you may be in need of shrinking your disc for different purpose , either to do dual boot or something else. Kali Linux give you that opportunity to shrink your disc even if you are not a master Linux by using gparted.
If you are having Kali Linux installed on your computer or by booting into a live Kali Linux session with your chosen installation medium, we can resize the partition to our desired size, as the disk will not be in use because Kali Linux will all be in memory.
Those who are not having kali Linux installed on their pc they can follow the first procedure.
To start resizing, make sure you insert your Kali Linux installation medium and power on the device. If needed, press any keyboard shortcuts for a “boot order menu” (depends on each manufacture eg:” F12, F9…”) or boot into BIOS/UEFI and change the boot order to point to the installation medium first.
When the boot menu/options appear, you should see at least one new option. Depending on the manufacture, hardware, how the system is configured, and install medium, you may see more options (e.g. Can you boot into non-UEFI?)
You may need to try a few different options in order to find success.
You should be greeted with the Kali Linux boot screen. Select Live, and You should be greeted with the Kali Linux boot screen. Select Live, and you should be booted into the Kali Linux default desktop.
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Also, it contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.
Also, it was released on the 13th March 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.
Offensive Security is the team behind Kali Linux, a Debian-based system. Kali is the preferred weapon of choice on Null Byte, and you can install it as your primary system (not recommended), use it with dual boot, install it in a virtual workstation, or create a portable live version on a USB flash drive.
Here, We’ll be walking you through a very basic installation today, just enough to get you up and running to follow along with Null Byte guides. There are actually many things that can be done to customize the installation, but we just want the quick-and-dirty process.
More than 600 penetration testing tools included
Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
Open source Git tree: they are committed to the open source development model and their development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
Is Kali Linux Right For You?
As the distribution’s developers, you might expect us to recommend that everyone should be using Kali Linux. The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you’re unfamiliar with Linux.
Also, even for experienced Linux users, it can pose some challenges. Although Kali is an open source project, it’s not a wide-open source project, for reasons of security. The development team is small and trusted, packages in the repositories are signed both by the individual committer and the team, and importantly the set of upstream repositories from which updates and new packages are drawn is very small. Also, know that adding repositories to your software sources which have not been tested by the Kali Linux development team is a good way to cause problems on your system.
Also, if you are looking for a Linux distribution to learn the basics of Linux and need a good starting point, Kali is not the ideal distribution for you. You may want to begin with Ubuntu, Mint, or Debian instead.Also, if you’re interested in getting hands-on with the internals of Linux, take a look the Linux From Scratch project.
In Kali Linux version 2019.4, released at the end of 2019, Offensive Security made significant changes to how it looks and feels. And its 2020.1 update, released in January 2020, built upon the new foundation.
Perhaps the most significant update is the default desktop environment, which is now Xfce, a change that was made mostly for issues related to performance. Also, for most users, GNOME is overkill, and a lightweight desktop environment like Xfce provides lower overhead, leading to snappier and quicker performance. For all the die-hard GNOME fans out there, the previous desktop environment is still supported and even comes with an updated GTK3 theme.
Also, other new features include the introduction of undercover mode, new public packaging and documentation processes, an update to Kali NetHunter, the addition of PowerShell, non-root users are now the default, and other bug fixes and updates.
Which Image to Choose
The Kali Linux download page offers three different image types (Installer, NetInstaller and Live) for download, each available for both 32-bit and 64-bit architectures.
If in doubt, use the “Installer” image. Also, you will need to check your system architecture to know weather to get 32-bit or 64-bit. If you don’t know it, you’re best to research how to find out (As a rule of thumb, if its older than 2005 you should be okay with amd64/x64/64-bit)
Is the recommended image to install Kali Linux. It contains a local copy of the (meta)packages listed (top10, default & large) so it can be used for complete offline installations without the need of a network connection.
Also, it cannot be used to boot a live system (such as directly running Kali from a USB). It is only an installer image.
It can be used if you want the latest package every time you install Kali Linux or the standard installer image is too big to download. Also, this image is very small because it does not contain a local copy of (meta)packages to install. They will all be downloaded during installation, so as a result this requires a network connection which will slow down the installation time. Only use this image if you have reasons not to use the standard installer image above.
This image cannot be used to boot a live system (such as directly running Kali from a USB). It is only an installer image.
This image is for running Kali Linux without installing it first so it is perfect for running off a USB stick(or a CD/DVD).
Also, you are able to install Kali Linux in its default configuration from this image but you will not be able to choose between desktop environments or to specify additional (meta)packagesto install.
Then, if you want to run an older version of Kali, you can visit its index of older image versions. While Kali 2020.1 replaced root users with non-root users as the default, you may want to install the last 2019 version instead, which will still give you most of the newest features offered.
In this guide, Once you’ve decided how you want to run Kali, click the image name to download it. Also hit the “Torrent’ link instead if that will get the job done better.
Then, if you’re not sure of the architecture of the system you want to run Kali on, on Linux or macOS, you can run the command uname -m at the command line. Then, If you get the response, “x86_64”, use the 64-bit ISO image (the one containing “amd64” in the file name); if you get “i386”, use the 32-bit image (the one containing “i386” in the file name). If you’re on a Windows system, the procedure for determining whether your architecture is detailed on Microsoft’s website .
IMPORTANT! Never download Kali Linux images from anywhere other than the official sources.Also,Always be sure to verify the SHA256 checksums of the file you’ve downloaded against our official values . It would be easy for a malicious entity to modify a Kali installation to contain exploits or malware and host it unofficially.
