Sunday, February 12, 2023

Do SSDs become obsolete?


NAND flash storage is a type of non-volatile memory that can store data even when the power is turned off. It employs NAND flash memory, a type of memory cell that is organized in such a way that data can be stored and retrieved quickly. NAND flash storage is commonly used for data storage in solid-state drives (SSDs), memory cards, USB drives, and other digital devices. NAND flash storage will exist for at least the next 30 years. Even so, by 2050, we will have 1000X extra efficient atomic-level storage devices. Breakthroughs in nanoparticle products are happening all the time, but I suspect that this is only the beginning of the glacier in aspects of what will soon be feasible for molecular engineering. Every decade, we witness technological advancements that rival the achievements of the entire twentieth century. Take a look at the DVD. It was hailed as the greatest technological achievement since the invention of the wheel in 1996. In January 2000, you couldn't even rent a DVD from your local Blockbuster. If you live in a city that still has a video rental store, you are in the minority. Twenty years from complete scarcity to extinction.


For all practical purposes, NVMe was "born" in 2015 with the introduction of Skylake. NVM Express, Inc. was founded and incorporated in March 2014 and had 65 member companies by November 2014, led by Cisco, Dell, EMC, HGST, Intel, Micron, Microsoft, NetApp, Oracle, PMC, Samsung, SanDisk, and Seagate—forming its 13-member board of directors. In other words, the new NVMe technology was introduced in the 2015 product line, effectively replacing the poorly received mSATA devices of previous years.

NVMe has reached a tipping point in terms of speed, efficiency, cost, and scalability. Last week, I found my first 2TB NVMe drive for under $140. So, it's still not exactly "cheap," but the manufacturers are making a killing. Profits fuel innovation and infrastructure growth. As exquisitely simple as it is, a generic 2TB NVMe SSD should cost around $59 USD. However, companies that profit from sales can build larger and more efficient manufacturing plants, lowering future prices.

By next year, 2TB NVMe drives will be standard. 4TB and 8TB drives will be released in two-year increments. This puts the 8TB drive in 2027 and the 16TB drive in 2029. PCIe 5.0 is already "a thing," so we can expect NVMe 5.0 drives with read speeds of up to 14GB/s to hit the market next year. Heat will become an issue, so NVMe 5.0 controllers will most likely need to be manufactured at 5nm to avoid roasting the drives. Systems with multiple drives will largely become obsolete at 8TB and 16TB capacities. 20TB spinning drives will never be competitive in the long run. Manufacturing drives with motors, platters, bearings, and linear servos are extremely expensive when compared to a tiny drive with two silicon chips. A 4TB hard disc drive is still reasonably priced in 2022 ($53 for a 7200 RPM 4TB Seagate Constellation), so they have a future in the game and media storage. However, I believe they will be heavily phased out by 2027. A 20TB spinning drive has 10 platters, which is borderline ridiculous given its small form factor.

Flash drives will continue to grow in size (capacity), but there are concerns about cell wear, which occurs when storage cells degrade each time they are written. Memory cells of a certain size are required for this. Below 11nm, flesh memory becomes ineffective. As a result, there are size limitations for overall storage capacity on the popular 22x80 M.2 drive size (at least for the time being). You can't even buy an 8TB NVMe SSD on Newegg right now, but there are a few QLC drive options on Amazon ranging in price from $1200 to $1500 from Inland, Sabrent, and Corsair. We will undoubtedly find a solution to the flash degradation problem within a few years, paving the way for 5nm flash and 16TB NVMe drives.

In any case, this gives us a fairly predictable development trajectory through 2030. Will NVMe storage reach 32TB? Yes, I believe it will, but the incentives for the average PC user to use that much storage will be well into the curve of diminishing demand unless we start seeing single apps that require up to a terabyte of storage—like 8K movies with 12-bit HDR or something of the sort—and data transfer speeds that exceed the spinning drive's 150MB/s sequential capability. To compare, 10-bit 4K HDR streams at 11MB/s to 14MB/s at 60 frames per second.

