Tuesday, January 24, 2023

Process and Thread:

A process is a program or application that is currently running on a computer. It is an instance of a program that is being executed by the operating system. A process has its own memory space, which means that it can access and manipulate its own data without interfering with other processes. A process can also have multiple threads, which are lightweight units of execution that run within the context of a process. Threads allow a process to perform multiple tasks simultaneously, and they share the same memory space as the process. Each process has its own state, which can be running, waiting, or blocked. The operating system is responsible for managing processes and allocating resources such as memory and CPU time. In simple terms, a process is a program that is running on a computer, it has its own memory, and can perform one or more tasks at the same time using threads.



If I want to explain the same to a 10-year-old kid, here it is:

A process is like a program that is running on a computer. It's like a recipe that tells the computer what to do. Just like you need different ingredients to make different dishes, a process needs various resources like memory and computing power to run.

A thread is like a helper in a kitchen. Just like how a helper can do multiple tasks at the same time, a thread can do multiple things at the same time within a process. For example, if a recipe is to make a cake and ice cream, one helper can work on making the cake while another helper can work on making the ice cream. Similarly, one thread can work on one task within a process while another thread can work on a different task.

So, a process is like a recipe, and a thread is like a helper that follows that recipe to ensure the computer is doing what it needs.

A high-level explanation for Processes and Threads

A process is an instance of a program that is being executed by the operating system. It is a self-contained execution environment that consists of its own memory space, system resources, and system state. The memory space of a process is used to store the program code, data, and runtime stack.

A thread, on the other hand, is a lightweight unit of execution that runs within the context of a process. It is a separate flow of control within a process and shares the same memory space as the process. Each thread has its own program counter, stack, and set of register values.

Threads are used to improve the performance and responsiveness of a process by allowing it to perform multiple tasks simultaneously. By using multiple threads, a process can take advantage of the multiple cores available on modern CPUs and reduce the time spent waiting for I/O operations to complete.

Threads also simplify the task of writing concurrent and parallel programs by providing a higher-level abstraction over the underlying operating system primitives.

Conclusion

In summary, a process is a program that is running on a computer and it has its own memory and state. A thread is a lightweight unit of execution that runs within the context of a process, it shares the same memory as the process and allows the program to perform multiple tasks simultaneously. The use of threads improves the performance and responsiveness of a program and simplifies the task of writing concurrent and parallel programs.


Post by

newWorld



Thursday, January 12, 2023

Ursnif Botnet (Capabilities and IOC of a latest specimen)

Specimen details:

SHA256: 6da6fa5a959ad50302b32db9fad3862abcbd0597402941d66935203300d52821

Original file name: animaltech5.exe

Creation Time: 2062-07-25 12:18:00 UTC





IOC details
62.173.149.]202
31.41.44].158
193.0.178.]157

Post by 


Wednesday, December 21, 2022

26 Cyber Security YouTube Channels

Cybersecurity is the practice of protecting devices, networks, and data from digital attacks, theft, and damage. It involves the use of technologies, processes, and policies to secure systems, networks, and devices from cyber threats, such as malware, hacking, and phishing. It helps to protect sensitive information, prevent data breaches, and ensure the integrity and confidentiality of data. It is also important for the overall security and stability of the internet and the global economy, as cyber-attacks can have significant consequences for individuals, businesses, and governments.

There are many different aspects to cybersecurity, including:

  • Network security: Protecting the security of computer networks and the devices connected to them.
  • Application security: Protecting the security of applications and software.
  • Data security: Protecting the confidentiality, integrity, and availability of data.
  • Device security: Protecting the security of devices, such as computers, smartphones, and IoT devices.
  • Identity and access management: Controlling and managing access to systems and data.
  • Cloud security: Protecting the security of data and applications hosted in the cloud.

Effective cybersecurity requires a combination of technical measures, such as firewalls and antivirus software, and non-technical measures, such as employee education and strong policies and procedures. In addition to protecting our own devices and networks, it's important to be mindful of the security practices of others. This can mean being careful about which websites we visit, avoiding opening suspicious emails or links, and being cautious when using public Wi-Fi networks.

