Xiaomi-backed Black Shark Launches Gaming Smartphone

Xiaomi-backed Black Shark launches gaming smartphone

Xiaomi’s Black Shark gaming smartphone sports Snapdragon 845, liquid cooling

The xiaomi-backed gaming company, Black Shark Technologies, finally unveiled its first ever gaming smartphone dubbed “Black Shark” in China on Friday after several leaks and teasers.

The new gaming-centric smartphone comes with rounded corners along with matte-finished curved panels on the rear side that allows a comfortable grip. It features a 5.99-inch IPS FHD+ LCD (1080 x 2160 pixels) display with an 18:9 aspect ratio. The handset is powered by Qualcomm Snapdragon 845 processor coupled with 6GB RAM/64GB of internal storage and 8GB RAM/128GB of inbuilt storage variants. It sports a 4,000mAh battery support for 18W 9V/2A fast charging. The battery can last up to 7 hours of steady hardcore gaming. The smartphone measures 161.62 x 75.4 x 9.25 mm and weighs 190 grams.

The smartphone will also have a multi-stage direct-touch integrated liquid cooling system to prevent the handset from overheating. It also supports DCI-P3 color gamut that covers up to 97 percent with brightness up to 550 nits. The device also has MEMC intelligent motion compensation technology that ensures vibrant color reproduction and smoother video quality while playing games.

Xiaomi-backed Black Shark Launches Gaming Smartphone

The Black Shark runs Android 8.0 Oreo Out-of-the-box with a skinned Joy UI layered on top. The device has a dual-rear camera setup with a 20MP sensor and a 12MP sensor, both with f/1.75 aperture and LED flash. Further, it has a front camera with 20MP sensor with f/2.2 aperture and is capable of taking 4K videos. On the connectivity front, it includes 4G LTE, Bluetooth 4.0, GPS, AGPS, and Glonass. It also has sensors onboard that are Gyroscope, Proximity Sensor, Ambient Light Sensor, and Geomagnetic, Gravity Sensor.

The device has a dedicated Shark Key to access a dedicated gaming mode. The fingerprint scanner and home button at the bottom of the screen can also be turned off during gaming. The company is also flaunting the presence of an X-type antenna, that will ensure connectivity irrespective the smartphone is held in landscape or portrait mode.

The handset comes with a Bluetooth controller called the Shark GamePad, which is sold separately for 179 Yuan. The Gamepad comes with its own 340mAh battery and can last 30 hours without charge. It docks on the top of the phone to transform the smartphone into a full-fledged handheld gaming device. It supports Bluetooth 4.0 and Android 4.4 and above.

Xiaomi-backed Black Shark Launches Gaming Smartphone

The Black Shark smartphone will ship in two color model, Polar Night and Sky Grey. It is now available for pre-order in China through Xiaomi Mall, Jingdong, and Mi Japan and will go on sale starting April 20. The Xiaomi Black Shark handset’s price starts at 2,999 Yuan for 6GB RAM + 64GB storage model and 3,499 Yuan for 8GB RAM + 128GB storage editions. Currently, the smartphone is available in China and there is no information on whether it will be released globally.

Source: t2online

read more

Crowd Fund Your Next Mortgage on the Blockchain

For most of the past decade, home ownership and mortgage banking have had a souring effect on most people. Ignorance and maleficence on a colossal scale helped created one of the most inflated housing markets in history. When the housing bubble burst in 2008, it thrust the entire world economy into a recession that would require most of a decade to recover from.

This week, a startling chart and pictograph by The New York Times gave credence to the desperate scope of the problem.

Although the economy is roaring once again, the housing market continues to struggle. New home construction is at its lowest level in decades, and first-time home buyers are finding it exceedingly difficult to attain affordable housing in the tight market. The Wall Street Journal is calling it “the next housing crisis,” and it’s undoubtedly garnering a lot of attention from pundits, politicians, and ordinary people.

All of this negative coverage has overshadowed another problem in the mortgage industry: its ridiculously outdated and inefficient processes and technology. Although we are living in the center of the digital age, mortgage companies remain a paper-based initiative that requires considerable effort from the borrower and the lender. What’s more, the currency lending industry involves an abundance of third-parties that complicate the process, and they add to the already costly expenses of purchasing a home.