In other words, hard drive technology has some life left in it, and SSD technology has a lot of life left in it. By 2040, we will have some very solid nanotechnology, which will almost certainly include data storage. Our current flash drive architecture may have ten years left by then. The Beelink GTR series, especially with the new Ryzen 7 6800U/6800H and Navi GPU. A tiny PC that fits in the palm of your hand and has the power of a GTX 1650 and a powerful 8-core CPU. I believe the GTR-7 can accommodate one NVMe drive of up to 2TB and one SATA SSD of up to 8 TB. So, you're looking at 10TB of flash storage in this tiny PC. This, along with eight fast Zen3+ CPU cores, is sufficient for some decent content creation in 2022. This PC requires improved cooling, but the devices I've seen so far this year are early engineering samples with power ratings of 30W or 45W.


Now that Navi graphics can match the performance of a dedicated GTX 1650, the rest of the future looks promising. ALL Ryzen 7000 processors will have Navi graphics built in! Tiny computers with a single NVMe drive will gain popularity. The NVMe/M.2 format, in my opinion, has enabled the "mini" revolution. By removing the DVD drive and hard drive from the equation, the entire system can be ten times smaller. As a result, the mini-PC or cell phone format is ideal for small flash storage solutions. In 25 years, with complete computer systems might volume of credit cards will be common. The battery will pick up the majority of that space. Microscopic storage solutions will be required to achieve this size.


Post by

newWorld

The Future of Business: Embracing Financial Technology

 Technology has transformed the way we live, work, and do business in recent years. Financial technology, or fintech, is a rapidly growing industry that is driving this change by providing innovative solutions that are transforming the financial services industry. Fintech has disrupted traditional financial services by providing consumers and businesses with faster, more convenient, and cost-effective solutions. Fintech is changing the way we manage our money and make financial transactions, from mobile banking and digital wallets to online investment platforms and blockchain.


One of the primary benefits of fintech is that it increases the accessibility of financial services. Mobile banking, for example, has made it easier for people to manage their finances on the go, while online investment platforms have enabled anyone, regardless of financial knowledge, to invest in stocks and bonds. Another advantage of fintech is that it allows for more personalized solutions. Financial planning apps, for example, use algorithms to analyze a user's spending habits and provide tailored advice on how to manage their money. Furthermore, blockchain technology enables people to securely store and transfer money without the use of intermediaries such as banks.

The Impact of Technology on the Stock Market: A Closer Look



The stock market has existed for centuries, but with the advancement of technology, it has undergone significant change. Technology has played a critical role in shaping the way we invest and trade stocks in recent years, and its impact on the stock market has been nothing short of revolutionary.

The development of online trading platforms is one of the key ways that technology has influenced the stock market. Individuals can now invest in the stock market regardless of their location or financial knowledge thanks to these platforms. Anyone can now buy and sell stocks from the comfort of their own home with just a few mouse clicks. Another way that technology has influenced the stock market is through the use of big data and artificial intelligence. These technologies are used to analyze market trends, forecast stock movements, and make investment decisions. Algorithms, for example, can analyze massive amounts of data and identify patterns that are not immediately apparent to the human eye. This information can then be used to make informed investment decisions, resulting in higher returns. Technology has also improved traders' and investors' access to real-time market data and news. Traders and investors can make informed decisions quickly with instant access to information and real-time updates, allowing them to capitalize on opportunities as they arise.

The rise of blockchain technology has been one of the most significant technological developments in the stock market. By making transactions faster, more secure, and more transparent, blockchain technology has the potential to revolutionize the way we trade stocks. There is no need for intermediaries, such as banks, to validate transactions with blockchain. This can result in faster settlement times and lower costs, making stock market investing more accessible to individuals and businesses.

In nutshell, technology has had a significant impact on the stock market, and this impact will only grow in the future. Technology is changing the way we invest and trade stocks, from the rise of online trading platforms to the use of big data and blockchain. Whether you are an experienced investor or a novice, it is critical to stay current on the latest technological developments in the stock market and embrace their potential to help you achieve your financial objectives. However, fintech benefits more than just consumers. It's also having a big impact on businesses. Fintech companies, for example, are working on solutions to streamline the payment process and reduce the cost and time associated with traditional financial transactions. This is especially important for small businesses, which frequently face limited access to capital as well as high fees for traditional financial services. Finally, fintech is a game changer in the financial services industry. It is revolutionizing money management and making financial services more accessible and personalized. Fintech solutions can help businesses streamline operations, reduce costs, and increase efficiency. As the world embraces technology, it is clear that fintech will play a critical role in shaping a business's future. So, it's time to embrace change and stay ahead of the competition.