Installing Kali Linux
The process for installing Kali Linux will be different depending on what version you chose. Also, for help on installing Live images, you can also find some help, as well as Kali’s own documentation.
Installing Kali Linux (Single boot) on your computer is an easy process. This guide will cover the basic install (which can be done on bare metal or guest VM), with the option of encrypting the partition. You should be able to use Kali Linux on newer hardware with UEFI and older systems with BIOS.
Backup any important information on the device to an external media.
Ensure that your computer is set to boot from CD/DVD/USB in your BIOS/UEFI.
1. To start your installation, boot with your chosen installation medium. You should be greeted with the Kali Linux Boot screen. Choose either Graphical install or Install (Text-Mode). In this example, we chose the Graphical install.
2. Then select your preferred language. Also, This will be used for both the setup process and once you are using Kali Linux.
3. Next, specify your geographic location.
4. Then select your keyboard layout.
5. Then the setup will now probe your network interfaces, looks for a DHCP service, and then prompt you to enter a hostname for your system. In the example below, we’ve entered kali as our hostname.
If there is no network access with DHCP service detected, you may need to manually configure the network information or do not configure the network at this time.
If there isn’t a DHCP service running on the network, it will ask you to manually enter the network information after probing for network interfaces, or you can skip.
If Kali Linux doesn’t detect your NIC, you either need to include the drivers for it when prompted, or generate a custom Kali Linux ISO with them pre-included.
If the setup detects multiple NICs, it may prompt you which one to use for the install.
If the chosen NIC is 802.11 based, you will be asked for your wireless network information before being prompted for a hostname.
6. Also, you may optionally provide a default domain name for this system to use (values may be pulled in from DHCP or if there is an existing operating systems pre-existing).
7. Next, create the user account for the system (Full name, username and a strong password).
7. a. You can create a username of your choice
7. b. You must also create a Strong password. Make sure you create a strong password to protect your kali
8. Then set your time zone.
9. Next the installer will now probe your disks and offer you various choices, depending on the setup. Also, in this guide, we are using a clean disk, so we have four options to pick from. We will select Guided – the entire disk, as this is the single boot installation for Kali Linux, so we do not want any other operating systems installed, so we are happy to wipe the disk.
If there is an pre-existing data on the disk, you will have have an extra option (Guided – use the largest continuous free space) . This would instruct the setup not to alter any existing data, which is perfect for for dual-booting into another operating system. As this is not the case in this example, it is not visible.
Experienced users can use the “Manual” partitioning method for more granular configuration options, which is covered more in our BTRFS guide.
10. Then select the disk to be partitioned.
11. Additionaly, depending on your needs, you can choose to keep all your files in a single partition, “the default”, or to have separate partitions for one or more of the top-level directories. Also, If you’re not sure which you want, you want “All files in one partition“.
11. a.Next we finalize partitioning
12. Also, you’ll have one last chance to review your disk configuration before the installer makes irreversible changes. After you click Continue, the installer will go to work and you’ll have an almost finished installation.
13. Kali Linux uses a central repository to distribute applications. You’ll need to enter any appropriate proxy information as needed.
14. Here you can select which metapackages you would like to install. The default selections will install a standard Kali Linux system and you don’t really have to change anything here. Please refer to this guide if you prefer to change the default selections.
15. Next confirm to install the GRUB boot loader.
16. Here you Select the hard drive to install the GRUB bootloader in (it does not by default select any drive).
17. Finally, click Continue to reboot into your new Kali Linux installation.
Congratulation you have reached the end of our guide. now you are able to install properly kali linux In case of any questions, don’t hesitate to post your comment below. for more details go on kali.org Thanks.
WhatsApp is a free, multiplatform messaging app that lets you make video and voice calls, send text messages, and more all with just a Wi-Fi connection or other.
Then to access totally whatsapp account the only information needed to connect to someone’s whatsapp account is a valid phone number and verification code.
who would have thought that the way of logging into whatsapp accounts could be misused to hack user data without their knowledge?
How they do to hack whatsapp?
The first thing hackers do to hack whatsapp they send you a message that showed you that they did mistake.
so if you receive a message on your phone explaining that an error has been made that you received a message containing a code from another person allowing them to connect to whatsapp, do not disclose this code!
NB: they can use different attractive message, to let you send them the confirmation message
Also anyone who has access to this code, along with your phone number, could enter your account, and block you in such a way that you can no longer access it.
Of course, the only information needed to connect to someone’s WhatsApp account is a valid phone number and a verification code that you will receive at this number by SMS used to verify the authenticity of the person wishing to connect. for more information how whatsapp work.
Unfortunately, some people have decided to take advantage of this ease of use against WhatsApp’s users.
all they need to know is the phone number of their potential victim.
and by registering on the application with this phone number that does not belong to them.
Then these same people cannot access the accounts without the access code which was sent to the phone of the victims. Then, the victims receive the following message:
whatsapp verfication code
“Hey, I accidentally sent a WhatsApp verification code to your phone. Can you send it to me?”.
it can be any message to ask you a message received.
If a victim responds to this message with the code they received by text message, the perpetrators are in possession of the victim’s telephone number, and also of the identity verification code.
In other words, they have it all. at that time they become the owner of your WhatsApp accounts.
“You should never share your WhatsApp verification code with others. If someone is trying to take over your account, they need the SMS verification code sent to your phone number to do so.
Without this code, any user attempting to verify your number can’t complete the verification process and use your phone number on WhatsApp. This means you remain in control of your WhatsApp account.”
WhatsApp doesn’t have sufficient information to identify the individual who is attempting to verify your WhatsApp account.
