Headlines Today's Cyber Security Cryptography Algorithm Games Dev

Lamborghinii URUS idle review


Jonathan Caceres, Nov 15, 08:08



Electric scooter review


Jonathan Caceres, Nov 14, 13:02



Share your page using plugin facebook


Jonathan Caceres, Nov 12, 23:39
Use the link to develop your plugin https://developers.facebook.com/docs/plugins/page-plugin


How to check your Ubuntu version


Jonathan Caceres, Sep 19, 23:32
Use terminal Ctrl + Alt + t type lsb_release -a Enter



How I can make money from home?


Jonathan Caceres, Sep 15, 00:27
We have several option of how we can make money from home with your outstanding post on social media, your blog or your apps. Here are three of the most popular affiliation programs:

Affiliation programs

Company Link (URL) Coments
Apple https://affiliate.itunes.apple.com/resources/documentation/getting-started/ Developed Apple software or products
Google https://support.google.com/adsense/answer/10162?hl=en Develop software Android, Web, eCommerce use
Amazon https://affiliate-program.amazon.com/welcome/getstarted Develop software Web, Apps for eCommerce use only


Puppy Scam Alert


Jonathan Caceres, Aug 20, 06:36


GovHack 2020 Dataset Test


Jonathan Caceres, Aug 13, 16:45


2020 Civil Partnerships by Same Sex and Heterosexual breakdown



Queensland Family and Child Commission disclosure report


The cost of scam


Jonathan Caceres, Aug 12, 07:05

The amount of spam, or unsolicited email, that goes through the Internet continuous to escalate. Google estimates that 9 out of every 10 email messages are spam.

The reason why users receive so many spam messages that advertise drugs, cheap mortgage rates, and items for sales is because sending spam is a lucrative business.

it cost spammers very little to send millions of spam email messages. In the past, spammers would purchase a list of valid email addresses ($100 for million addresses) and rent a hotel room with a high-speed Internet connection ($85 per day) as a base for launching attacks.



Even if the spammers receive only a very small percentage of responses, they still make a large profit. For example, if a spammer sent spam to a 6 million users for a product with a sale price of $50 that cost only $5 to make, and if only 0.001 percent of the recipients responded and bought the product (a typical response rate), the spammer would still make more than $270,000 in profit.


  COST
      $100 for a 1'000.000 emails
      $85 for a hotel room with internet

   PROFIT
      $5 product 
      6'000.000 million users spam
      0.001% percent people get the product
      $270.000 profits



TIK TOK it is a Bom?


Jonathan Caceres, Aug 05, 03:22

TIK TOK

The government has impose new rules over software development houses at the point to be a topic of national security.

Software become one of new gold currency, it is power when software control people communication and life style.

But how a lines of code can turn heads around in the highest circles of politic? This business is so lucrative more than petroleum just is an article needs but software becomes more powerful than that.

Today's software can control not only local but global communications without any regulations or passport. When that happens every government is crumbling they lose their more powerful tool control.

As TV or books like in the XVIII century where motive for kingdoms to put people in jail or in the guillotine for orthodox writers or thinking. Software become the new illegal item, anything the government can not be in control becomes a threat to their principals and objectives.

You can read about human rights and how was the beginning day 1, a book written in France about Human Rights change the thinking of many people in the new world in the Americas, not only USA got the independence, but the south too La Gran Colombia freedom from the Spanish colony and the north from the English colony.

If a book can do that globally in the XVII century, can you imagine what could happen when we have instant messaging, video and photos sharing and so on the new power is now and they know it.

A threat is here and it is imminent can they stop probably not it is widely spread can be controlled may be but they cannot control many illegal and criminal operations so hardly no.



Wrong use of hacker/s terminology for political cyber attacks


Jonathan Caceres, Jul 22, 03:54
"STATE-SPONSORED ATTACKERS"

Today's news, tweet, posts, share, video, tik tok, and TV use the term hacker as bad person who want to destroy, still, spam another country websites.

In my opinion as an IT and human been it is going to be long hours for that kind of job, no money, no results other than upset secret services in a foreign country and your own country.

If you have lost of money lots of time no mention the skills and a good lawyer, well may be some of you hackers want that challenge to achieve the maximum award Trophy.

But I am talking about plenty of hours trying to break in to government websites with low and poor security infrastructure to get access to regular people miserable bills for your city utility services or taxes.

The good websites are over protected and has lots of monitoring system in place so that make harder for a regular guy without money or time or skills to target no one but multiple sites simultaneously websites.

The terminology of "hacker" is been miss used by media for example on this typical news headings: "CHINESE LAUNCH HACKERS ATTACKS TO THE GOVERNMENT DATABASE" "ISRAEL HACKERS ATTACK LEBANON DATING WEBSITES"

It is hard to a hacker without job or income with less than three computers can manage to attack a England, USA, Germany, Russia, or Australia cannot believe it.

One of my best hackers of all time Kevin Mitnick said. "HACKERS AND GAMERS GET IT INSTINCTIVELY. ANYONE WHO LOVES TO PLAY CHESS KNOWS THAT IT IS ENOUGH TO DEFEAT YOUR OPPONENT. Book: Ghost in the wires page 481.

To finish this article the right term for that type of actions cyber attack when a country is trying to hack data or still information from another country is "STATE-SPONSORED ATTACKERS"

These guys are the public servants, they objective is spy on citizen, disrupt foreign government they typical target is users, governments.