Post by 

newWorld

Tuesday, January 24, 2023

Process and Thread:

A process is a program or application that is currently running on a computer. It is an instance of a program that is being executed by the operating system. A process has its own memory space, which means that it can access and manipulate its own data without interfering with other processes. A process can also have multiple threads, which are lightweight units of execution that run within the context of a process. Threads allow a process to perform multiple tasks simultaneously, and they share the same memory space as the process. Each process has its own state, which can be running, waiting, or blocked. The operating system is responsible for managing processes and allocating resources such as memory and CPU time. In simple terms, a process is a program that is running on a computer, it has its own memory, and can perform one or more tasks at the same time using threads.



If I want to explain the same to a 10-year-old kid, here it is:

A process is like a program that is running on a computer. It's like a recipe that tells the computer what to do. Just like you need different ingredients to make different dishes, a process needs various resources like memory and computing power to run.

A thread is like a helper in a kitchen. Just like how a helper can do multiple tasks at the same time, a thread can do multiple things at the same time within a process. For example, if a recipe is to make a cake and ice cream, one helper can work on making the cake while another helper can work on making the ice cream. Similarly, one thread can work on one task within a process while another thread can work on a different task.

So, a process is like a recipe, and a thread is like a helper that follows that recipe to ensure the computer is doing what it needs.

A high-level explanation for Processes and Threads

A process is an instance of a program that is being executed by the operating system. It is a self-contained execution environment that consists of its own memory space, system resources, and system state. The memory space of a process is used to store the program code, data, and runtime stack.

A thread, on the other hand, is a lightweight unit of execution that runs within the context of a process. It is a separate flow of control within a process and shares the same memory space as the process. Each thread has its own program counter, stack, and set of register values.

Threads are used to improve the performance and responsiveness of a process by allowing it to perform multiple tasks simultaneously. By using multiple threads, a process can take advantage of the multiple cores available on modern CPUs and reduce the time spent waiting for I/O operations to complete.

Threads also simplify the task of writing concurrent and parallel programs by providing a higher-level abstraction over the underlying operating system primitives.

Conclusion

In summary, a process is a program that is running on a computer and it has its own memory and state. A thread is a lightweight unit of execution that runs within the context of a process, it shares the same memory as the process and allows the program to perform multiple tasks simultaneously. The use of threads improves the performance and responsiveness of a program and simplifies the task of writing concurrent and parallel programs.


Post by

newWorld



Thursday, January 12, 2023

Ursnif Botnet (Capabilities and IOC of a latest specimen)

Specimen details:

SHA256: 6da6fa5a959ad50302b32db9fad3862abcbd0597402941d66935203300d52821

Original file name: animaltech5.exe

Creation Time: 2062-07-25 12:18:00 UTC





IOC details
62.173.149.]202
31.41.44].158
193.0.178.]157

Post by 


Wednesday, December 21, 2022

26 Cyber Security YouTube Channels

Cybersecurity is the practice of protecting devices, networks, and data from digital attacks, theft, and damage. It involves the use of technologies, processes, and policies to secure systems, networks, and devices from cyber threats, such as malware, hacking, and phishing. It helps to protect sensitive information, prevent data breaches, and ensure the integrity and confidentiality of data. It is also important for the overall security and stability of the internet and the global economy, as cyber-attacks can have significant consequences for individuals, businesses, and governments.

There are many different aspects to cybersecurity, including:

  • Network security: Protecting the security of computer networks and the devices connected to them.
  • Application security: Protecting the security of applications and software.
  • Data security: Protecting the confidentiality, integrity, and availability of data.
  • Device security: Protecting the security of devices, such as computers, smartphones, and IoT devices.
  • Identity and access management: Controlling and managing access to systems and data.
  • Cloud security: Protecting the security of data and applications hosted in the cloud.

Effective cybersecurity requires a combination of technical measures, such as firewalls and antivirus software, and non-technical measures, such as employee education and strong policies and procedures. In addition to protecting our own devices and networks, it's important to be mindful of the security practices of others. This can mean being careful about which websites we visit, avoiding opening suspicious emails or links, and being cautious when using public Wi-Fi networks.

