capabilities, battle screen layout, and data packaging features are better than ever.

12.Blender

Blender is a free and open source 3D animation suite. It supports the entirety of the 3D pipeline—modeling, rigging, animation, simulation, rendering, compositing and motion tracking, even video editing and game creation. Advanced users employ Blender’s API for Python scripting to customise the application and write specialized tools; often these are included in Blender’s future releases.

13.Tiled

Tile map editor (TileME) is for design tile maps with a single tiled image and export map data as an array. this is a very good tool for J2ME game prgrammers and with a very little changes you can use it for any other languages.

14.Gamesalad

GameSalad Creator is an authoring tool developed by GameSalad, Inc aimed primarily at non-programmers for composing games in a drag-and-drop fashion, using visual editors and a behavior-based logic system.

15.Pygame

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language. It is built over the Simple DirectMedia Layer (SDL) library, with the intention of allowing real-time computer game development without the low-level mechanics of the C programming language and its derivatives.

16.Corona

Corona lets developers use integrated Lua, layered on top of C++/OpenGL, to build graphic applications. The SDK does not charge per-app royalty or impose any branding requirement, and has a subscription-based purchase model.

17.GL Basic

GLBasic is a commercial BASIC programming language, that can compile to various platforms, including Windows, Linux, Mac OS X, as well as some handheld devices. The language is designed to be simple and intuitive.

18.RPG Maker VX

RPG Maker VX allows you to make the roleplaying games you’ve always dreamed of by being one of the easiest game engine software ever developed. With its enhanced autotile capabilities, quick event creation, and dungeon generator, you can have a game ready to play faster than ever before.

 

If you have some suggestions of your own please let us know in comments!

 

 

Top 6 Highest Paying Tech Companies

Management consulting firms and tech companies are known for high salaried jobs. These are rich margin businesses. Tech companies maintain pool of high skilled talent for their projects. IT industry has contributed great share to global economy in over last two decades. A famous online portal for employee and company rating and reviews, Glassdoor.com had published a list of top paying companies of last year. We have listed top six tech companies from that list.

1. Juniper Network

Juniper Network is largest networking equipment supplier in the world. The company sells its services and products to carriers, cable operators and internet service providers in the world. Employees in Juniper Network are very well compensated. The company has workforce of 9,483. The median salary at Juniper Network is $134,218.

2. LinkedIn

One of the largest social network for professionals, LinkedIn is known for the highest salary to its employees. The company truly cares about its employees, it provides number of opportunities to employees for their growth and career development. LinkedIn pays more than $150,000 salary to its software engineers and data scientists. The median salary at LinkedIn is $130,000 per year.

3. Google

According to Glassdoor’s report, Google is at the third position in tech companies. Google values its software engineers, product managers and research scientists. Most of the employees at Google have salary package of more than $100,000 per year. Company has very convenient policy for its employees. Google employees can use 20 per cent time of the daily hours for their personal projects. The median salary at Google is $125,000.

4. Twitter

The micro-blogging cum social networking platform, Twitter is yet another top salary paying company. San Francisco based company has very attractive employee policy. Twitter has reportedly spent $593 million in salaries in 2013. The company has been on top of the list on stock market too. Employees have ranked Twitter as the best place to work on Glassdoor. The medial salary at Twitter is $125,000.

5. Yahoo

World’s leading internet company, Yahoo has great culture. The silicon valley based company is known for high pay package to its employees. With the leadership of Marissa Mayer, things have changed dramatically for Yahoo. The company has come up with some amazing products in recent years. Yahoo has workforce of 12,200. The median salary at Yahoo is $125,000.

6. Apple

Apple values its employee more than anything else. California based Apple pays some software engineers more than $200,000 per year. Company gifts employees with promotions and stock bonuses every now and then. Employees have flexible work schedule, great work environment and number of opportunities for career growth. Apple hires the pool of talent almost every year. The medial salary at Apple is $123,284.