Housing is critical for human flourishing. It’s one of the first needs that people possess, and it’s a constant preoccupation for many people. Not only is a thriving mortgage industry essential for homeowners, but it has implications for the entire economy as well.

For the mortgage industry to truly thrive, it should be employing the latest technology to make it the most productive, efficient, cost-effective, and secure process possible. The newest technology, the blockchain, is allowing new platforms to create innovative solutions for our most pressing problems.

Introducing Homelend: A Blockchain Solution for the Mortgage Industry

Homelend is a blockchain-based, peer-to-peer mortgage lending platform that harnesses the power and potential of the blockchain to create a transformative and disruptive platform for the lending industry. The company is the brainchild of Itai Cohen and Netanel Bitan who respectively serve as the company’s CEO and CTO.

The platform is hosted on the Ethereum blockchain, and it offers several technical advantages over the current, stagnant mortgage system. Much of the mortgage process involves the transfer and verification of information. The blockchain is especially adept at handling these tasks, and Homelend puts it to work on the housing market. By tokenizing information and utilizing smart contracts, the lending processes can be quicker, easier, and more transparent. This is good news for an industry shrouded in complication and secrecy.

The current housing market is making it increasingly difficult for millennials to find affordable housing options or to obtain the loans necessary to purchase their first home. According to a 2017 report by USA Today, millennials are hindered by the extremely high cost of living in the urban areas that they populate and by their inability to procure a down payment for their first home. In other words, it’s a systemic problem that requires more than a Band-Aid solution. It needs an entirely different process.

Homelend represents an alternative and efficient method for attaining financing. Using the blockchain, the platform allows borrowers to crowdfund their mortgage, and it will enable investors to efficiently judge and manage the risk of supporting these endeavors. It opens up an entirely untapped mortgage ecosystem that can help unclog the tap that is currently running dry.

This can benefit both borrowers and lenders as it broadens the spectrum of possible lenders. Using predictive technology, Homelend provides tools for lenders to make a sometimes-volatile industry significantly less volatile. When combined with the platform’s improvements to speed and efficiency, it presents an entirely new look at the antiquated mortgage industry.

The housing industry is a critical component of the economy. It doesn’t just drive the job market and the stock market. It is the method by which people attain one of their most basic needs. As everyone struggles to adjust to a post-recession housing market, new technologies are producing new opportunities for lenders, borrowers, and everyone in between. The blockchain may have been popularized by its role powering the most successful cryptocurrency, Bitcoin, but its reputation is being garnered as platforms like Homelend use its technology to bring fresh solutions to aging problems. Their decentralized mortgage network is a serious step toward a genuinely flourishing housing market.

read more

Reliance Jio may launch Laptops with 4G Sim Card

jioo 4g laptop

Reliance Jio 4G laptops reportedly in the works

Reliance Jio, the company led by Mukesh Ambani, is looking to foray into the laptop market by launching 4G laptops running on Windows 10. Their 4G feature phone called ‘JioPhone’ has already created a buzz in the Indian mobile phone market.

According to a report from Economic Times, Reliance Jio is in talks with the U.S. based chipmaker Qualcomm to launch laptops running Windows 10 with built-in cellular connections (Jio 4G) for the Indian market. Qualcomm is already in talks with Jio and Reliance Retail to bring out a 4G feature phone.

Miguel Nunes, senior director, product management, Qualcomm Technologies told Economic Times, “…we have talked to Jio. They could take the device and bundle it with data and content.”

Considering that Qualcomm powered laptops are yet to hit global markets, it may take a while before Jio launches their own 4G laptop with a SIM slot in the market.

read more

Cortana will soon read out your Android text messages


Cortana for Android beta can now read messages aloud

Just less than a month ago, Microsoft had updated the Cortana app for Android that brought the ability to send text messages using the user’s voice. Now, Microsoft is rolling out a beta program for Cortana app on Android that can read incoming messages aloud.

Beta program testers will now find a toggle in the Settings menu titled as “Read incoming messages aloud.” Cortana by default will read messages loudly only when it is connected to a Bluetooth device when switched on. However, there are also alternatives to have the assistant always read messages aloud, or only when connected to a wired headset.