Here are 26 cybersecurity YouTube channels:

1. Infosec Institute — Cybersecurity awareness.

https://www.youtube.com/@InfosecEdu

2. Black Hat — Technical cybersecurity conferences.

https://www.youtube.com/@BlackHatOfficialYT

3. Bugcrowd — Bug bounty methodology and interviews.

https://www.youtube.com/@Bugcrowd

4. InfoSec Live — Everything from tutorials to interviews.

https://www.youtube.com/@infoseclive

5. David Bombal — Everything cybersecurity related.

https://www.youtube.com/@davidbombal

6. Nahamsec — Educational hacking and bug bounty videos.

https://www.youtube.com/@NahamSec

7. Computerphile — Covers basic concepts and techniques.

https://www.youtube.com/@Computerphile

8. InsiderPHD — How to get started with bug bounty hunting.

https://www.youtube.com/@InsiderPhD

9. Security Weekly — Interviews with cybersecurity figures.

https://www.youtube.com/@SecurityWeekly

10. John Hammond — Malware analysis, programming, and careers.

https://www.youtube.com/@_JohnHammond

11. Peter Yaworski — Web-application hacking tips and interviews.

https://www.youtube.com/@yaworsk1

12. IppSec — Labs and capture-the-flag tutorials, HackTheBox etc.

https://www.youtube.com/@ippsec

13. 13Cubed — Videos on tools, forensics, and incident response.

https://www.youtube.com/@13Cubed

14. HackerSploit — Penetration testing, web-application hacking.

https://www.youtube.com/@HackerSploit

15. STÖK — Videos on tools, vulnerability analysis, and methodology.

https://www.youtube.com/@STOKfredrik

16. Security Now — Cybercrime news, hacking and web-application security.

https://www.youtube.com/@securitynow

17. LiveOverflow — Involves hacking, write-up videos, and capture-the-flags.

https://www.youtube.com/@LiveOverflow

18. The Cyber Mentor — Ethical hacking, web-application hacking, and tools.

https://www.youtube.com/@TCMSecurityAcademy

19. Joe Collins — Everything Linux related, including tutorials and guides.

https://www.youtube.com/@EzeeLinux

20. Null Byte — Cybersecurity for ethical hackers, and computer scientists.

https://www.youtube.com/@NullByteWHT

21. The PC Security Channel — Windows security, malware news, and tutorials.

https://www.youtube.com/@pcsecuritychannel

22. Simply Cyber — Helps people with cybersecurity career development.

https://www.youtube.com/@SimplyCyber

23. Network Chuck — Everything related to network and cybersecurity.

https://www.youtube.com/@NetworkChuck

24. BlackPerl — Malware analysis, forensics and incident response.

https://www.youtube.com/@BlackPerl

25. Professor Messer — Guides covering certifications.

https://www.youtube.com/@professormesser

26. Hak5 — General cybersecurity coverage.

https://www.youtube.com/@hak5


Post by

newWorld

Tuesday, December 20, 2022

30 cybersecurity search engines for researchers:

In general, a search engine is a program that searches a database on the internet (sites like Google or Bing) to find information that is relevant to a specific keyword or phrase. When you use a search engine, you enter a word or phrase (called a "query") into the search field, and the search engine returns a list of web pages that are relevant to your query. The search results are usually ranked by how relevant they are to your search term, with the most relevant results appearing at the top of the list. Search engines use complex algorithms to analyze the content of websites and determine their relevance to a particular search query.

  • Access to information: Search engines provide a convenient and efficient way to access a vast amount of data on the internet. By simply typing in a few keywords, you can find websites, articles, and other resources related to various topics.
  • Ease of use: Search engines are user-friendly, with intuitive interfaces that make it easy for people of all ages and backgrounds to find what they are looking for.
  • Relevance of results: Search engines use complex algorithms to rank the results of a search based on their relevance to the keywords you enter. This means that you are more likely to find what you are looking for at the top of the search results, rather than having to sift through pages and pages of irrelevant content.
  • Personalization: Many search engines allow you to customize your search experience by saving your search history, preferences, and other information. This can help the search engine provide more personalized results based on your past searches.
  • Speed: Search engines are designed to be fast, so you can find what you are looking for quickly and easily. This is especially important in today's fast-paced world, where people often need to find information in a hurry.