So be careful – the security and the use of your WhatsApp account depends on it!
Youtube allows to download of some of its videos and offline viewing, using third-party apps to download YouTube videos is against their terms.
YouTube Terms of Service explicitly mentions that users shouldn’t download content unless a download button or link is shown by YouTube on a particular service.
It is not allowed to download or make copies of copyrighted content. If they caught you doing that, there is some punishment set by the Youtube team for that. Although YouTube has never lashed on a user for downloading copyrighted content using a video downloader, the activity regardless is illegitimate.
Despite the risks, if you really need to satisfy your need of downloading YouTube videos then you are in good place for that, here are some of the best Android apps to satisfy your needs.
List of 7 android best youtube downloader
In term of security, Android blocks the installation of apps that are not from the Google Play Store. So before to start you have to enable app installation from other sources. To enable it , just go to Settings then Security. Tap on “Unknown sources”. A warning will pop up. Then Press OK.
Nb: if you you did it before, then scape don’t repeat again.
1. YouTube Go
YouTube Go is basically a toned-down version of the original YouTube app. It is now available in the Play Store
is intended for low performing smartphones. However, users seeking to download YouTube videos for free legally can use it to their benefit.
Unlike a regular YouTube app that only shows the download button on selected videos and prompts you to subscribe to YouTube Premium for complete access, YouTube Go isn’t crippled by such restrictions.
With Youtube Go you can also share videos of high quality without the internet. The only limitation of Youtube Go is that it doesn’t let you to grab videos from others services like Facebook , Instagram … Click here to download YouTube Go
Videoder is a powerful YouTube video downloader for Android. With it, you can download videos from different sites such as Youtube, Facebook, Instagram, etc
It allows streaming and downloading of videos in all formats available. It gives the possibility to choose any video quality you prefer, and can also share the video from within the app. It helps you with a faster downloading speed and also packs different themes, night mode, built-in video player, etc.
Also, it is not available in the Play Store, but you can download the app for free from its official site and install it on your phone. Also, it gives all users the chance of using it. This app in free mode It contains ads. However, you can remove the ads if you buy the Videoder Premium plugin from Play Store. That depends on your personal choice.
TubeMate is also a best app to download youtube videos. It has a good interface that is easy to use, it offers the possibility of downloading videos from multiple sites . It comes with a built-in browser where you can access the sites you want. You can download the video from the preferred site.
It also offers you the option to choose the quality and file format of the video before downloading it. The downloaded videos are stored in your phone memory automatically.
You have also the choice to download Youtube videos in MP3 format too, but before it requires an additional video to MP3 converter app you can download it on play store but by default it suggest it when try to download. Overall, TubeMate is an excellent video downloader for Android.
How to download videos on android using TubeMate.
After finish to downlaod and install TubeMate,
Open the app and visit the video-sharing site. Example: youtube.com
Pick your desired video from the search results. TubeMate will prompt you for the quality of the video you want.
After selecting the quality and resolution of the video, you can tap the download button.
Then you can also share videos to Tubemate from the YouTube app to view a download link. Nb: you can also copy the link of a videos from the source and copy it in TubeMate it will detect the video to download it
KeepVid is one of the best Android video downloaders and one of the most popular ones around. This video downloader can download YouTube videos with faster speed compared to other video downloaders and also enables users to download videos from 27 other video sharing sites such as Facebook, Twitter, Tumblr, etc.
Also, it has a good interface and easy to use. It allows users to download HD videos up to 4K resolution and also has a built-in video and audio player. You can even download Youtube videos as MP3 without any external plug-in.
How to download YouTube videos on Android using KeepVid
After downloading and install KeepVid, Open kipVid
Open YouTube in the app and search for the video.
Select the video and tap on the blue download button beneath the video player
Then, select the quality of the file, and your video will be saved automatically.
Snaptube is also a good video downloader that help users to download YouTube videos for free. It has a user-friendly interface that is organized by popular sites, popular videos and categories. You can also perform a Youtube search directly from its search bar. you can choose the quality of the video before downloading it. You can also share the downloaded videos on Facebook, Twitter, etc. from within the app.
The downloaded videos are saved automatically in your device storage, and you can also view the downloaded files organized into music and video categories.
How to download videos on android using Snaptube
After downloading and installing Snaptube
Open Snaptube and select the YouTube mobile site from its Homepage.
Search for the video in the YouTube search bar.
Select the video and tap on the red download button displayed on the right side of the video.
then Choose the quality of the video, and your video will start downloading.
InsTube is an another best YouTube Video Downloader for Android. It can also download videos from other popular sites like Instagram, Twitter, Vimeo, etc. The app is a reliable one and delivers fast downloading speed.
It gives the possibility of choosing the quality of Youtube videos before downloading it. You can even share the YouTube videos from within the Youtube app to InsTube.
How to download videos on Android using InsTube
After finish to download and install InsTube
Launch InsTube and visit your desired website.
Search for the video you wish to download and tap on the desired video.
Tap on the red download button and choose the quality of the video.
Then choose “fast download” and your video will start downloading.
Why should you start using anonymous browsers instead of regular ones?
Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby express themselves selectively.
When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use, as well as protection of information.
You may ask yourself why should i start using anonymous browsers instead of regular ones?
You may found that the answer is clear, these days on the internet nothing is private, in fact many websites are providing online privacy but is a joke and our private browsing data has been using for business purposes like advertising. We are been tracked by Google, by our government and many of data collectors.
