This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Advertisement

Yotube Channel

Saturday, June 4, 2016

Dear visitors this site is now under development unintentionally it was down sorry for unavaibility.







Since last month it was down now we are going to make it up with more features mostly for UOG Sialkot campus's student just wait for few more days
Regards :
                Attique ur rehman

Saturday, April 23, 2016

What is encryption

An introduction to Encryption
Must watch this video to know what is encryption....

Monday, April 4, 2016

Online privacy


Your online life may not seem worth tracking as you browse websites, store content in the cloud, and post updates to social networking sites. But the data you generate is a rich trove of information that says more about you than you realize—and it’s a tempting treasure for marketers and law enforcement officials alike.
Battles have long raged over how third parties can access and use your data. This year, your online privacy faces new threats, as a result of emerging technologies and new regulatory efforts that could affect how your Web-based life is protected... or exposed.
The nature of online activity compounds the privacy problems we already experience in the material world. Every move we make on our PCs, smartphones, and tablets turns into a data point that trackers can easily collect and share. And you effectively agree to such collecting and sharing whenever you sign up for an online service and accept its privacy policy.
“There’s a pretty big disparity between what folks think their privacy rights are online and what they actually are online,” says legislative counsel Chris Calabrese of the American Civil Liberties Union. “They mistake a privacy policy for meaning that they have privacy. That policy is frequently a way to describe the rights you don’t have.”
Federal law may or may not mitigate the privacy threats. Efforts to update the Electronic Communications Privacy Act (ECPA) aim to make your online data harder to collect and share. Meanwhile, proposed legislation called the Cyber Intelligence Sharing and Protection Act (CISPA) could make it easier to obtain.
As you watch your privacy being kicked around like a football in a scrum, pay close attention to the following five major threats.

#1: Cookie proliferation

The invisible cookie software agents that track your browsing habits and personal data are likely to multiply in 2013. Advertising networks, marketers, and other data profiteers depend on cookies to learn more about who you are—and what you may be interested in buying. Unless legislation imposes legal restraints on Web-browser tracking, your system is likely to accumulate more cookies than you’d find in a box of Chips Ahoy.
Cookies have been proliferating at a rate that would impress epidemiologists. “Five to ten years ago, if you opened NYT.com in your browser, you’d get a cookie from the New York Times, maybe a couple, and that would basically be it,” says staff technologist Dan Auerbach of the Electronic Frontier Foundation. “Today you get probably on the order of 50 cookies from all sorts of third parties: ad servers, data brokers, trackers. They can build up this big profile about your browsing history.”
The worst part, says EFF’s Auerbach: “It’s totally invisible to users. They have no idea what’s happening.”
Marketers say that they keep user data private by viewing it only in aggregate, but the sheer volume of data a cookie can collect about any one person can enable the cookie’s owner to infer a surprising amount about the individuals being tracked. As a 2010 report by Gartner found, “the more that personal information can be correlated, the less it is possible to completely anonymize.”
cookies
Browser cookies are proliferating, with dozens lurking on a typical webpage.
But while cookies appear to be going viral, help may be on the way. In 2012, the Obama Administration proposed a Privacy Bill of Rights that would include Do Not Track legislation, so that consumers could choose whether and when to be tracked. Do-not-track mechanisms are being built into major Web browsers, such as Mozilla’s Firefox. The Do Not Track concept still has no legal support, however. Marketers, many of whom claim that tracking data is essential to their business, remain free to ignore Do Not Track efforts—or build ways around them.
“Do Not Track has no teeth right now,” says EFF’s Auerbach. “If you set it in your browser, you should not expect to gain significant privacy.” Nonetheless, John M. Simpson, director of the Privacy Project at Consumer Watchdog, sees promise in new legislative efforts—specifically, the Do-Not-Track Online Act of 2013. “I think this may be the only way to get meaningful protection for consumers,” says Simpson.

#2: Seizing cloud data

You love how easy it is to grab data from the cloud—and so do law enforcement agencies. And there’s only going to be more of that data to love in coming years: Gartner predicts that 36 percent of U.S. consumer content will be stored in the cloud by 2016.
But whether you use a Web-based email service, keep files in Google Drive, or upload photos to Shutterfly, everything you write, upload, or post gets stored in a server that belongs to the online service, not to you. And because of outdated rules enumerated in the ECPA, this cloud-based data is vulnerable to a privacy loophole so big that a Google self-driving car could roll through it.
Data stored in the cloud isn’t legally protected in the same way that it would be if it were located on a storage device you own.
“A huge concern about using the cloud is that your data does not have the same Fourth Amendment protections that it would have if it were stored in a desk drawer or even your desktop computer,” says Consumer Watchdog’s Simpson.
One key reason that privacy advocates and some legislators are trying to update the ECPA this year is that the current law treats data stored on a server for more than 180 days as abandoned. This statutory assumption is a vestige of a time when servers held data only briefly before shunting it off to a local computer. Furthermore, the law’s definition of such data is vague enough to cover not just email messages—a popular target of law enforcement agencies—but (potentially) other kinds of data stored on servers. Now that so much data resides on servers owned by cloud-based services, and so many people keep content in the cloud for years, a lot of long-stored files that people haven’t abandoned could be fair game for Big Brother.
Law-enforcement agencies are requesting cloud-based data with increasing (and unsettling) frequency. Google’s Transparency Report graphs a 70 percent increase in such requests over a span of three years, from 12,539 requests in the last six months of 2009 to 21,389 requests in the last six months of 2012.
Cloud services aren’t just rolling over, though. For example, Google might comply with a subpoena to reveal the name, contact information, and login records of a Gmail subscriber. But Google would insist that the requesting authority obtain a court order requiring Google to provide greater levels of detail, such as the mail header for a message. In addition, Google would demand to see a search warrant before giving government investigators access to actual email content. Tellingly, the percentage of information requests that Google has fulfilled has dropped slightly over time, from about 75 percent in 2010 to about 66 percent in 2012. Twitter’s transparency reporting site offers similarly enlightening reading.
Law-enforcement interests have scuttled past attempts to update ECPA, so it’s hard to say whether the current efforts will get any farther. “The only true protection is to understand that anything you put up there can be accessed by somebody else,” says Consumer Watchdog’s Simpson. “If you don’t want that to happen, don’t put it in the cloud.”