Here are 26 cybersecurity YouTube channels:

1. Infosec Institute — Cybersecurity awareness.

https://www.youtube.com/@InfosecEdu

2. Black Hat — Technical cybersecurity conferences.

https://www.youtube.com/@BlackHatOfficialYT

3. Bugcrowd — Bug bounty methodology and interviews.

https://www.youtube.com/@Bugcrowd

4. InfoSec Live — Everything from tutorials to interviews.

https://www.youtube.com/@infoseclive

5. David Bombal — Everything cybersecurity related.

https://www.youtube.com/@davidbombal

6. Nahamsec — Educational hacking and bug bounty videos.

https://www.youtube.com/@NahamSec

7. Computerphile — Covers basic concepts and techniques.

https://www.youtube.com/@Computerphile

8. InsiderPHD — How to get started with bug bounty hunting.

https://www.youtube.com/@InsiderPhD

9. Security Weekly — Interviews with cybersecurity figures.

https://www.youtube.com/@SecurityWeekly

10. John Hammond — Malware analysis, programming, and careers.

https://www.youtube.com/@_JohnHammond

11. Peter Yaworski — Web-application hacking tips and interviews.

https://www.youtube.com/@yaworsk1

12. IppSec — Labs and capture-the-flag tutorials, HackTheBox etc.

https://www.youtube.com/@ippsec

13. 13Cubed — Videos on tools, forensics, and incident response.

https://www.youtube.com/@13Cubed

14. HackerSploit — Penetration testing, web-application hacking.

https://www.youtube.com/@HackerSploit

15. STÖK — Videos on tools, vulnerability analysis, and methodology.

https://www.youtube.com/@STOKfredrik

16. Security Now — Cybercrime news, hacking and web-application security.

https://www.youtube.com/@securitynow

17. LiveOverflow — Involves hacking, write-up videos, and capture-the-flags.

https://www.youtube.com/@LiveOverflow

18. The Cyber Mentor — Ethical hacking, web-application hacking, and tools.

https://www.youtube.com/@TCMSecurityAcademy

19. Joe Collins — Everything Linux related, including tutorials and guides.

https://www.youtube.com/@EzeeLinux

20. Null Byte — Cybersecurity for ethical hackers, and computer scientists.

https://www.youtube.com/@NullByteWHT

21. The PC Security Channel — Windows security, malware news, and tutorials.

https://www.youtube.com/@pcsecuritychannel

22. Simply Cyber — Helps people with cybersecurity career development.

https://www.youtube.com/@SimplyCyber

23. Network Chuck — Everything related to network and cybersecurity.

https://www.youtube.com/@NetworkChuck

24. BlackPerl — Malware analysis, forensics and incident response.

https://www.youtube.com/@BlackPerl

25. Professor Messer — Guides covering certifications.

https://www.youtube.com/@professormesser

26. Hak5 — General cybersecurity coverage.

https://www.youtube.com/@hak5


Post by

newWorld

Tuesday, December 20, 2022

30 cybersecurity search engines for researchers:

In general, a search engine is a program that searches a database on the internet (sites like Google or Bing) to find information that is relevant to a specific keyword or phrase. When you use a search engine, you enter a word or phrase (called a "query") into the search field, and the search engine returns a list of web pages that are relevant to your query. The search results are usually ranked by how relevant they are to your search term, with the most relevant results appearing at the top of the list. Search engines use complex algorithms to analyze the content of websites and determine their relevance to a particular search query.

  • Access to information: Search engines provide a convenient and efficient way to access a vast amount of data on the internet. By simply typing in a few keywords, you can find websites, articles, and other resources related to various topics.
  • Ease of use: Search engines are user-friendly, with intuitive interfaces that make it easy for people of all ages and backgrounds to find what they are looking for.
  • Relevance of results: Search engines use complex algorithms to rank the results of a search based on their relevance to the keywords you enter. This means that you are more likely to find what you are looking for at the top of the search results, rather than having to sift through pages and pages of irrelevant content.
  • Personalization: Many search engines allow you to customize your search experience by saving your search history, preferences, and other information. This can help the search engine provide more personalized results based on your past searches.
  • Speed: Search engines are designed to be fast, so you can find what you are looking for quickly and easily. This is especially important in today's fast-paced world, where people often need to find information in a hurry.

