Wednesday, November 26, 2014

Terrorist grow the name of religion but if we grow humanity religion than automatically Terrorism leave human heart



world's 10 popular computer language

1. Java 
Java uses a compiler, and is an object-oriented language released in 1995 by Sun Microsystems. Java is the number one programming language today for many reasons. First, it is a well-organized language with a strong library of reusable software components. Second, programs written in Java can run on many different computer architectures and operating systems because of the use of the JVM ( Java virtual machine ). Sometimes this is referred to as code portability or even WORA ( write once, run anywhere ). Third, Java is the language most likely to be taught in university computer science classes. A lot of computer science theory books written in the past decade use Java in the code examples. So learning Java syntax is a good idea even if you never actually code in it. 
Java Strengths: WORA, popularity
Java Weaknesses: Slower than natively compiled languages
2. C
C is a compiled, procedural language developed in 1972 by Dennis Ritchie for use in the UNIX operating system. Although designed to be portable in nature, C programs must be specifically compiled for computers with different architectures and operating systems. This helps make them lightning fast. Although C is a relatively old language, it is still widely used for system programming, writing other programming languages, and in embedded systems. 
Strengths: Speed
Weaknesses: Memory management can be difficult to master
3. C++
C++ is a compiled, multi-paradigm language written as an update to C in 1979 by Bjarne Stroustrup. It attempts to be backwards-compatible with C and brings object-orientation, which helps in larger projects. Despite it's age, C++ is used to create a wide array of applications from games to office suites. 
Strengths: Speed
Weaknesses: C++ is older and considered more clumsy than newer object-oriented languages such as Java or C#.
4. PHP
PHP uses a run-time interpreter, and is a multi-paradigm language originally developed in 1996 by Rasmus Lerdorfto create dynamic web pages. At first it was not even a real programming language, but over time it eventually grew into a fully featured object-oriented programming language. Although PHP has been much criticized in the past for being a bit sloppy and insecure, it's been pretty good since version 5 came out in 2004. It's hard to argue with success. Today, PHP is the most popular language used to write web applications. Even English 4 IT, the program you are currently using, is written in PHP ;) 
Strengths: Web programming, good documentation 
Weaknesses: Inconsistent syntax, too many ways to do the same thing, a history of bizarre security decisions
5. VB ( or Visual Basic )
 Visual Basic is an interpreted, multi-paradigm language developed by Microsoft Corporation for the Windows platform. It has been evolving over the years and is seen as a direct descendant of Microsoft's old BASIC from the 1970's. Visual Basic is a good language for scripting Windows applications that do not need the power and speed of C#. 
Strengths: None. 
Weaknesses: Only runs in Windows 
6. Python 
Python is an interpreted, multi-paradigm programming language written by Guido van Rossum in the late 1980's and intended for general programming purposes. Python was not named after the snake but actually after the Monty Python comedy group. Python is characterized by its use of indentation for readability, and its encouragement forelegant code by making developers do similar things in similar ways. Python is used as the main programming choice of both Google and Ubuntu. 
Strengths: Excellent readability and overall philosophy 
Weaknesses: None
7 C# 
C# is a compiled, object-oriented language written by Microsoft. It is an open specification, but rarely seen on any non-Windows platform. C# was conceived as Microsoft's premium language in its .NET Framework. It is very similar to Java in both syntax and nature. 
Strengths: Powerful and pretty fast 
Weaknesses: Only really suitable for Windows
8. JavaScript
JavaScript is an interpreted, multi-paradigm language. A very strange one too. Despite it's name, it has nothing whatsoever to do with Java. You will rarely, if ever, see this language outside of a web browser. It is basically a language meant to script behaviors in web browsers and used for things such as web form validation and AJAX style web applications. The trend in the future seems to be building more and more complex applications in JavaScript, even simple online games and office suites. The success of this trend will depend upon advancements in the speed of a browser's JavaScript interpreter. If you want to be correct, the real name of this programming language is ECMAscript, although almost nobody actually calls it this. 
Strengths: it's the only reliable way to do client-side web programming 
Weaknesses: it's only really useful in a web browser
9. Perl
Perl is an interpreted, multi-paradigm language written by Larry Wall in 1986. It is characterized by a somewhat disorganized and scary-looking syntax which only makes sense to other PERL programmers ;) However, a lot of veteran programmers love it and use if every day as their primary language. 10 years ago, Perl was more popular than it is today. What happened? A lot of newer programmers and even old Perl programmers (such as myself) have switched to other languages such as PHP, Python, and Ruby. Perl is perhaps still the best language for text processing and system administration scripting. I personally do not recommend it however as a primary programming language. 
Strengths: text processing and system administration 
Weaknesses: strange syntax, and perhaps too many ways to do the same thing
10. Ruby
Ruby is an interpreted, object-oriented language written by Yukihiro Matsumoto around 1995. It is one of the most object-oriented languages in the world. Everything is an object in Ruby, even letters and numbers can have method calls. It's a great language to learn if you love objects. The only negative is that it's love of object-orientation makes it a bit slow, even for an interpreted language. 
Strengths: Perhaps the world's most object-oriented language 
Weaknesses: its superior object model comes at a price... namely speed
Okay! Those are the top 10 programming languages in use today and some personal comments about them. Remember that opinions are like noses, everyone has one and they all smell ;) If you disagree, please feel free to email me or write your own opinions on the forum.