Search Engines for Security Researchers

Security researchers use to gather tons of information and need to surf paramount of data. For them, search engines can be very useful, as they provide a quick and easy way to access a wide range of information on a variety of security-related topics. They can use search engines to find articles, blog posts, and other resources that provide information on new vulnerabilities, exploits, and other security issues. Search engines can also be used to find tools and resources that can help security researchers in their work, such as software that can be used to analyze and test the security of a system.

In addition to providing access to information, search engines can also be used by security researchers to monitor the internet for new security threats and vulnerabilities. By setting up alerts or performing regular searches for specific keywords, security researchers can stay up to date on the latest developments in the field and be alerted to potential security issues as they arise.

30 cybersecurity search engines for researchers:

1. Dehashed—View leaked credentials.

2. SecurityTrails—Extensive DNS data. 

3. DorkSearch—Really fast Google Dorking.  

4. ExploitDB—Archive of various exploits. 

5. ZoomEye—Gather information about targets.

6. Pulsedive—Search for threat intelligence. 

7. GrayHatWarfare—Search public S3 buckets. 

8. PolySwarm—Scan files and URLs for threats. 

9. Fofa—Search for various threat intelligence. 

10. LeakIX—Search publicly indexed information.

11. DNSDumpster—Search for DNS records quickly. 

12. FullHunt—Search and discovery attack surfaces. 

13. AlienVault—Extensive threat intelligence feed. 

14. ONYPHE—Collects cyber-threat intelligence data. 

15. Grep App—Search across a half million git repos.

16. URL Scan—Free service to scan and analyse websites. 

17. Vulners—Search vulnerabilities in a large database. 

18. WayBackMachine—View content from deleted websites. 

19. Shodan—Search for devices connected to the internet. 

20. Netlas—Search and monitor internet-connected assets.

21. CRT sh—Search for certs that have been logged by CT. 

22. Wigle—Database of wireless networks, with statistics. 

23. PublicWWW—Marketing and affiliate marketing research. 

24. Binary Edge—Scans the internet for threat intelligence.

25. GreyNoise—Search for devices connected to the internet. 

26. Hunter—Search for email addresses belonging to a website. 

27. Censys—Assessing attack surface for internet-connected devices. 

28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.

29. Packet Storm Security—Browse the latest vulnerabilities and exploits. 

30. SearchCode—Search 75 billion lines of code from 40 million projects.


Post by 

newWorld

Wednesday, December 14, 2022

Geek Squad Subscription – SCAM mail (Latest - Dec 2022)

 

Scam mail (phishing email) is a fraudulent message that is designed to trick the recipient into giving out personal information or taking some kind of action. Scam emails can be very convincing, so it's important to be cautious when receiving any unsolicited messages and to verify the legitimacy of the sender before taking any action. These emails often look legitimate and may use logos and branding from well-known companies to make them appear authentic. However, they are usually sent by scammers with the intention of stealing sensitive information, such as login credentials, financial information, or even just personal data. There are many types of scam emails, also known as phishing scams. Some common types include:

  • Nigerian letter scams, promise the recipient a large sum of money in exchange for their help in transferring funds out of the country.
  • Lottery scams claim that the recipient has won a large prize in a lottery they did not enter.
  • Charity scams, claim to be from a legitimate charity and ask for donations.
  • Investment scams promise high returns on investments but are actually fraudulent.
  • Phishing scams try to trick the recipient into giving away sensitive information such as their bank account details or login credentials.

Subscription – SCAM mail

The scammer emails that subscription renewal is pending for the upcoming year and the amount will be debited from your bank/card. It also mentions that the user has 24 hours to cancel the renewal. The current scenario is titled "Geek Squad Subscription", it is an ongoing scam mail which is themed as subscription renewal scam mail. 

The best way to protect yourself from scam emails is to be cautious and never give out personal information or money to someone you do not know. If you are unsure about the legitimacy of an email, it is always best to contact the sender directly using a known email address or phone number to verify their identity.


Post by

newWorld

Friday, December 9, 2022

Quantum potential - article of the week by EY!