Search Engines for Security Researchers

Security researchers use to gather tons of information and need to surf paramount of data. For them, search engines can be very useful, as they provide a quick and easy way to access a wide range of information on a variety of security-related topics. They can use search engines to find articles, blog posts, and other resources that provide information on new vulnerabilities, exploits, and other security issues. Search engines can also be used to find tools and resources that can help security researchers in their work, such as software that can be used to analyze and test the security of a system.

In addition to providing access to information, search engines can also be used by security researchers to monitor the internet for new security threats and vulnerabilities. By setting up alerts or performing regular searches for specific keywords, security researchers can stay up to date on the latest developments in the field and be alerted to potential security issues as they arise.

30 cybersecurity search engines for researchers:

1. Dehashed—View leaked credentials.

2. SecurityTrails—Extensive DNS data. 

3. DorkSearch—Really fast Google Dorking.  

4. ExploitDB—Archive of various exploits. 

5. ZoomEye—Gather information about targets.

6. Pulsedive—Search for threat intelligence. 

7. GrayHatWarfare—Search public S3 buckets. 

8. PolySwarm—Scan files and URLs for threats. 

9. Fofa—Search for various threat intelligence. 

10. LeakIX—Search publicly indexed information.

11. DNSDumpster—Search for DNS records quickly. 

12. FullHunt—Search and discovery attack surfaces. 

13. AlienVault—Extensive threat intelligence feed. 

14. ONYPHE—Collects cyber-threat intelligence data. 

15. Grep App—Search across a half million git repos.

16. URL Scan—Free service to scan and analyse websites. 

17. Vulners—Search vulnerabilities in a large database. 

18. WayBackMachine—View content from deleted websites. 

19. Shodan—Search for devices connected to the internet. 

20. Netlas—Search and monitor internet-connected assets.

21. CRT sh—Search for certs that have been logged by CT. 

22. Wigle—Database of wireless networks, with statistics. 

23. PublicWWW—Marketing and affiliate marketing research. 

24. Binary Edge—Scans the internet for threat intelligence.

25. GreyNoise—Search for devices connected to the internet. 

26. Hunter—Search for email addresses belonging to a website. 

27. Censys—Assessing attack surface for internet-connected devices. 

28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.

29. Packet Storm Security—Browse the latest vulnerabilities and exploits. 

30. SearchCode—Search 75 billion lines of code from 40 million projects.


Post by 

newWorld

Wednesday, December 14, 2022

Geek Squad Subscription – SCAM mail (Latest - Dec 2022)

 

Scam mail (phishing email) is a fraudulent message that is designed to trick the recipient into giving out personal information or taking some kind of action. Scam emails can be very convincing, so it's important to be cautious when receiving any unsolicited messages and to verify the legitimacy of the sender before taking any action. These emails often look legitimate and may use logos and branding from well-known companies to make them appear authentic. However, they are usually sent by scammers with the intention of stealing sensitive information, such as login credentials, financial information, or even just personal data. There are many types of scam emails, also known as phishing scams. Some common types include:

  • Nigerian letter scams, promise the recipient a large sum of money in exchange for their help in transferring funds out of the country.
  • Lottery scams claim that the recipient has won a large prize in a lottery they did not enter.
  • Charity scams, claim to be from a legitimate charity and ask for donations.
  • Investment scams promise high returns on investments but are actually fraudulent.
  • Phishing scams try to trick the recipient into giving away sensitive information such as their bank account details or login credentials.

Subscription – SCAM mail

The scammer emails that subscription renewal is pending for the upcoming year and the amount will be debited from your bank/card. It also mentions that the user has 24 hours to cancel the renewal. The current scenario is titled "Geek Squad Subscription", it is an ongoing scam mail which is themed as subscription renewal scam mail. 

The best way to protect yourself from scam emails is to be cautious and never give out personal information or money to someone you do not know. If you are unsure about the legitimacy of an email, it is always best to contact the sender directly using a known email address or phone number to verify their identity.


Post by

newWorld

Friday, December 9, 2022

Quantum potential - article of the week by EY!

 Quantum mechanics is a branch of physics that deals with the behaviour of matter and energy at the atomic and subatomic levels. It is based on the idea that particles, such as atoms and subatomic particles, can exist in multiple states or locations at the same time, and that their behaviour cannot be predicted with certainty. This phenomenon, known as quantum superposition, is one of the most striking and counterintuitive aspects of quantum mechanics.