So leave the poor hacker with maybe a Pentium processor desktop alone and good skills in COBOL or Network layers 7 spoofing alone he/she is not the guy.



Windows 10 to Slow


Jonathan Caceres, Jun 03, 07:33
Way 1: Restart Your System

Way 2: Update Windows

Way 3: Check For Malware

Way 4: Disable Windows Search

C:\Windows\system32>net.exe stop "Windows search"

Way 5: Stop the Superfetch Service
net.exe stop superfetch.

Way 6: Change Energy Options from Balanced to High Performance

Way 7: Temporarily Turn Off Your Antivirus Software

Way 8: Reset Virtual Memory in Windows 10

Way 9: Run Check Disk

Way 10: Change Settings in Google Chrome and Skype
Settings -> Show advanced settings.
Under Privacy section, uncheck the “Use a prediction service to load pages more quickly” option.
You should also try disabling Flash in Google Chrome.

To update your Skype settings use this procedure:

To start Skype for Windows 10, select the Start menu from the bottom left of your screen. 
In the list of available applications, scroll down to Skype for Windows 10 and click to open it.
Select the Security tab and click on the Edit option.
In the list of “Groups or Usernames” select “ALL APPLICATION PACKAGES”. 
Check the Write option to select Allow which lets Skype write to your disk.
Press OK.


Cyber Security Jobs Booming!


Jonathan Caceres, Jul 05, 04:33


Looking for a job in the Cyber Security field but do not met the requirements.

* REQUIREMENTS:
- be an XX citizen
- undergo a selection process consistent with ongoing employment merit principles
- be willing and able to relocate to XX if required; and
- have an ability to obtain and hold a high level national security clearance


* Well do not be disappointed always is the backdoor open for you.

[ H1 Hackerone ] Bug hunter
url:https://www.hackerone.com/

[ Kevin Mitnik ] Cyber security
url:https://www.mitnicksecurity.com/about-kevin-mitnick-mitnick-security

Why this two. Because you don't need any clearance or any other requirement you get paid for what you good at and love to do legally.



CQU Research COVID-19


Jonathan Caceres, Jun 29, 07:38


A vision from 1974


Jonathan Caceres, Jun 29, 07:38


Did you know about Hacker One https://hackerone.com


Jonathan Caceres, Jul 05, 04:31
Video from a hacker one
>>> Hacker
Videos page
>>> Videos HackerOne


OISSY soon on www.oissy.com.au


Jonathan Caceres, Jun 29, 07:39


How good or bad is Adsense?


Jonathan Caceres, Jun 27, 11:40



The top ten new social media platforms


Jonathan Caceres, Feb 06, 02:29
1. TikTok       social music media short videos
2. Caffeine     TV social media 
3. Lasso        social market find your favourite shop magazine like ALDI 
4. Houseparty   social media multiple facetime screen at once
5. Steemit      steemit is a blockchain-based blogging and social media 
                                                   website, which rewards its users with the cryptocurrency


NAB bank open API for developers


Jonathan Caceres, Jan 18, 12:08
 
API means {EN}  [Application Programming Interface]
          {ES}  [Interfaz de Programación de Aplicaciones] 

Registration straight forward you can use the banks API source for some 
of their services such as rates and more.

A link to open data for NAB  URL: https://developer.nab.com.au/. 
for security go directly to NAB Bank URL or copy and paste the link
we have provided.


Ubuntu Repair boot


Jonathan Caceres, Nov 17, 22:53
 Boot Repair UBUNTU

Use terminal:

sudo add-apt-repository ppa:yannubuntu/boot-repair
sudo apt-get update
sudo apt-get install -y boot-repair && boot-repair

more info at https://help.ubuntu.com/community/Boot-Repair




ITAR


Jonathan Caceres, Oct 08, 06:38
International Traffic in Arms Regulations. U.S. federal regulations

that govern the traffic of articles that are considered to be

munitions.

This includes various enciphering/deciphering machines.

74C 3D JPG


What about $300 million no string or attachment


Jonathan Caceres, Oct 08, 05:50
Huawei is giving $300 million a year to universities with no strings attached

 Technologyreview


Do I have to pay for an anti-virus software?


Jonathan Caceres, Oct 08, 06:01
In this digital age, where every device is connected with each other 
within inner-network, WiFi, VPN, or other sophisticated connection methods. 
We are not an exception for malware or computational virus. 

If you are connected right now in some way it means you are 98.9% 
vulnerable for an cyber attack. 
So which of these pile of anti-virus software is good for me?

The aren't not software is full bullet proof for these kind of attacks but some
antivirus companies been on the market for several years and has build 
a reputation and safe for customers like us.

Here is a list of 13 best software Anti-virus:

Rank  Name           Comment

1. Norton            Best for reputation
2. Avast             free not always is good
3. McAfee            Okay 
4. Kaspersky         Excellent protection accuracy rate
5. Qihoo 360         Never hear
6. Trend Micro       Trial was not so good
7. BitDefender       Good with a purpose
9. Wrike             May be new
10. TimeSolv         Same new
11. BQE Core         Never hear or installed
12. Mavelink         Why not try it
13. Husbstaff        Do a research


For us the best is Norton Internet Security it is reliable defender against
malware, but if you are type of Linux guy on Windows try Kaspersky best
option about anti-virus software.