It’s easy to know what we are doing online, which websites are we visiting. They collect all these information and use them against us it can be in present or in future. But the hard truth is that it’s some how impossible to be fully anonymous.
But we can reduce the impact to some extent by following some quick measures that will diminish leaked information footprint and (almost) secure our online privacy. In this article, we are going to list a similar measure to protect your browsing data.
These anonymous browsers that we are going to see are powerful in term of security and privacy than regular ones.
These secure browsers will prevent somebody watching your internet connection from learning what sites you visit, it stops sites you visit from learning your physical location and lets you access sites which are blocked.
Tor browser is the best powerful anonymous browser is completely free and open-source software built around onion routing. The privacy browser Torprotects you by sending your internet traffic and communications around a distributed network of relays run by volunteers all around the world.
Like instead of directing traffic from A to B, the Tor browser actually bounces it multiple times through different locations. In this way, no one could possibly tell where the traffic originated or where it’s going.
However many government organizations use the Tor browser to gather intelligence and visit the darknet or other websites without leaving any digital footprints or government IP addresses in the site’s log makes Tor one of the most secure web browsers and best open-source alternative to Google Chrome.
In addition, when it comes to other benefits, know that Tor helps you visit websites that might be blocked in your country.
In case if you want to know more aboutTor Browser, visit the official website
Epic Browseris a chromium-based anonymous web browser that comes with the ability to stops 600+ tracking attempts in an average browsing session. It restricts websites from showing ads, fingerprinting, crypto-mining, ultrasound signalling and more.
only when you’re using Epic with encrypted proxy on, your data is encrypted and hidden from the government, from your ISP, from Google and from hundreds of data collectors. And when you close it after internet surfing, it automatically deletes the browsing history, cookies, web cache, databases, web, Flash & Silver-light cookies — literally everything that compromises your privacy.
In addition, it encrypts your data and hidden from the government, from google and from many data collectors when you are using it with encrypted proxy. When it is closed after internet surfing.
In case if you want to know more aboutEpic Browser, visit the official website
Comodo created two flavors of anonymous browsers. One named Comodo Dragon— is also a Chromium-based secure web browser like Epic, it comes with all of Chrome’s features plus the unparalleled level of security and privacy.
And the other named Comodo IceDragon— is a fast and versatile Internet browser based on Mozilla Firefox which features several security, performance and feature enhancements over the core build. Fully compatible with Firefox plug-ins and extensions, IceDragon combines the freedom and functionality of Firefox with the unparalleled security and privacy of Comodo.
Comodo Dragon and Ice Dragon privacy web browsers possess top-level security features to anonymize your browsing data from the third party.
Brave Browser protects you against ads and trackers ads . Then, it blocks any cookies other than those absolutely needed. It also isolates each tab so that websites can’t communicate.
You also get protection against malicious code and malicious sites, especially those related to cryptocurrency mining. And if you need an extra layer of privacy, Brave allows you to take part in a Tor network (instead of offering the traditional “Incognito” mode).
BRAVE SHIELDS FOR PRIVACY
Block data-grabbing ads and trackers
The vast bulk of websites and ads include software that tries to identify you. They want to track your every move across the web. Brave blocks all this, allowing you to browse freely.
In case if you want to know more aboutBrave, visit the official website
Waterfox was started back in March 2011 by myself (Alex Kontos), a 16 year old student. Is based on Mozilla’s free and open source platform.
as well as Waterfox was one of the first widely distributed 64-Bit browsers on the web and quickly gained a loyal following. At a time it had one thing in mind: speed, but now it also attempts to be an ethical, user-oriented browser.
It focuses on giving users choice. The browser is focused on power users, which lets you make the important decisions.
There is no plugin whitelist (meaning you can run Java Applets and Silverlight apps), you can run whichever extensions you like (including bootstrapped add-ons that can completely change functionality of the browser) and absolutely no data or telemetry is sent back to Mozilla or the Waterfox project.
We recommend this Web browser to both regular and more advanced users. That’s because Waterfox comes equipped with everything you could possibly need without installing add-ons or extensions of any kind.
Our list of the best anonymous browsers wouldn’t be complete without Iron. This one is designed for long-term Chrome users looking for a way to get away from Google.
Iron depends on Chromium reason why it looks very similar to Chrome. However, this browser has eliminated pretty much all types of Google-related tracking.
We are talking about Chrome features such as Installation-ID, Suggest, Alternate Error Pages, Error Reporting, RLZ-Tracking, and URL-tracking. We should also mention that Iron is under active development.
Congratulation you have reached the end of our guide to the protection online privacy with 6 anonymous browsers In case of any questions, don’t hesitate to post your comment below. Thanks. you may want to see also privacy with browser
The world with advanced technology has become great and sometimes harmful. “ At the end of the day, everything is hackable. What I am surprised about is that people sometimes forget that it’s so easy to hack into there devices,” said Adi Sharabani, the co-founder of mobile security company Skycure, who used to work for Israeli Intelligence.
of course Hackers can get into your phone without even your knowledge , human vulnerabilities is giving hackers access to their device without even know or touching the victim device. Day and night smart phones brands providers are working on how to secure their provide smart phone in that way hackers are also testing vulnerabilities days and night .
also the threat of having your phone hacked has become a common and rational fear. The cold hard truth is that it is now possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even some of the most sophisticated phone software.