This feature will make it easier for the users’ to use their phone hands-free especially in situations such as cooking or where one is driving a car while connected to a Bluetooth handset. In such a scenario, the app can read out messages to the user who can then respond via return message using only their voice.

Cortana already allows Android users to interact with texts from their PCs. It is also capable of reading out SMS messages on Windows phones.

Since the SMS feature is already in beta stage, we can expect it to roll out on the release version of the app in the coming months. However, those who are Cortana beta testers on Android and do not wish to wait for the official release can check out the new feature with the app’s latest update. If you are not a Cortana beta tester, you can go to Cortana’s beta page to sign up and become a tester.

read more

Facebook is offering $40,000 bounty for reporting data abuse

Facebook data abuse bounty

Facebook launches ‘bug bounty’ program offering up to $40,000 for reporting misuse of data

In the wake of the Cambridge Analytica row that has left the popular social media giant, Facebook red-faced, the company has stepped up its efforts to tighten data protection and show that its values the privacy of data. Facebook on Tuesday announced a bounty program that would reward people for reporting data abuse by app developers on its platforms so that it can avoid Cambridge Analytica like the situation in the future.

The “Data Abuse Bounty” program, which is the first of its kind in the industry, has payouts starting at $500 and going up to $40,000 for big discoveries, although the company noted that there’s no maximum amount for the payouts.

“We committed to launching this program a few weeks ago as part of our efforts to more quickly uncover potential abuse of people’s information. The Data Abuse Bounty, inspired by the existing bug bounty program that we use to uncover and address security issues, will help us identify violations of our policies,” Collin Greene, Head of Product Security, wrote in a blog post, late on Tuesday.

“This program will reward people with first-hand knowledge and proof of cases where a Facebook platform app collects and transfers people’s data to another party to be sold, stolen or used for scams or political influence. Just like the bug bounty program, we will reward based on the impact of each report. While there is no maximum, high impact bug reports have garnered as much as $40,000 for people who bring them to our attention.”

Greene further added, “We’ll review all legitimate reports and respond as quickly as possible when we identify a credible threat to people’s information. If we confirm data abuse, we will shut down the offending app and take legal action against the company selling or buying the data, if necessary. We’ll pay the person who reported the issue, and we’ll also alert those we believe to be affected.”

The “Data Abuse Bounty” is motivated by the current bug bounty program that the company uses to discover and address security flaws. This would help Facebook detect violations of its policies. Facebook pays out over $1 million on average a year in bug bounties, executives said.

“It will help us find the cases of data abuse not tied to a security vulnerability. … This will cover both hemispheres, and help surface more cases like Cambridge Analytica so we can know about it first and take action,” Facebook’s chief security officer, Alex Stamos told CNBC.

Currently, the company’s “bug bounty team” has about 10 employees, but plans to hire more people and involve other teams in order to investigate validated claims.

To be eligible, the case must involve at least 10,000 Facebook users. The bounty hunter should show how data was abused and not just collected. Further, it should be a case that Facebook is not already aware of or is actively investigating. Scenarios such as data scraping, malware or mass-scale tricking of users to install apps, social engineering projects and non-Facebook cases (ex: Instagram) are not eligible.

“A door is always open if a whistleblower wants to say there’s something sketchy here,” Greene told CNBC.

read more

How to verify if your Facebook data was used by Cambridge Analytica

facebook ad free

Want to check if Cambridge Analytica used your Facebook data, here’s how

Facebook on Monday started sending a notification to users whose accounts were compromised due to the Cambridge Analytica scandal.

For those unaware, Christopher Wylie, a Cambridge University researcher, had recently revealed that data analysis firm, Cambridge Analytica and Facebook were involved in a privacy scandal wherein the former illegally lifted data of millions of Facebook users’ without their knowledge and consent and used it to influence voter trends in several countries. Facebook allowed thousands of app developers to harvest data through third-party online games and quizzes and then used it to target American voters with emotionally specific messaging. Facebook believes that as many as 87 million users’ personal data have been collected without their permission.

Those who are affected by the scandal will receive a warning for using the Cambridge Analytica app, which means they are also likely to be responsible for their friends and acquaintances data being handed over to the firm, as they are a victim by proxy.

For those, who are unaffected by the event, will receive a more general message for checking apps and websites that have access to their Facebook data.