Tuesday, November 25, 2014

SONY PICTURE COMPUTER SYSTEM HACKED

The tech firm has reportedly shut down its computer network as a precaution and advised employees that resolving the situation could take anywhere from one day to three weeks.Meanwhile, an anonymous user on the Reddit news website posted an image allegedly from a Sony computer screen, which said “Warning: We’ve already warned you, and this is just the beginning… We have obtained all your internal data including secrets and top secrets“.
#GOP has already leaked a large ZIP file containing two massive lists detailing the extent of the doxxing. Most of what’s inside appears to be from the Sony Pictures finance department, including the stuff of IT guy nightmares: Excel sheets and ZIP files that appear to be full of passwords. There’s even a text file that helpfully lists the last 10 recently used passwords for something at Sony.
The entire .zip file of leaked information weighs in at 217 MB. In addition to the breach and data leak, it appears that the attackers had their way with several of the Twitter accounts owned by Sony Pictures. It is unclear as to the motivations of the group that was apparently behind today’s events. Hopefully once the dust settles we’ll learn more about the attack.
In its latest research, the firm said that experts estimate that at least 25% of all companies have already suffered financial loss through some form of cyber attack.

Monday, November 24, 2014

THE BIGGEST COMPUTER HACKS OF ALL TIME

Stuxnet
The US isn’t innocent of cyber attacks. Take the case of Stuxnet, which was discovered in 2010. The malicious software was a Microsoft Windows worm that was specifically designed to infect Siemens industrial controllers – the first ever malware designed to do so. And what did the program target? Iran. More specifically, uranium enrichment facilities in Iran. The worm – which has all but officially been confirmed was created by the United States and Israel – disrupted the operations of Siemens centrifuges in nuclear power plants, making them spin at uneven speeds and hide that from their operators. The scary thing is that this is just the one we know about – there could be dozens of worms like it out there.

Chinese Compromise U.S. Weapons Systems

This is the most recent hack on this list, and it’s a chilling one. A confidential report prepared for the Pentagon and just released indicates that Chinese cyber criminals breached design files for over two dozen critical weapons systems, including critical missile defense programs. Officially, the Obama administration hasn’t laid the blame on China, but the leaders of the two nations will meet this week to discuss cyber security concerns.

Spamhaus DDOS

Most Internet attacks just affect users of one particular site or service. This one, however, almost broke the whole thing.Spamhaus is one of the world’s largest anti-spam services, blocking huge amounts of unsolicited email from all over the world. When Cyberbunker, an Amsterdam-based hosting provider, found their emails blacklisted, they struck back with one of the largest distributed denial of service attacks the Internet has ever seen. The traffic reached an astounding 300 GB per second, causing a ripple effect that lagged connections all over Europe. Cyberbunker leader Sven Kamphuis was arrested in Spain and is waiting to stand trial.

Conficker
One of the largest and most tenacious worms of all time was discovered in 2008 and is still infecting more than a million computers a year as of this writing. Conficker is an incredibly smart piece of software that continually updates itself by making connections to an ever-growing system of websites. Infected systems are linked into a botnet that is estimated to be millions of systems strong, and although the creators have yet to use that combined computing power for anything more nefarious than spreading more copies of the worm, experts say that it could wreak unimaginable havoc on just about any target. Even scarier, tech security professionals still don’t have a clue who is behind it, other than to say that they’re incredibly gifted programmers.