Unfortunately, there are many hackers with malicious intent that can and do break into an Android device to steal valuable personal information or to profit from illegal financial transactions. While it may be hard (or even impossible) to make your Android un-hackable, there are things you can do to make your device more secure. you may like also to know if your smartphone is tapped or spy
Example of hacking attacks
If you’ve ever seen an antivirus alert pop up on your screen, or if you’ve mistakenly clicked a malicious email attachment, then you’ve had a close call with malware. Attackers love to use malware to gain a foothold in users’ computers—and, consequently, the offices they work in—because it can be so effective.
in the same wayAttackers will use a variety of methods to get malware into your computer, but at some stage it often requires the user to take an action to install the malware.
As well this can include clicking a link to download a file, or opening an attachment that may look harmless (like a Word document or PDF attachment), but actually has a malware installer hidden within.
When an attacker wants you to install malware or divulge sensitive information, they often turn to phishing tactics, or pretending to be someone or something else to get you to take an action you normally wouldn’t. Since they rely on human curiosity and impulses, phishing attacks can be difficult to stop.
so in a phishing attack, an attacker may send you an email that appears to be from someone you trust, like your boss or a company you do business with. The email will seem legitimate, and it will have some urgency to it (e.g. fraudulent activity has been detected on your account).
In the email, there will be an attachment to open or a link to click. Upon opening the malicious attachment, you’ll thereby install malware in your computer. If you click the link, it may send you to a legitimate-looking website that asks for you to log in to access an important file, except the website is actually a trap used to capture your credentials when you try to log in.
To reduce the risk of being phished, you can use these techniques:
Critical thinking — Do not accept that an email is the real deal just because you’re busy or stressed or you have 150 other unread messages in your inbox. Stop for a minute and analyze the email.
Hovering overthe links — Move your mouse over the link, but do not click it! Just let your mouse cursor h over over the link and see where would actually take you. Apply critical thinking to decipher the URL.
Analyzing email headers — Email headers define how an email got to your address. The “Reply-to” and “Return-Path” parameters should lead to the same domain as is stated in the email.
Sandboxing — You can test email content in a sandbox environment, logging activity from opening the attachment or clicking the links inside the email.
Did you know that hacking software for Android and other mobile devices exists? And did you know there are countless hacking software options online for free? Hacking software is a method used by hackers to get information from a phone.
Despite the price of hacking software the serious hackers can buy hacking software anywhere, such as a phone Spy App, which must be installed on the target phone. Not all hackers need to handle a phone physically in order to install hacking software, but in some cases they must.
Keyloggers: are a type of monitoring software designed to record keystrokes made by a user. One of the oldest forms of cyber threat, these keystroke loggers record the information you type into a website or application and send to back to a third party. It can be installed in your phone to record all information you type on your keyboard and send it to a third party set by the hacker.
Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cuber-thieves and hackers trying to gain access to users’ systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cuber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. Hacker use phishing to impress victim to install Trojans in their devices. These actions can include:
Disrupting the performance of computers or computer networks
Spyware — Spyware is a type of program that is installed to collect information about users, their computers or their browsing habits. It tracks everything you do without your knowledge and sends the data to a remote user. It also can download and install other malicious programs from the internet. Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware application.
also Spyier, is an excellent tool for hacking someone’s phone by number, is the outstanding one among all other telephone number programmer applications at any point imagined. More than a million clients in 190+ nations depend significantly on the form. The app can hack somebody’s mobile phone by simply their number if they’re utilizing an Android or iOS gadgets.
SIM Card Hacking
In August of 2019, the CEO of Twitter had his SIM card hacked by SIM card swapping using the phishing method. SIM card swapping is performed when the hacker contacts your phone provider, pretends to be you, and then asks for a replacement SIM card. Once the provider sends the new SIM to the hacker, the old SIM card will be desactivated, and your phone number will be stolen. This means the hacker has taken over your phone calls, messages, etc. This method of hacking is relatively easy if the hacker can convince the provider that they are you. Keeping personal details to yourself is an important part of ensuring that hackers cannot pretend to be you.
in addition Adaptive Mobile Security discovered a new way hackers were getting into phones using the SIM card—a method they call Simjacker. This way of hacking is more complex than phishing as it targets a SIM card by sending a signal to the target device. If the message is opened and clicked on, hackers are able to spy on the hacked device and even find out the location of the device.
in the same way Professional hackers can use special software products to search for vulnerable mobile devices with an operating Bluetooth connection. These types of hacks are done when a hacker is in range of your phone, usually in a populated area.
then when hackers are connected to your Bluetooth, they have access to all of the information available and the internet connection to access the web, but the data must be downloaded while the phone is within range.
How to Prevent to become a victim of phone hacking
As you saw many technics and tools hacker can use to hack your devices. Here are a few tips to ensure that you are not a victim of phone hacking:
1. Avoid sharing your phone with untrusted people
on the other hand the easiest way for a hacker to steal your phone’s information is to gain access to it . therefore, it is always important to avoid sharing your phone with unstrusted people. If you have been away from your phone around a group of strangers and are concerned about possible hacking, check your settings and look for strange apps.
2. Do encryption of Your Device
also Encrypting your cell phone can save you from being hacked and can protect your calls, messages, and critical information. To check if a device is encrypted: iPhone users can go into Touch ID & Passcode, scroll to the bottom, and enable Data protection. Android users have automatic encryption depending on the type of phone.
3. lock your SIM Card
addionally Putting a passcode on your SIM card can protect it from being hacked.
4. Check your WIFI and Bluetooth
It is fairly easy for hackers to connect to your phone using WIFI or Bluetooth if they are on, so turn them off when not needed because there is no warning when a hacker attacks you. If you fear being hacked in a public space, turning off your phone can block a hacker’s ability to hack you — this is an effective preventative method.