Quantum mechanics has the potential to revolutionize many areas of science and technology, including computing, communication, and sensing. For example, a quantum computer would be able to solve certain problems much faster than a classical computer, and a quantum internet could provide unprecedented levels of security for communication. Additionally, quantum sensors could enable more precise measurements of physical quantities, such as position, momentum, and magnetic fields.


The development of these and other quantum technologies is an active area of research, and many challenges and obstacles still need to be overcome. However, the potential benefits of harnessing the principles of quantum mechanics are vast, and researchers and engineers around the world are working to unlock the full potential of this fascinating field.

Refer to the article released by EY: https://www.ey.com/en_gl/consulting/quantum-computing-5-steps-to-take-now


Post by

newWorld


Moon landing is not fake:

Introduction
Neil Armstrong was an American astronaut who became the first person to walk on the moon. He was born on August 5, 1930, in Wapakoneta, Ohio. Armstrong served in the United States Navy before joining the National Aeronautics and Space Administration (NASA) in the 1950s. He flew on the Gemini 8 mission in 1966, and he was the commander of the Apollo 11 mission that landed on the moon in 1969.

Armstrong's famous quote, "That's one small step for man, one giant leap for mankind," was spoken as he stepped off the lunar module and onto the surface of the moon on July 20, 1969. The moon landing was a historic moment that was watched by millions of people around the world. Armstrong and his fellow astronaut, Buzz Aldrin, spent approximately two and a half hours walking on the moon and conducting experiments before returning to Earth.



Moon landing

The moon landing was a historical event that occurred on July 20, 1969, when NASA astronauts Neil Armstrong and Buzz Aldrin landed their Apollo 11 lunar module on the surface of the moon. Armstrong became the first person to step onto the lunar surface, and he and Aldrin spent approximately two and a half hours walking on the moon and conducting experiments. The moon landing was witnessed by millions of people worldwide who watched the live television broadcast.



There is overwhelming evidence that the moon landing was true, including the thousands of photographs and hours of video footage taken during the mission, as well as the artefacts that were brought back from the moon, such as moon rocks and the American flag that was planted on the lunar surface. Additionally, numerous independent and government-funded investigations have been conducted over the years that have all concluded that the moon landing was a real and historic event.

Conspiracy theories - lack evidence

It is important to note that there is no credible evidence to support the idea that the moon landing was fake. The conspiracy theory that the moon landing was faked is based on misinformation and a lack of understanding of the technical challenges involved in such a complex and ambitious mission. It is important to carefully consider the evidence and rely on credible sources of information when evaluating historical events such as the moon landing.


Post by

newWorld

Thursday, December 8, 2022

Goku vs Superman: Who will win?

In the world of comics fans, this question is always pondered in the wild who would win in a fight between Goku from the Dragon Ball franchise and Superman from DC Comics. Both characters have unique abilities and powers that would make them formidable opponents, and the outcome of a hypothetical fight between them would depend on a number of factors.

Goku (AKA) Kakarot

Goku is a powerful warrior from the Dragon Ball franchise, known for his incredible strength, speed, and ability to harness the power of the seven dragon balls. He is able to use his ki energy to enhance his physical abilities, allowing him to fly, fire energy blasts, and even transform into more powerful forms. Goku is also a skilled martial artist, able to use a variety of hand-to-hand combat techniques to defeat his opponents. Throughout the Dragon Ball franchise, Goku becomes increasingly powerful, unlocking new abilities and transforming into more powerful forms. He is able to use his ki energy to enhance his physical abilities, allowing him to fly, fire energy blasts, and even use powerful special moves like the Kamehameha. He is also a skilled martial artist, able to use a variety of hand-to-hand combat techniques to defeat his opponents. Goku is known for his cheerful and optimistic personality, as well as his strong sense of justice. He is always willing to put himself in harm's way to protect his friends and the Earth from threats and is respected by many other characters in the Dragon Ball universe.

Superman (AKA) Kal-El

Superman, on the other hand, is a powerful alien from the planet Krypton. He is known for his incredible strength, speed, and durability, as well as his ability to fly and shoot heat vision from his eyes. Superman is also virtually invulnerable, able to withstand almost any attack, including bullets and bombs. He is often considered one of the most powerful superheroes in the DC Comics universe.