Operation Get Rich
Most of the hackers on this list have perpetrated their crimes for love of country – or hatred of their enemies. But Alberto Gonzalez just wanted to get away with a huge amount of money. Between 2005 and 2007, Gonzalez and his crew used SQL injections to steal a staggering 170 million ATM and credit card numbers from major retailers like TJ Maxx, DSW and Dave & Buster’s. The numbers were then sold at auction, netting Gonzalez a tremendous profit. His ventures were one of the largest sustained identity theft operations of all time, but they ended up getting him 20 years in jail. Attempts to tell the judge that he was working undercover for the Secret Service were laughed out of court.
PlayStation Network Hack
It’s not just computers that are vulnerable to malicious hacks. As more and more of your devices go online, security holes open up. That’s what Sony learned in 2011, when an incursion to their PlayStation Network service resulted in the loss of data from approximately 77 million user accounts, including personally identifiable information. The company was forced to take their entire network down for 20 days while they dealt with the fallout, at a cost of $171 million. It was one of the largest assaults on an entertainment network ever seen.

Comodo Hack
The process of using the Internet seems simple, but in reality your web page goes through a number of stops before it reaches your screen. One of the intermediary steps is the security certificate, a bit of code that confirms that the site you’re looking at is what it claims to be. One company that provides those certificates is Comodo, and in 2011 an Iranian hacker fraudulently accessed their system and generated a number of certificates for major sites like Google and Yahoo – certificates that he could use to make any computer anywhere in the world think that they were on those sites, and allow him to eavesdrop on secure e-mail sent from any of their services. The hacker took responsibility for similar attacks on a number of other certificate registrars the same year.

Melissa Virus
The fastest-spreading virus of its day, Melissa was the cyber attack that really made people start taking electronic warfare seriously. Coded by a bored New Jersey programmer named David L. Smith, the software was deceptively simple – disguised as a Microsoft Word document, it would spread through email, automatically sending itself to the first 50 names in an infected computer’s address book. The document was first uploaded to the alt.sex newsgroup in 1999 and from there it exploded, being sent out so rapidly that it forced infected companies like Microsoft and Intel to shut down outgoing mail until they got it under control.

Department Of Defense Hack
As viewers of 80s classic War Games can tell you, the Department of Defense is the Holy Grail for wanna-be hackers. One of the most secure networks in the world, the U.S. military’s computer system was compromised by a humble teenager in 1999, sending security experts into a tailspin. Florida high school student Jonathan James installed backdoor software into the Defense Threat Reduction Agency, a DoD division, and intercepted numerous classified emails, including life support code for the International Space Station. James was caught in 2000 and sentenced to six months house arrest, as he was still a juvenile. He committed suicide some years later.

Operation Shady RAT
One of the most enticing fruits for a cyber attacker is remote access tools – software that allows computers to be taken over from anywhere in the world. Placing remote access programs on a target computer gives unprecedented access, so it’s no surprise that the Chinese government has allegedly been using them since 2006 in a concerted wave of attacks dubbed Operation Shady RAT. Starting in 2006, an unknown actor targeted over 70 public and private organizations in 14 countries, stealing a vast wealth of intellectual property. Victims included the International Olympic Committee and the World Anti-Doping Agency, which pointed the finger at China in advance of the 2008 Beijing Olympics.

10 best hacker of the world

1: Kevin Mitnick

Kevin Mitnick, once considered the most-wanted cyber criminal in the United States, is often touted as the poster child of computer hacking. Kevin mastered an early form of social engineering (scamming operators) and computer hacking to gain access to and modify telephony switching systems. After a very public two-year chase, arrest ,and incarceration, the hacker community collectively rose in protest against what they viewed as a witch hunt.

2: Robert Tappan Morris

On November 2, 1988, Robert Morris released a worm that brought down one-tenth of the Internet. With the need for social acceptance that seems to infect many young hackers, Morris made the mistake of chatting about his worm for months before he actually released it on the Internet, so it didn't take long for the police to track him down. Morris said it was just a stunt and added that he truly regretted wreaking $15 million worth of damage, the estimated amount of carnage caused by his worm.