While as promised by Facebook’s CEO Mark Zuckerberg last week, the notifications that appear at the top of News Feed of the user have started rolling out, but it appears to be slow.

In the meanwhile, you can manually check the information by visiting Facebook’s support page titled “How can I tell if my info was shared with Cambridge Analytica?” which will provide a more immediate response.

A box labeled “Was my information shared?” on that page will display the results for the currently logged-in user. The contents of the box will change depending on if the user accessed the banned site, if their friends logged in, or if their data is safe.

If your data wasn’t compromised, you will see a message that reads: “Based on our available records, neither you nor your friends logged into “This Is Your Digital Life.” As a result, it doesn’t appear your Facebook information was shared with Cambridge Analytica by “This Is Your Digital Life.””

If your data was harvested, you will see a message that reads: “A friend of yours did log in.” In this case, it is likely that your public profile, in addition to your page “likes,” your birthday, current city and probably also your News Feed were “likely shared with ‘This Is Your Digital Life.” Of an estimated 87 million worldwide, about one million people in the UK will see the second message.

In the event, you were the one to install the app ‘This Is Your Digital Life’, you will receive a message that reads: “If you see this message, you were probably responsible for your and your friends’ data being handed over to Cambridge Analytica. If you used the app, this result also means your psychometric test results may have helped inform Cambridge Analytica’s strategy during the U.S. Election Campaign.”

On Tuesday afternoon, Zuckerberg testified before a joint session of the Senate Judiciary and Commerce committees, addressing public concern over online privacy issues and his company’s role.

He also said that his company is working with other governments to ensure that they are not exploiting the data collected from Facebook. Lastly, the company plans to provide clarity to users which apps they use will have access to their data.

“It’s clear now that we didn’t do enough to prevent these tools from being used for harm as well. That goes for fake news, foreign interference in elections and hate speech, as well as developers and data privacy,” Zuckerberg said. “We didn’t take a broad enough view of our responsibility, and that was a big mistake. It was my mistake, and I’m sorry. I started Facebook, I run it, and I’m responsible for what happens here.”

Source: Chicago Tribune

read more

DAOStack: Building A Framework For Decentralized Organizational Structures

DAOStack: Building A Framework For Decentralized Organizational Structures

The term DAO, or decentralized autonomous organization, is relatively new. When mentioned in the company of blockchain enthusiasts, however, it tends to invoke excited speculation about whether DAOs will render the traditional hierarchal organizational model obsolete through the means of smart contracts. Such a revolution would negate the need for managerial decision-making, thereby consigning the concept of the C-Suite to a similar fate as the horse and cart.

While the development of blockchain technology has certainly brought such possibilities closer to fruition, attempts to develop DAOs to the point of overtaking traditional organizational structures have been problematic thus far. However, one company – DAOstack – is developing innovative solutions to these problems, implementing what it says will be the “Wordpress for DAOs”.

Before elaborating on the problems of DAOs and the solutions presented by DAOstack, it is worth considering a more prosaic question. What is the problem with traditional corporate structures, that the implementation of a DAO could solve?

Any company operating in today’s competitive market seeks growth in order to deliver greater value to its stakeholders. While growth can ensure a competitive edge, it also comes with the challenge of balancing the interests of an ever-increasing stakeholder population.

The advent of the Internet enabled huge developments in connectivity, which in turn enabled the exchange of information and data in real-time. Rapid corporate globalization thus became a reality. Even with these technological developments, however, large organizations with huge stakeholder groups have continued to struggle with the balance of agile decision-making against the need for speedy growth.

Blockchains, Smart Contracts, and DAOs

With the advent of blockchain technology, distributed public ledgers are now being accepted as a global means of establishing trust and consensus. The Ethereum blockchain expanded the distributed ledger functionality that was introduced by Bitcoin to include a code execution machinery.

This machinery enables the development of decentralized applications – known as apps – alongside the algorithmic enforcement of agreements – known as smart contracts. In its essence, a DAO constitutes a self-governing set of smart contracts.

In developing a DAO, rules surrounding decision-making are agreed upon by invested parties, in alignment with the goals of the organization. Once agreed upon, these rules are coded into smart contracts whereby theyhave enforcedd autonomously via algorithms. Decisions and outcomes are automatically executed and recorded immutably on the blockchain.