As a baby, Kal-El was sent to Earth by his parents in order to save him from the destruction of Krypton. He was raised by the Kents, a farming couple from the town of Smallville, and was given the name Clark Kent. As he grew up, Clark discovered that he had superhuman powers, including super strength, super speed, and the ability to fly. After discovering his true identity, Clark became Superman, a hero who uses his powers to protect the people of Earth from harm. He becomes a symbol of hope and justice and is respected and admired by many for his bravery and selflessness. Throughout Superman mythology, Kal-El faces many challenges and enemies, including Lex Luthor, Brainiac, and General Zod. He also forms close bonds with other superheroes, such as Batman and Wonder Woman, and becomes a key member of the Justice League. Despite his incredible powers, Superman struggles with his dual identity and the weight of his responsibility as a hero.

Goku vs Superman

If Goku and Superman were to face each other in a fight, the outcome would be difficult to predict. Goku's ability to harness the power of the dragon balls and transform them into more powerful forms would give him an edge, but Superman's invulnerability and heat vision could be difficult for Goku to overcome. In a no-holds-barred fight, there would be no rules or restrictions on the fighters' actions, allowing them to use any means necessary to defeat their opponent. This would give both Superman and Goku the opportunity to use their full range of powers and abilities, making the fight even more unpredictable.

Ultimately, the outcome of such a hypothetical fight would depend on the specific conditions and rules of the battle.



Post by

newWorld


 

What if Muhammad Ali vs Mike Tyson fought in their prime?

 Muhammad Ali and Mike Tyson are two of the most well-known and celebrated heavyweight boxers in history. While they never faced each other in the ring, they both had successful and controversial careers that made them icons of the sport.


Muhammad Ali, born Cassius Clay, was a professional boxer from Louisville, Kentucky. He is widely considered one of the greatest boxers of all time, with a record of 56 wins and 5 losses. Ali was known for his speed, agility, and technical skill in the ring, as well as his brash and outspoken personality outside of it. He is famous for his "float like a butterfly, sting like a bee" mantra, and for his epic bouts against other boxing legends like Joe Frazier and George Foreman.



Mike Tyson, on the other hand, was a younger and more explosive fighter. Born in Brooklyn, New York, Tyson rose to fame as a teenager with his ferocious punching power and intimidating presence. He became the youngest heavyweight champion in history at the age of 20 and went on to dominate the division for many years. Despite his success in the ring, Tyson's career was marred by controversy, including several high-profile legal issues and his infamous ear-biting incident in a 1997 fight against Evander Holyfield.


While Muhammad Ali and Mike Tyson never faced each other in the ring, they are both considered among the greatest heavyweight boxers of all time. Ali's technical skill and showmanship set him apart, while Tyson's raw power and ferocity made him a force to be reckoned with. Their legacies continue to inspire and influence boxers and fans around the world.

Hypothetical fight
If Muhammad Ali and Mike Tyson faced each other in their prime, it is likely that the fight would be closely contested. Both men were at the top of their game during this period, and they each had unique skills and abilities that would have made them formidable opponents. Muhammad Ali was in his prime during the 1960s and 1970s. He was known for his speed, agility, and technical skill in the ring, as well as his mental toughness and ability to outlast his opponents. Ali's style was based on movement and precision, and he was able to outmanoeuvre many of his opponents with his quick feet and quick hands.

Mike Tyson, on the other hand, was in his prime during the 1980s and early 1990s. He was known for his incredible punching power and intimidating presence in the ring. Tyson's style was based on aggression and ferocity, and he was able to knock out many of his opponents with just a few well-placed punches.

If these two fighters faced each other in their prime, it is likely that the fight would be closely contested. Ali's speed and technical ability might have given him an early advantage, but Tyson's power and ferocity could have been difficult for Ali to handle. Ultimately, the outcome of such a hypothetical fight would depend on a number of factors, including the fighters' physical condition and mental state on the day of the fight.

Post by

The ethical implications of social media and data privacy

 The ethical implications of social media and data privacy are a hotly debated topic in today's society. On one hand, social media platforms provide a valuable avenue for individuals to connect and share information with each other. On the other hand, these platforms have also been criticized for their lack of transparency and their potential to violate users' privacy.