5.Use Security Protection or installing an anti-malware
Protecting your device from hackers require some knowledge that you have already. Use device provide security or installing a antivirus or a anti-malware in your device will block some untrusted app or websites.
Making a point to understand how hacking works can help you practice security in your every day life. Know how to be prepared for being hacked, so that when it happens you can be on top of how to handle it.
Operating System For hacking and Penetration Testing
For hacking and penetration testing, there are several operating systems that you should know or use once you want to start. In this article, we are going to discuss only 6 best operating system.
What is hacking?
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. For more info click here
what is penetration testing?
Penetration testing also called pen testing or ethical hacking is the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in — either virtually or for real — and reporting back the findings.
The main objective of penetration testing is to identify security weaknesses. Penetration testing can also be used to test an organization’s security policy, its adherence to compliance requirements, its employees’ security awareness, and the organization’s ability to identify and respond to security incidents.
There are 100’s of hacking tools are pre-installed with Kali Linux for various operation such as pen testing, vulnerabilities analysis, forensic analysis, information gathering, wireless attacks, exploitation tools, etc.
It also used to use GNOME as a Desktop Environment. Nowadays Kali Linux became a Rolling release Distro. You can use a desktop environment of your choice like KDE, MATE or XFCE…
also, It has a lot of tools in the Kali Repositories. You can download Kali Linux on its official web page Download. Kali Linux Ranked number one in Top 6 Penetration Testing & Ethical Hacking Linux 2020.
Backbox Linux is a top 3 among 6 Best OS for Hacking and Penetration Testing distro based on Ubuntu Linux.
Developed by Backbox Team. The first release was on September 9, 2010.
Also, Backbox used to use XFCE as a Desktop Environment and Ubuntu LTS versions as a base.
It also contains the most professional, famous, and used tools in the PenTesting field like MSF, NMAP, BurpSuite, Armitage, SQLMap, and so on. YOU CAN you can download BackBox Linux on its official web page Download.
Black arch Linux-based Arch Linux is a top 4 among 6 Best OS for Hacking and Penetration Testing Distro designed for Professional & Elite Hackers who have the ability to work with Linux like a Pro.
Also, Black Arch contains nearly 2500 hacking tools, and almost it covering all the phases in cybersecurity.
it also used to use Fluxbox & OpenBox as a Desktop Environment with other DE’s. It has huge tools in the repository more than 1500+ hacking tools included in the Distro & Repo. The first release was in 2013. you can download BlackArch Linux on its official web page Download.
5- Fedora security Lab:
Fedora Security environment is a top 5 among 6 Best OS for Hacking and Penetration Testing enables you to work on security auditing, forensics, and hacking. It also comes with a clean and fast desktop environment. This OS contains essential networking tools like Wireshark, Medusa, Sqlninja, Yersinia, and more. Fedora Security environment makes pen-testing and security testing simple. you can also download Fedora security on its official web page Download
6- Samurai Web Testing Framework (Samurai-WTF):
Samurai WTF it’s a top 6 among 6 Best OS for Hacking and Penetration Testing and Professional Web Application Penetration Testing Framework & Distro.
It also contains only WebApp Pentest Tools such as Burpsuite, SQLMap… and so on. Based on Ubuntu. The first release was in 2008. you can also download the Samurai web testing framework on it’s official web page Download .
Choosing the best OS for Hacking & penetration testing is a good sign to learn ethical hacking and Penetration testing concepts to enhance your skills and protecting the enterprise assets from cybercriminals.
Every security professionals have their own favors of security OS to make use of hacking tools for both learning and commercial purpose. good choice for you.
In systems engineering, information systems, and software engineering, the software development life cycle, also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system.
Software development Life Cycle consists of a detailed plan describing how to develop, maintain, replace and alter or enhance specific software. The life cycle defines a methodology for improving the quality of software and the overall development process
Why the Software Development Life Cycle is important
Did you know that 85% of software projects run over schedule? And The process of developing software solutions is difficult and often long and expensive operation. SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time possible.
SDLC provides a well-structured flow of phases that help an organization to quickly produce high-quality software which is well-tested and ready for production use. Also, that when the life cycle is done right, it sets a clear path to everyone involved in the development process to arrive at their goal.
Furthermore, not only does the SDLC process clearly define the goal and the path toward it, but it also doesn’t rely on any single person.
Also, since SDLC provides a well-documented trail of the project, things won’t instantly crash and burn if a key person leaves before the project is done. Instead, their replacement can jump straight in without any difficulties.
At this point I think you already know what the SDLC is and also its importance!
The Software Development Life Cycle (SDLC) refers to a methodology with clearly defined processes for creating high-quality software. In detail, the SDLC methodology focuses on the following phases of software development:
SDLC works by lowering the cost of software development while simultaneously improving quality and shortening production time. Also, SDLC achieves these apparently divergent goals by following a plan that removes the typical traps of software development projects. That plan starts by evaluating existing systems for deficiencies.
Next, it defines the requirements of the new system. It then creates the software through the stages of analysis, planning, design, development, testing, and deployment. By anticipating costly mistakes like failing to ask the end-user or client for feedback, SLDC can eliminate redundant rework and after-the-fact fixes.
It’s also important to know that there is a strong focus on the testing phase. As the SDLC is a repetitive methodology, you have to ensure code quality at every cycle. Many organizations tend to spend few efforts on testing while a stronger focus on testing can save them a lot of rework, time, and money. Be smart and write the right types of tests. Next, let’s explore the different stages of the Software Development Life Cycle.
The 7 Stages Of A Software Development Life Cycle, Explained
“What are the current problems?”