While this might seem like a perfect solution in theory, even DAOs that are currently in operation face similar scalability issues as traditional organizations. There is no decentralized governance system that allows a large number of parties to make fast decisions that affect the organization.

DAOstack: A Framework for Decentralized Blockchain Governance

DAOstack aims to tackle the issue of decision-making governance within the DAO via an infrastructure that will enable the usability and scalability of Ethereum and its  Apps, in a similar way that transport infrastructure enabled the widespread adoption of cars.

The company is dedicated to developing an open, modular and upgradeable platform and operational stack for deploying DAOs. The current phase of development is focused on work and collaboration such that, at its launch, DAOstack will facilitate the initiation of new DAO ventures with customized governance systems for the distribution of tokens and reputation weighting. This will enable large-scale decentralized decision-making for such things as the allocation of funds or the harvesting of collective intelligence, to name just a few.

Scalability versus Resilience

DAOStack overcomes the scalability problem by using an approach called Holographic Consensus. This approach subdivides an organization into smaller groups in order to achieve an internal majority.

Consider an organization of 9 parties (or “agencies”, as they are referred to in DAOstack). In a straightforward majority voting system, 5 votes constitute a majority. If that same organization is broken down into 3 groups of 3 agencies, then a decision can be reached by only 4 votes (2 out of 3 agencies, in two of the groups). Decisions by groups can only be made in line with delegation protocols agreed upon by the entire group.

To ensure resilience, the DAOstack utility token is used as an incentive. Users stake tokens on the outcome of a proposal so as to boost its position for receiving collective attention for a decision. At the same time, this regulates the rate at which proposals are submitted to the collective for its attention; only once enough tokens are staked on a proposal does it move forward for a decision.

At its core, DAOstack consists of a collection of smart contracts that make up the standard building blocks for decentralized governance. While one of the attractions of blockchain is immutability, this has also proved to be a constraint when the need for protocol changes arises. DAOstack will maintain flexibility in the face of changing conditions while preserving the alignments of interest and trust among engaged parties. In doing so, the possibility of large scale systemic failure is locally contained and thus prevented from spreading, while the decentralized nature of the blockchain and resistance to the law of plutocracy are preserved.

Wider applications

DAOstack is not just targeting startup DAOs or dApp companies. Matan Field, the brains behind DAOstack, believes that it can also be applied to existing multi-nationals such as Coca-Cola in order to build better decision-making systems.

The company will also lay the foundation for an exponentially scalable ecosystem of wider blockchain governance, as DAOstack plans to use the same technology for governing its own platform.

read more

‘Despacito’ YouTube video has been hacked and deleted


‘Despacito’ music video deleted from YouTube; Adele, Taylor Swift, Drake and Shakira’s accounts taken over

In what seems to be a hacker attack, the music video of the hit song ‘Despacito’, which had more than five billion views on YouTube has been removed.

The original clips had been posted by Vevo, a music video hosting service that is a collaboration between the “big three” record companies, Universal Music Group (UMG), Sony Music Entertainment (SME) and Warner Music Group (WMG). Other Vevo channels of artists like Shakira, Selena Gomez, Adele Chris Brown, Maroon 5, Drake and Taylor Swift, were also inaccessible.

For those unaware, the Spanish-language hit “Despacito” released in January 2017, and went on to break several records in music streaming, including one for the single with the most weeks at No.1 in the U.S., with 16 consecutive weeks. It also became the most-streamed song in the world after reaching 4.6bn plays.

Meanwhile, the Despacito video has been removed, but its cover image shows pictures of five animated and masked people pointing guns at the camera. The hackers, who call themselves Prosox and Kuroi’sh, used the online moniker of Kuroi’SH and had written “Free Palestine” below the videos.

The BBC reports that a Twitter account probably belonging to one of the hackers posted: “It’s just for fun, I just use [the] script ‘youtube-change-title-video’ and I write ‘hacked’.”

“Don’t judge me I love YouTube,” it added.

Both YouTube and Vevo have been contacted to comment on the issue.

Source: BBC

read more

Microsoft Open Sources the Original File Manager of the 90’s

microsoft open source

Microsoft open sources Windows 3.0 File Manager code in GitHub

It’s time for folks from the 1990s to get nostalgic, as Microsoft has open sourced the Windows 3.0 File Manager released 28 years ago. This file manager was a replacement for managing files through MS-DOS, which allowed Windows users to copy, move, delete, and search for files.