The use of social media has exploded in recent years, with billions of people around the world using platforms like Facebook, Twitter, and Instagram to share information and stay connected. These platforms have become an integral part of our daily lives, allowing us to connect with friends and family, share our thoughts and experiences, and stay up-to-date on the latest news and events.

However, the sheer amount of data that is generated by these platforms has raised concerns about privacy. Many people are unaware of the extent to which their personal information is being collected and shared by social media companies. This lack of transparency has led to accusations that these companies are exploiting their users for profit.

One of the key ethical issues surrounding social media and data privacy is the lack of control that users have over their own information. When people sign up for a social media account, they are often required to agree to complex and lengthy terms of service agreements. These agreements often give the social media company broad rights to collect, use, and share users' personal information.

This lack of control can have serious consequences. For example, in 2018, it was revealed that the political consulting firm Cambridge Analytica had collected the personal information of millions of Facebook users without their knowledge or consent. The company then used this information to target political ads during the 2016 US presidential election. This breach of trust sparked widespread outrage and calls for greater regulation of the social media industry.




Another ethical issue related to social media and data privacy is the potential for harm to individuals. The vast amount of data that is collected by these platforms can be used to profile users and predict their behavior. This can have serious consequences, such as discrimination or harassment. For example, a person's social media profile may be used to deny them a job or a loan, or to target them with ads for products or services that they do not want.

Furthermore, the vast amount of data that is generated by social media platforms can also be used to manipulate public opinion. Through the use of algorithms and artificial intelligence, it is possible for social media companies to tailor the information that is shown to users, in order to influence their beliefs and actions. This can have serious consequences for democracy and free speech.

In light of these ethical issues, it is clear that greater transparency and accountability are needed in the social media industry. Users must be made aware of the extent to which their personal information is being collected and shared, and they must be given the ability to control their own data. Governments also have a role to play, by enacting laws and regulations that protect users' privacy and ensure that social media companies are accountable for their actions.

In conclusion, the ethical implications of social media and data privacy are complex and far-reaching. While social media platforms provide valuable benefits, they also have the potential to violate users' privacy and cause harm. It is therefore essential that greater transparency and accountability are introduced, in order to protect users and ensure that these platforms are used responsibly.


Post by

newWorld

 

Tuesday, December 6, 2022

Robots - what can you expect in coming years? Wait... What is going now?

Robots

As machines continue to evolve and become more advanced, the role of robots in our daily lives is growing. From manufacturing and construction to healthcare and transportation, robots are increasingly being used to perform tasks that were previously done by humans. In this article, we will explore the role of robots in the modern world and examine some of the ways in which they are already being used.

Key sectors

One of the key areas in which robots are being used in manufacturing and construction. Robots have long been used in these industries to perform tasks that are repetitive, dangerous, or require a high degree of precision. For example, robots are often used on assembly lines to perform tasks such as welding, painting, and packaging. They are also used in construction to perform tasks such as bricklaying and demolition.

Healthcare

Another area in which robots are being used is in healthcare. From assisting with surgeries to providing companionship for the elderly, robots are increasingly being used to improve patient care. For example, robots are being used to assist with surgeries by providing a steady hand and precise movements, allowing surgeons to perform complex procedures with greater accuracy. They are also being used to provide companionship for the elderly and those with disabilities, helping to alleviate feelings of loneliness and isolation.

Self-driving cars

In addition to manufacturing and healthcare, robots are also being used in the transportation industry. Self-driving cars, for example, are becoming increasingly common, and are expected to revolutionize the way we travel. These vehicles are equipped with sensors and advanced algorithms that allow them to navigate roads and avoid obstacles, making them safer and more efficient than human drivers.

Science Exploration 

As robots continue to evolve and become more advanced, we can expect to see them being used in even more areas of our daily lives. From assisting with tasks at home to exploring new frontiers in space, the potential uses for robots are vast and exciting. While there are certainly some concerns about the increasing use of robots, it is clear that they have the potential to greatly improve our lives and help us to accomplish more than we ever thought possible.


Post by

newWorld 

Process and Thread:

A process is a program or application that is currently running on a computer. It is an instance of a program that is being executed by the ...