 Quantum mechanics is a branch of physics that deals with the behaviour of matter and energy at the atomic and subatomic levels. It is based on the idea that particles, such as atoms and subatomic particles, can exist in multiple states or locations at the same time, and that their behaviour cannot be predicted with certainty. This phenomenon, known as quantum superposition, is one of the most striking and counterintuitive aspects of quantum mechanics.


Quantum mechanics has the potential to revolutionize many areas of science and technology, including computing, communication, and sensing. For example, a quantum computer would be able to solve certain problems much faster than a classical computer, and a quantum internet could provide unprecedented levels of security for communication. Additionally, quantum sensors could enable more precise measurements of physical quantities, such as position, momentum, and magnetic fields.


The development of these and other quantum technologies is an active area of research, and many challenges and obstacles still need to be overcome. However, the potential benefits of harnessing the principles of quantum mechanics are vast, and researchers and engineers around the world are working to unlock the full potential of this fascinating field.

Refer to the article released by EY: https://www.ey.com/en_gl/consulting/quantum-computing-5-steps-to-take-now


Post by

newWorld


Moon landing is not fake:

Introduction
Neil Armstrong was an American astronaut who became the first person to walk on the moon. He was born on August 5, 1930, in Wapakoneta, Ohio. Armstrong served in the United States Navy before joining the National Aeronautics and Space Administration (NASA) in the 1950s. He flew on the Gemini 8 mission in 1966, and he was the commander of the Apollo 11 mission that landed on the moon in 1969.

Armstrong's famous quote, "That's one small step for man, one giant leap for mankind," was spoken as he stepped off the lunar module and onto the surface of the moon on July 20, 1969. The moon landing was a historic moment that was watched by millions of people around the world. Armstrong and his fellow astronaut, Buzz Aldrin, spent approximately two and a half hours walking on the moon and conducting experiments before returning to Earth.



Moon landing

The moon landing was a historical event that occurred on July 20, 1969, when NASA astronauts Neil Armstrong and Buzz Aldrin landed their Apollo 11 lunar module on the surface of the moon. Armstrong became the first person to step onto the lunar surface, and he and Aldrin spent approximately two and a half hours walking on the moon and conducting experiments. The moon landing was witnessed by millions of people worldwide who watched the live television broadcast.



There is overwhelming evidence that the moon landing was true, including the thousands of photographs and hours of video footage taken during the mission, as well as the artefacts that were brought back from the moon, such as moon rocks and the American flag that was planted on the lunar surface. Additionally, numerous independent and government-funded investigations have been conducted over the years that have all concluded that the moon landing was a real and historic event.

Conspiracy theories - lack evidence

It is important to note that there is no credible evidence to support the idea that the moon landing was fake. The conspiracy theory that the moon landing was faked is based on misinformation and a lack of understanding of the technical challenges involved in such a complex and ambitious mission. It is important to carefully consider the evidence and rely on credible sources of information when evaluating historical events such as the moon landing.


Post by

newWorld

Thursday, December 8, 2022

Goku vs Superman: Who will win?

In the world of comics fans, this question is always pondered in the wild who would win in a fight between Goku from the Dragon Ball franchise and Superman from DC Comics. Both characters have unique abilities and powers that would make them formidable opponents, and the outcome of a hypothetical fight between them would depend on a number of factors.

Goku (AKA) Kakarot

Goku is a powerful warrior from the Dragon Ball franchise, known for his incredible strength, speed, and ability to harness the power of the seven dragon balls. He is able to use his ki energy to enhance his physical abilities, allowing him to fly, fire energy blasts, and even transform into more powerful forms. Goku is also a skilled martial artist, able to use a variety of hand-to-hand combat techniques to defeat his opponents. Throughout the Dragon Ball franchise, Goku becomes increasingly powerful, unlocking new abilities and transforming into more powerful forms. He is able to use his ki energy to enhance his physical abilities, allowing him to fly, fire energy blasts, and even use powerful special moves like the Kamehameha. He is also a skilled martial artist, able to use a variety of hand-to-hand combat techniques to defeat his opponents. Goku is known for his cheerful and optimistic personality, as well as his strong sense of justice. He is always willing to put himself in harm's way to protect his friends and the Earth from threats and is respected by many other characters in the Dragon Ball universe.