Need to know Basic linux commands

The below commands are important basic commands in linux

  • mkdir – make directories
    Usage: mkdir [OPTION] DIRECTORY…
    eg. mkdir lhn
  • ls – list directory contents
    Usage: ls [OPTION]… [FILE]…
    eg. ls, ls ­l, ls lhn
  • cd – changes directories
    Usage: cd [DIRECTORY]
    eg. cd lhn
  • pwd ­-  print name of current working directory
    Usage: pwd
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vim lhn.txt
  • cp – copy files and directories
    Usage: cp [OPTION]… SOURCE DEST
    eg. cp sample.txt sample_copy.txt
    cp sample_copy.txt target_dir
  • mv – move (rename) files
    Usage: mv [OPTION]… SOURCE DEST
    eg. mv source.txt target_dir
    mv old.txt new.txt
  • rm ­ remove files or directories
    Usage: rm [OPTION]… FILE…
    eg. rm file1.txt , rm ­rf some_dir
  • find – search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find file1.txt, find ­name file1.txt
  • history – prints recently used commands
    Usage: history
  • cat – concatenate files and print on the standard output
    Usage: cat [OPTION] [FILE]…
    eg. cat file1.txt file2.txt
    cat ­n file1.txt
  • echo – display a line of text
    Usage: echo [OPTION] [string] …
    eg. echo I love India
    echo $HOME
  • grep ­- print lines matching a pattern
    Usage: grep [OPTION] PATTERN [FILE]…
    eg. grep ­i apple sample.txt
  •  wc ­- print the number of newlines, words, and bytes in files
    Usage: wc [OPTION]… [FILE]…
    eg.  wc file1.txt
    wc ­L file1.txt
  • sort – sort lines of text files
    Usage: sort [OPTION]… [FILE]…
    eg. sort file1.txt
    sort ­r file1.txt
  • tar – to archive a file
    Usage: tar [OPTION] DEST SOURCE
    eg. tar ­cvf /home/archive.tar /home/original
    tar ­xvf /home/archive.tar
  • kill – to kill a process(using signal mechanism)
    Usage: kill [OPTION] pid
    eg. kill ­9 2275
  • ps – report a snapshot of the current processes
    Usage: ps [OPTION]
    eg. ps,  ps ­el
  • who – show who is logged on
    Usage: who [OPTION]
    eg. who , who ­b , who ­q
  • passwd – update  a user’s authentication tokens(s)
    Usage: passwd [OPTION]
    eg. passwd
  •  su –  change user ID or become super­user
    Usage: su [OPTION] [LOGIN]
    eg. su remo, su
  • chown – change file owner and group
    Usage: chown [OPTION]… OWNER[:[GROUP]] FILE…
    eg. chown remo myfile.txt
  • chmod – change file access permissions
    Usage: chmod [OPTION] [MODE] [FILE]
    eg. chmod 744 calculate.sh
  • zip – package and compress (archive) files
    Usage: zip [OPTION] DEST SOURSE
    eg. zip original.zip original
  • unzip – list, test and extract compressed files in a ZIP archive
    Usage: unzip filename
    eg. unzip original.zi
  • ssh – SSH client (remote login program)
    “ssh is a program for logging into a remote machine and for
    executing commands on a remote machine”
    Usage: ssh [options] [user]@hostname
    eg. ssh ­X guest@10.105.11.20
  • scp – secure copy (remote file copy program)
    “scp copies files between hosts on a network”
    Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
    eg. scp file1.txt guest@10.105.11.20:~/Desktop/
  • fdisk – partition manipulator
    eg. sudo fdisk ­l
  • mount – mount a file system
    Usage: mount ­t type device dir
    eg. mount /dev/sda5 /media/target
  • umount – unmount file systems
    Usage: umount [OPTIONS] dir | device…
    eg.  umount /media/target
  • du – estimate file space usage
    Usage:  du [OPTION]… [FILE]…
    eg. du
  • df – report filesystem disk space usage
    Usage: df [OPTION]… [FILE]…
    eg. df
  • quota – display disk usage and limits
    Usage: quota [OPTION]
    eg. quota ­v
  • reboot – reboot the system
    Usage: reboot [OPTION]
    eg. reboot
  • poweroff – power off the system
    Usage: poweroff [OPTION]
    eg. poweroff
  • kate – KDE Advanced Text Editor
    Usage:  kate [options][file(s)]
    eg. kate file1.txt file2.txt
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vi hello.c
  • gedit ­ A text Editor. Used to create and edit files.
    Usage: gedit [OPTION] [FILE]…
    eg. gedit
  • bg – make a foreground process to run in background
    Usage: type ‘ctrl+z’  and then ‘bg ‘
  • fg – to make background process as foreground process
    Usage: fg [jobid]
  • jobs – displays the names and ids of background jobs
    Usage: jobs
  • sed ­  stream editor for filtering and transforming text
    Usage: sed [OPTION] [input­file]…
    eg. sed ‘s/love/hate/g’ loveletter.txt
  • awk ­ pattern scanning and processing language
    eg.  awk ­F: ‘{ print $1 }’ sample_awk.txt
  • find ­ search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find ­name file1.txt
  • locate – find or locate a file
    Usage: locate [OPTION]… FILE…
    eg. locate file1.txt

 

If you have some suggestions of your own please let us know in comments!

 

 

Some household items that our smartphone replaced

Do you find yourself rubbing your eyes from looking at the same screen all day? Are your friends and family complaining about you always being distracted? Is your phone the first and last thing you check every day?

These days we spend more of our time staring at our smartphones and tablets than ever, and that’s because they have replaced an increasing number of household products over the years. Here are some that maybe, just maybe, you might want to start using again.

Alarm Clocks

ProductSmartphoneReplace-Alarm-Clock

Many of us started using our mobile phones as our primary alarm clocks the moment we got our hands on one. After all, this is a feature that’s been included long before cell phones became “smart.” Doing so has its advantages, such as setting a ton of alarms (I want to be up at 7, so here’s one for 6:00, 6:30, 6:40, and 6:55), having them with you wherever you go (great for workers who travel), and waking up to something other than a blaring beep.