Veteran Microsoft developer Craig Wittenberg, who had copied the code in 2007 from Windows NT 4, has been maintaining it privately under the MIT license before open sourcing it recently. The source code Microsoft has released can be compiled and even run on Windows 10.

Here’s a portion of the project’s file:

The Windows File Manager lives again and runs on all currently supported version of Windows, including Windows 10. I welcome your thoughts, comments and suggestions.

  1. There are two primary versions of the source code in the master branch:

original_plus tag: refers to the source for WinFile as of Windows NT4 with minimal changes so that it compiles with Visual Studio and runs on current Windows.

  1. current master: contains my personal changes / additions to WinFile.

File Manager actually uses an MDI, or multiple-document interface, to display multiple folders within the main application window. “Most of the MSFT open source stuff is either trash or completely unmaintained,” one Hacker News reader noted following the release. “Only a couple of high profile projects are maintained and they jam opt-out telemetry in if you like it or not (despite hundreds of comments requesting them to go away). Even Scott Hanselman getting involved in one of our tickets got it nowhere. Same strong arming and disregard for customers.”

For those who are interested in reliving the 1990s, can just go to the GitHub page here to download the Windows File Manager for Windows 10.

Source: The Verge

read more

Top 5 Most Useful Kali Linux Tools For Ethical Hackers

Top Kali Linux Tools

Best 5 Kali Linux tools for ethical hackers and security researchers

Kali Linux is one of the most loved distros by the ethical hacking and security community because of its pen-testing and exploit tools. It is a free, and open-source Linux-based operating system designed for digital forensics, penetration testing, reversing, and security auditing. Kali allows you to download a range of security-related programs such as Metasploit, Nmap, Armitage, Burp, and much more that can be used to test your network for security loops. It can run natively when installing on a computer’s hard disk, can be booted from a live CD or live USB, or it can run on a virtual machine. Kali Linux has a lot of tools available to learn and practice.

In this article, we bring to you the top 5 Kali Linux tools that a wannabe (ethical) hacker or security researcher can use.

1. Nmap (Network Mapper)


Abbreviated as Nmap, the Network Mapper is a versatile must-have tool for Network Security, plus it is a free and open source. It is largely used by security researchers and network administrators for network discovery and security auditing. System admins use Nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host (A term used for “the computer on a network”) or service uptime.

The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer, which type of protocols are being used for providing the services, what operating system (and OS versions and possible patches) and what type and version of packet filters/firewalls are being used by the target.

2. Metasploit Framework


This tool is used for exploiting (utilizing network weakness for making a “backdoor”) vulnerabilities (weak points) on Network. This tool comes in both free and paid versions and not open source. The free version is good for normal exploits but deep penetration requires the paid version which gives you a full set of features. The paid version of Metasploit offers such important features that it deserves the price it claims.

The Metasploit Project is a hugely popular pen-testing (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Wireshark


Some Kali Linux users may rate Wireshark as the top Wi-Fi pen-testing tool though it surprisingly missed making it to last year’s list. Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.Wireshark is one of the best network [protocol]analyzer tools available, if not the best.

With Wireshark, you can analyze a network to the greatest detail to see what’s happening. Wireshark can be used for live packet capturing, deep inspection of hundreds of protocols, browse and filter packets and is multi-platform.

4. Aircrack-ng


The Aircrack suite of Wi-Fi (Wireless) hacking tools are legendary because they are very effective when used in the right hands. This tool also makes it to Concise top 10 for the first time. For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode).

For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend. It’s useful to know that Aircrack-ng implements standard FMS attacks along with some optimizations like KoreK attacks, as well as the PTW attacks to make their attacks more potent. If you are a mediocre hacker then you’ll be able to crack WEP in a few minutes and you ought to be pretty proficient at being able to crack WPA/WPA2.

5.THC Hydra


Concise polls place THC Hydra one place under ‘John The Ripper’ because of user popularity though it is as popular as John The Ripper. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use a dictionary or brute-force attacks to try various password and login combinations on the login page.

This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP (Lightweight Directory Access Protocol), SMB, VNC, and SSH (Secure Shell used by VPN software).

Source: Technotification

read more