This stage of the SDLC means getting input from all stakeholders, including customers, salespeople, industry experts, and programmers. Learn the strengths and weaknesses of the current system with improvement as the goal.
Requirement Gathering and Analysis
“What do we want?”
At this stage of the SDLC, the team determines the cost and resources necessary to implement the analyzed requirements. It also details the risks involved and provides sub-plans to eliminate those risks. In other words, the team needs to determine the feasibility of the project and how they can successfully implement it with the lowest risk in mind.
Software design such as architectural design
“How will we get what we want?”
This phase of the SDLC starts by turning the software specifications into a design plan called the Design Specification. After collecting and analyzing important information in the previous stage, the enterprise software development company moves on to the second stage — design.
This stage of the software development process starts with the design of software solutions. Also, it depends on the type of software being created, this can include interface designs, user experience (UX) outlines, prototypes, and more. Software development firms must specify the system and hardware requirements.
Following design, software developers can move to the third stage of SDLC — implementation and coding. In this phase, the software design is translated into the source code, the actual development starts.
It’s important that every developer sticks to the agreed blueprint. Also, make sure you have proper guidelines in place about the code style and practices. This step is often the longest in the entire life cycle and that is because developers must ensure that the code is correct before they make it live.
This is also why it is not a surprise for developers to return multiple times to this phase if the tests find any issues.
this is the stage for testing defects and deficiencies. We fix those issues until the product meets the original specifications. Software can’t function properly if its code is broken. To ensure that is the case, the software development company must test the code several times if needed.
Only when developers are sure the code is error-free, can they show it to the user. Throughout this stage, the source code will go through a number of tests, including functional and non-functional ones, such as system, integration, unit, acceptance, etc.
If a test reveals an error, bug, or any other issue, that needs to be fixed then and there before moving to the next stage. In short, we want to check if the code meets the expected requirements.
So, the product is tested and it is bug-free. That means the software development company can finally show it to the user. This still doesn’t mean the software is ready for release. Instead, it first has to go through UAT (User Acceptance Testing) to see if it matches the user expectations.
Then, if it does and the customer gives the green light, the software leaves the beta testing phase and can go live.
Maintaining and Managing The Software
“Let’s get this closer to what we want.”
Once the software goes live, there is still a lot of work in the development life cycle. Some problems might only rear their ugly head only when the software is put through the rigors of actual use.
That’s why, in this stage, the software development company must maintain constant communication with the user through customer support channels, either via phone, email or chatbot, for example.
In addition, because the software has now left the safe testing and development zone and has gone live, it will automatically become a potential target for different malicious cyber-attackers. To prevent hackers from exploiting any vulnerabilities, you also need to take a close look at cyber-security. Cyber-security should be always in your focus as attacks of this kind increase every year.
Programming… Where counting starts from 0 not 1. If you are not in programming and you will be pointing this a mistake made by a programmer then be ready to see a sarcastic angry young man look of a programmer throwing a paper or stone at yourself. Programming is one of the funniest (We have already given example), hardest (If you don’t enjoy coding) and easiest (If you love to play with code) thing to do in the world. A semicolon, a bracket, a loop and a lot of small and big things matter a lot in coding and you might have definitely experienced your silly mistakes especially in the initial phase-in programming. Mistakes are part of coding and every programmer makes tonnes of mistakes especially as a beginner but that’s how they grow and become a good developer. We are going to discuss 6 common mistakes that programmers make during the initial phase of coding but these are not limited. It’s good to be aware of these mistakes and not to do the same while learning to code…
Mistakes to avoid
1. Learning Too Many Programming Languages, Frameworks, and Technology
This is one of the common mistakes that most of beginners make when they start learning to code. They think that it’s impressive to have C, C#, java , c++ , Python, and a lot of more language, frameworks or technology to showcase to someone or to mention in the resume but that’s actually foolishness not the sign of intelligence if you don’t have command or in-depth knowledge in any one of them. Learning Java for 15 days and switching to Python just because java is tough or there is another reason then you will eventually end up with lots of confusion. It’s good to have knowledge of multiple languages but we highly recommend you to focus on a single language, in the beginning. Once you are experienced you won’t face difficulty in switching to another language. If you do this mistake then after a couple of years you will realize you aren’t master in any single language.
2. Self doubt, fear
It’s human nature to have fear and doubt of doing something but, doubt and fear never let you become the person you want really to be, being a programmer require much effort and you have to overcome fear and you have to trust your self that you can do it. You see a talented programmer who is good at solving the problems and making things work too fast, you start doubting and questioning your capability which is not good. Some people are good at picking up the concept very easily and some people take time but slow learning is completely superb if you take interest in coding. Programming might be scary for you sometimes and beginners go through the phase when a voice in the head always say ‘I am not smart enough to solve the problem‘, programming is for genius by that time you are having negative mind then doubt will make you week to even start or continue your journey of coding you will feel that you are not capable enough for coding. When you have self-doubt on yourself always remember that you need to face it with courage and you need to be fearless. Programming is the field of taking the challenge and helping others by solving their problems but before that do yourself a favor and help yourself first. There is a lot of videos on YouTube which can help you to overcome the fear and to be trustful. click here to watch;
3. Writing Code Without Plan
A lot of beginners in excitement skip the thinking, research, and planning stages of a project and start writing code right away. They do not understand the problem requirements, limitations and do not think about all the case scenarios (what’s the input and what should be the output etc). It can create a big issue and later you may regret it. We highly recommend every beginner to start step by step before writing code, for get getting a good output on the end. Beginner should also think and research before you start writing code. In programming, developers spend only 10% of the time writing code. Rest of the time they think, plan, research and discuss the complete project. A beginner should go with the flow in a sequence of Think, Research, Plan, Write, Validate and Modify so they should follow some basic things before writing the code to avoid any issue or disaster at the production level.