But most of us are waking up at around the same time and place day after day. And considering how quickly smartphones drain, if they’re not plugged in, they may not make it until morning. By investing in a separate alarm clock, you can still get up on time in the morning and manage to do so without making the phone the first thing you interact with. You can even get one with a backup battery, so that you’re still awoken on time if the power happens to flicker overnight.

And while you’re picking out that alarm clock, keep in mind what else it can do…

Radios

ProductSmartphoneReplace-Radio

You may have grown accustomed to only using a traditional radio inside of a car, but standalone ones are still a thing, and they don’t all look like this anymore.

Radios are not hard to find, and some modern ones don’t require an old-fashioned antenna to pick up reception. For people who predominantly listen to local stations while at home, it may be an investment worth considering.

Sure, you can stream radio stations over the Internet with apps like TuneIn, which gives you access regardless of how far away you are from a tower, but there’s a downside to doing so. Online streams may sound live, but they can get delayed due to initial load times and buffering. This isn’t usually a big deal, but when the station tells you what time it is, you might want to double-check, or have a standard radio around to serve as the final word. And a battery-powered one is still a great thing to have around in case of an emergency.

Books

ProductSmartphoneReplace-Books

I know, many of you probably (perhaps even begrudgingly) just transitioned over to reading e-books, and you’ve been consuming more novels because of it. I understand. I started reading books exclusively on electronic devices several years ago, and I’ve loved the convenience of it.

But hear me out here. Physical books still maintain a number of advantages, and encouraging you to put down your phone is one of them. It’s great to cuddle up with a good book in the evening after work, but if you’re reading it on your smartphone, that’s several more hours spent looking at the same device you’ve already been glued to for much of the day. Picking up a paperback lets you perform the same task while taking a break from your phone, and you’re less likely to get distracted in the process.

If your entire library must be digital, consider using a dedicated e-reader instead. It’s better for your eyes, you still put your phone down, and you project a completely different demeanor to others when you’re seen reading a Nook or Kindle versus being just another person buried in their phone.

Magazines & Newspapers

ProductSmartphoneReplace-Newspaper

You might think the case for physical magazines and newspapers is the same as the one for books, but there are a few significant differences. For one, the digital selection isn’t quite as thorough with magazines and newspapers as it is for books, so while you may be able to purchase all of the same tomes on your bookshelf in a digital format, switching to a phone or tablet can mean giving up on a bunch of smaller, local publications that don’t publish each issue online somewhere.

If you don’t live in a major metropolitan area, you might be surprised just how much is going on where you live if you don’t pick up the local publications. They paint a detailed picture of an area that mobile news apps just don’t do.

It’s worth mentioning that much of this content is still available on websites, even if you can’t necessarily buy a digitized version of each issue. But online articles are covered with links and surrounded by any number of distractions that you’re less likely to get burdened down with by picking up a paper or magazine while eating a sandwich at the kitchen table.

This may sound old-fashioned, but it can be liberating to take a task that’s become so associated with mobile devices, such as reading the news, and being able to do it without draining your battery and staring at the same old screen.

Games & Consoles

ProductSmartphoneReplace-Sentinels

There are no shortage of ways to get glued to a smartphone or tablet, but the sheer volume of free games makes it especially easy to get sucked in for hours. Yet while this may be one of the most talked about trends in gaming at the moment, it’s far from the only type on the rise.

Board games are making a comeback in a big way. While the name used to draw up thoughts of say Monopoly, Candy Land, and Sorry!,things have changed. Board games like Pandemic,Eldrich Horror, and Eclipse can be even more fun played with adults over a beer than with young children. And when it comes to card games, there’s everything from the extremely irreverent Cards Against Humanity to the comic book-inspired Sentinels of the Multiverse. Even if you can find a digital version of some of these, it’s a good time right now to put the screen down and get together with some friends.

As for video games, it’s still worth holding on to your dedicated machine. Console games offer a deeper experience than most mobile software out there, and they probably will for quite a while to come. Not only that, they allow for more social interaction with the people around you than tapping at a smartphone (which has become recognized around the world as a signal for “leave me alone”). Even if you’re playing a single-player game, there’s still something social about a friend being able to pull up a chair and watch.

And while this may sound funny to gamers who grew up under parents telling them it’s not healthy to stare at a TV all day, looking at the big screen can be a nice break from holding a smaller one much closer to your eyes.

What Items Have You Replaced With Your Phone?

Do you still lug around a digital camera? Probably not. Phones have made it easy to capture life’s moments without having to haul an extra bit of equipment around, and the few moments it takes to snap a shot don’t add up to spending all that much more time with your phone. Nor does opening up a calculator app, using navigation software in place of a dedicated GPS, or listening to locally saved music instead of carrying around an MP3 player. You won’t see me switching back to a flip phone anytime soon.

It’s okay to let our phones replace things, as long as it’s not everything. Phones, like all things in life, should be enjoyed in moderation. If your phone isn’t able to keep its screen on long enough for you to get from one charge to another, getting a model with a bigger battery might not be the only solution worth considering. The thing probably needs a break, and you might too.

 

If you have some suggestions of your own please let us know in comments!