Superman (AKA) Kal-El

Superman, on the other hand, is a powerful alien from the planet Krypton. He is known for his incredible strength, speed, and durability, as well as his ability to fly and shoot heat vision from his eyes. Superman is also virtually invulnerable, able to withstand almost any attack, including bullets and bombs. He is often considered one of the most powerful superheroes in the DC Comics universe.

As a baby, Kal-El was sent to Earth by his parents in order to save him from the destruction of Krypton. He was raised by the Kents, a farming couple from the town of Smallville, and was given the name Clark Kent. As he grew up, Clark discovered that he had superhuman powers, including super strength, super speed, and the ability to fly. After discovering his true identity, Clark became Superman, a hero who uses his powers to protect the people of Earth from harm. He becomes a symbol of hope and justice and is respected and admired by many for his bravery and selflessness. Throughout Superman mythology, Kal-El faces many challenges and enemies, including Lex Luthor, Brainiac, and General Zod. He also forms close bonds with other superheroes, such as Batman and Wonder Woman, and becomes a key member of the Justice League. Despite his incredible powers, Superman struggles with his dual identity and the weight of his responsibility as a hero.

Goku vs Superman

If Goku and Superman were to face each other in a fight, the outcome would be difficult to predict. Goku's ability to harness the power of the dragon balls and transform them into more powerful forms would give him an edge, but Superman's invulnerability and heat vision could be difficult for Goku to overcome. In a no-holds-barred fight, there would be no rules or restrictions on the fighters' actions, allowing them to use any means necessary to defeat their opponent. This would give both Superman and Goku the opportunity to use their full range of powers and abilities, making the fight even more unpredictable.

Ultimately, the outcome of such a hypothetical fight would depend on the specific conditions and rules of the battle.



Post by

newWorld


 

What if Muhammad Ali vs Mike Tyson fought in their prime?

 Muhammad Ali and Mike Tyson are two of the most well-known and celebrated heavyweight boxers in history. While they never faced each other in the ring, they both had successful and controversial careers that made them icons of the sport.


Muhammad Ali, born Cassius Clay, was a professional boxer from Louisville, Kentucky. He is widely considered one of the greatest boxers of all time, with a record of 56 wins and 5 losses. Ali was known for his speed, agility, and technical skill in the ring, as well as his brash and outspoken personality outside of it. He is famous for his "float like a butterfly, sting like a bee" mantra, and for his epic bouts against other boxing legends like Joe Frazier and George Foreman.



Mike Tyson, on the other hand, was a younger and more explosive fighter. Born in Brooklyn, New York, Tyson rose to fame as a teenager with his ferocious punching power and intimidating presence. He became the youngest heavyweight champion in history at the age of 20 and went on to dominate the division for many years. Despite his success in the ring, Tyson's career was marred by controversy, including several high-profile legal issues and his infamous ear-biting incident in a 1997 fight against Evander Holyfield.


While Muhammad Ali and Mike Tyson never faced each other in the ring, they are both considered among the greatest heavyweight boxers of all time. Ali's technical skill and showmanship set him apart, while Tyson's raw power and ferocity made him a force to be reckoned with. Their legacies continue to inspire and influence boxers and fans around the world.

Hypothetical fight
If Muhammad Ali and Mike Tyson faced each other in their prime, it is likely that the fight would be closely contested. Both men were at the top of their game during this period, and they each had unique skills and abilities that would have made them formidable opponents. Muhammad Ali was in his prime during the 1960s and 1970s. He was known for his speed, agility, and technical skill in the ring, as well as his mental toughness and ability to outlast his opponents. Ali's style was based on movement and precision, and he was able to outmanoeuvre many of his opponents with his quick feet and quick hands.

Mike Tyson, on the other hand, was in his prime during the 1980s and early 1990s. He was known for his incredible punching power and intimidating presence in the ring. Tyson's style was based on aggression and ferocity, and he was able to knock out many of his opponents with just a few well-placed punches.

If these two fighters faced each other in their prime, it is likely that the fight would be closely contested. Ali's speed and technical ability might have given him an early advantage, but Tyson's power and ferocity could have been difficult for Ali to handle. Ultimately, the outcome of such a hypothetical fight would depend on a number of factors, including the fighters' physical condition and mental state on the day of the fight.

Post by

Do SSDs become obsolete?

NAND flash storage is a type of non-volatile memory that can store data even when the power is turned off. It employs NAND flash memory, a t...