Understand the problem (Requirements analysis and specification)
Design the program and make a rough working draft.
Coding and unit testing
Think and note down all the corner cases for testing.
Break the problems into solvable pieces.
4. Not Using Proper Debugging Tool or IDE
Debugging is an essential part of programming. Debugging can be done manually or using a tool. The tool provides vital information regarding the errors or bugs that make the program not usable.
Using debugging tools or Integrated Development Environment(IDE) can improve the way you write and debug code, improving productivity and satisfaction.
5. Thinking you are already a master
It’s really an exciting and amazing feeling for beginners when they start writing small program and they found that their code starts running without any bug. After all they put so much effort into learning to code and finally they have successfully written a program that actually works. You enjoy coding, your confidence grows and maybe you also start teaching stuff to others. It’s actually pleasurable feeling that you have learned a lot of stuff but what if we say to explore some more complex projects or just take a look at your own code you have written a couple of months back. You will understand that it still needs some modification and your code can be refactored as well. This happens with the experienced programmer as well. Always remember programming is a marathon where there is no end line. Every day new technology, frameworks and a lot of things are coming out in the world, so there is no end of learning the coding stuff. Keep your feet on the ground, explore more complex stuff in programming and keep learning. If you will hang out with some great experienced programmer you will find they don’t carry ‘I know everything attitude’ with themselves, they keep learning and they keep exploring the things even after spending years in programming.
6. Commenting and OverCommenting — Where is the Comment?
A coin has two sides, and this is true for many ideas and concepts or behavior we come across through our daily life.
Commenting your code is necessary and highly rewarding if done right. And, there are two types of people who treat their code rightly. The number one are those who do not comment at all. The other type, do comment but overdo it by a large margin.
Both approaches complement each other. Commenting your code makes it easier to understand and sends the message in natural language to the reader. On the other hand, too much information can make the situation ugly and unnecessarily complicated.
Slight use of humor in comments can work, but unnecessary writing an essay in comments is not at all recommended(unless needed).
For example, Variable += 1 // increment Variable by 1, is unnecessary and unsettling for others.
Programming is one of the rewarding trade out there. It can be frustration on many occasions, but many of us know the rewards and satisfaction it yields after successful execution. Today, I went through the 6 mistakes beginners programmers makes.
The list is in no way complete, and the readers are encouraged to share their own experience. Beginners experience the world of programming differently and it is always best to make mistakes as fast as you can. Understanding that you are making mistakes fast can improve you in less time and make you a better programmer in a long run.
The idea of this post came into my mind when my friend asked me on how he can avoid making common mistakes. It’s very easy for beginners to fall into the trap of thinking that they are moving in the right direction and can lose precious time practicing odd habits and code writing habits.
So do you want to learn to code? Python is a best choice you have done, One of the most common languages to start with is Python , popular for its unique blend of object-oriented structure and simple syntax. Python is also an interpreted language, with python you don’t need to learn how to compile code into machine language: Python does that for you, allowing you to test your programs sometimes instantly and, in a way, while you write your code.
Just because Python is easy to learn doesn’t mean you should underestimate its potential power. Click here if you want to know why you should learn python in 2020
You can install and try Python on nearly any computing platform, so if you’re on Windows, this article is for you.
Python is available from its website, before to download python be sure you know your windows if it’s 64 bits or 32 bits then go to , Python.org . Once there, hover your mouse over Downloads menu, then hover your mouse over Windows option, and then click the button to download the latest release. NB: if you are going to use Python for scripting in some API-enabled piece of software. Scribus requires at least Python 2.7
choose for your operating system 64 bits or 32 bit. as mentioned up.
Once the package is downloaded, double click on it to start the installation.
It is safe to accept the default install location. Nb: you must add python in the path in another to be founded in terminal of your computer.
During installation this is not selected by default, so select it at the bottom of the install window before continuing! click on customize installation.
Check if all features are selected After checking the checkboxes for Launcher and System Path. you can see that i selected for all users.
Click the Next Button to choose Advanced Options. last click on install
Windows must ask you if you want do some changes as the user of the pc. Before Windows allows you to install an application from a publisher other than Microsoft, you must give your approval. NB: it’s a User Account Control system. Now Click Yes button to continue the installation.
It will show the success screen after completing the installation
Now click the Close Button to close the installer. This completes the installation step to install Python.
In this step, we will verify the installation of Python. Search for Python on system. on task bar on the search field type python widows will search if python exist . then if it exist congratulation you have done it. open a python terminal.
Now execute the Python command-line option as highlighted
We can verify the version of python on Windows Command Prompt. press (windows + R). type cmd then enter, Windows Command Prompt will open. then type (python –version)
Using a python IDE or Install an desired IDE
To write programs in Python, you have to use a text editor, good news python is coming with an appropriate IDE no need to stress looking an other, but if you are familiar with an other text Editor like sublime text ,Atom … you are free to use it. An IDE integrates a text editor with some friendly and helpful Python features. IDLE 3 and Pycharm (Community Edition) are two great open source options to consider. NB: it’s recommended for beginner to use a python IDLE to be familiar with it.
As you can see, it’s easy to get started with Python, and as long as you’re patient with yourself, you may find yourself understanding and writing Python code with the same fluidity as you write your native language. Congratulation you made it