3: Vladimir Levin

Seeming like the opening of a James Bond movie, Vladimir Levin was working on his laptop in 1994 from his St. Petersburg, Russia, apartment. He transferred $10 million from Citibank clients to his own accounts around the world. As with most Bond movies, Levin's career as a hacker was short lived -- with a capture, imprisonment, and recovery of all but $400,000 of the original $10 million.

4: Yan Romanowski

Yan Romanowski, also known as MafiaBoy, was arrested in February 2000 for launching a denial-of-service attack that brought down many of the Internet's largest sites, including Amazon, eBay, and Yahoo. Yan's lawyer claimed, "If [MafiaBoy] had used all his powers, he could have done unimaginable damage." It is widely believed that Romanowski is no more than a script kiddie. His attacks, however successful, were implemented using computer scripts that clogged networks full of garbage data.

5: Kevin Poulsen

Kevin Poulsen, known as Dark Dante in the hacker community, specialized in hacking phone systems, particularly radio stations. This talent allowed only calls originating from his house to make it through to the station, assuring him of wins in listener radio contests. His iconic 1991 hack was a takeover of all of the telephone lines for the Los Angeles KIIS-FM radio station, guaranteeing that he would be the 102nd caller and win the prize of a Porsche 944 S2. The bold Poulsen was wanted by the FBI for federal computer hacking at the same time he was winning the Porsche and $20,000 in prize money at a separate station. Poulsen spent 51 months in a federal prison, the longest sentence of a cybercriminal at that time.

6: Steve Jobs and Steve Wozniak

The now-famous founders of Apple Computer spent part of their youth as hackers. They spent their pre-Apple days (circa 1971) building Blue Box devices (an early phreaking tool allowing users to make long distance calls without the financial charges) and selling them to fellow students at the University of California, Berkeley.

7: David Smith

Smith's fame comes from being the author of the infamous email virus known as Melissa. According to Smith, the Melissa virus was never meant to cause harm, but its simple means of propagation (each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world. Smith's virus was unusual in that it was originally hidden in a file containing passwords to 80 well-known pornography Web sites. Even though more than 60,000 email viruses have been discovered, Smith is the only person to go to federal prison in the United States for sending one.

8: Jonathan James

James gained notoriety when he became the first juvenile, at age 16, to be sent to prison for hacking. James specialized in hacking high-profile government systems, such as NASA and the Department of Defense. He was reported to have stolen software worth more than $1.7 million.

9: George Hotz

While George Hotz may be a renowned jailbreak artist, he's best known for being named as the primary reason for the April 2011 PlayStation breach. As one of the first hackers to jailbreak the Sony PlayStation 3, Hotz found himself in the middle of a very mean, public, and messy court battle with Sony -- perhaps because of his public release of his jailbreaking methods. In stated retaliation, the hacker group Anonymous attacked Sony in what has been the most costly security break of all time. Hotz denied any responsibility for the attack and said, "Running homebrew and exploring security on your devices is cool; hacking into someone else's server and stealing databases of user info is not cool."

10: Gary McKinnon

In 2002, a decidedly odd message appeared on a U.S. Army computer: "Your security system is crap," it read. "I am Solo. I will continue to disrupt at the highest levels." It was later found to be the work of Gary McKinnon, a Scottish system administrator. Gary has been accused of mounting the largest ever hack of U.S. government computer networks -- including Army, Air Force, Navy, and NASA systems. The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing $700,000 in damage. Adding even more interest to McKinnon's actions is his insistence that much of his hacking was in search of information on UFOs, information he believed the U.S. government was hiding in its military computers.

Sunday, November 23, 2014

right programming language can give you more money than other programming language

These are the highest paying programming languages you should learn its ranked  by salary. In fact, the average salary for a computer programmer just hit an all-time high as it approaches $100,000. But there are few languages that are more valuable than orders.
Bases on the data, here are programming language listed next to their average annual salary from lowest to highest
12. PERL - $82,513
11. SQL – $85,511
10. Visual Basic – $85,962
9. C# – $89,074
8. R- $90,055
7. C – 90,134
6. JavaScript – $91,461
5. C++ – $93,502
4. JAVA – $94,908
3. Python – $100,717
2. Objective C – $108,225
1. Ruby on Rails – $109,460