#3: Location data betrayal

Call it the end of the easy alibi: Location data will make it increasingly difficult for you to wander around the world without someone knowing exactly where you are at any given time. Your cell phone is the primary tattletale, but the location data you post to social networking sites are revealing sources, too. Pinpointing your whereabouts will get easier still as other location-beaming devices come online, from smarter cars to smarter watches to Google Glass.
“When you leave your house and go to a friend’s house, run errands, go to work, visit a lover—whatever it is you do—if your geolocation is tracked and recorded, that’s a lot of information about you,” says senior policy analyst Jay Stanley, of ACLU’s Speech, Privacy and Technology Program.
Armed with this data, advertisers might (for example) send you promotions for nearby businesses, wherever you are. The result could be a nice surprise—or not. According to a 2011 report by Gartner, “forty-one percent of consumers say they would be concerned about privacy if they were to use mobile location services so that they can receive more targeted offers through advertising or loyalty programs.”
Your cell phone is a prime source of personal location data.
You’d be even less pleased if law enforcement officials, your employer, or your ex-spouse’s private detective used location data to keep tabs on you. Lillie Coney, associate director of the Electronic Privacy Information Center, points out that an employer-owned device “lets your employer track you, on and off the job. What kind of consequences and profile data are based on your geolocation, based on the course of your time in or out of work, where you are, how late you are?”
And as with cloud-based data, the legal requirements for obtaining location data from your mobile service provider are not terribly stringent. According to EFF staff attorney Jennifer Lynch, “It’s pretty easy for the government to get access to the location data, and very hard for users to prevent that data from being gathered.”
There may not be much you can do about your employer. EFF’s Lynch says that reining in the government’s zeal for location data may be tough as well. “It’s such a useful tool for law enforcement to get access to this info, there’s a lot of pushback,” Lynch says.
Calabrese of the ACLU says that updating the ECPA is a crucial step in making location data less open to scrutiny. “A lot of location info is flying around, and that’s why it’s so critical to get legal protection. You should be able to use a cell phone without worrying about being tracked.”

Saturday, March 19, 2016

Inspirational quote


How a theif turns a credit card Reader into A "Skimmmer" within 3 seconds

Skimming is an effective technique used by thieves to steal credit card information from old and classic debit/credit card scanners. Recently, in Miami, two people were caught on camera who placed a skimmer on a credit card scanner in less than three seconds.
Surprisingly, turning a regular credit card reader into a device to steal users’ credit card information — a device commonly known as skimmer — can take just three seconds. This was revealed when an unidentified man placed a skimmer on a gas station credit card scanner in Miami.
Miami Beach police have released the surveillance video of two men whose activity was recorded on the camera as they placed a credit card skimmer over a debit/credit card at a gas station. This incident took place last week.

How the thief turned a credit card reader into a skimmer?

If you take a look at the video — we’ve shared it below — you will notice that one of the men distracts the clerk working at the store, while the other person places the skimmer over the payment keyboard near the register. This happened so fast — under 3 seconds — that you might have to rewatch the whole sequence to catch the thief.
Fortunately, the skimmer became loose on the keypad and the clerk called the cops. This video clip has been released by the police to get help in identifying the two men caught in the video.
It should be noted that skimming is an old technique that’s still very effective if a merchant is using an old and classic credit card system.
Here’s the whole video —

 

If I asked to rank browsers and Operating System

Browsers

If someone asked me to rank browsers and Operating system being used in world i can simply got an idea from my blog by checking pageviews By browser tab in which you can see as Google chrome (with 65% users of world) is at number 1 means the world best Browser.After chrome there comes Firefox with 16% users of the world at number 2.At number 3 there comes Internet Explorer with 10% users.At number 4 UCBrowser with 2% users of the world.At number 5 safari with 2% user again.

Operating System

1)Windows operating system is the World best Operating system with 78% users of the World.
2)Android is at number 2 after Microsoft Android has 13% users of World.
3)Macintosh is at number 3 which has 4% users.
4) Sorry linux you are at number 4 having 2% only

Author:
           Attique ur rehman

    This ranking might not be accurate it's a rough sketch or estimate.  


Cybersecurity System IDs Malware Hidden in Short Twitter Links


Photo: iStockphoto

Twitter and Facebook users can all too easily get a computer virus when they click on malware links shared by unsuspecting friends. To identify such malicious links on social media, UK researchers have developed a system that recognizes potential cyber attacks within seconds of clicking on a shortened Twitter link.
The “machine classifier” system has learned to identify malware activity in the system logs of infected machines just moments after clicking on suspicious links, according to a Cardiff University press release. It proved capable of identifying possible cyber attacks within five seconds with up to 83 percent accuracy. Given half a minute, it could identify cyber attacks with up to 98 percent accuracy.
“URLs are always shortened on Twitter due to character limitations in posts, so it’s incredibly difficult to know which are legitimate,” said Pete Burnap, director of the Social Data Science Lab at Cardiff University in the UK, in a press release statement. “Once infected the malware can turn your computer into a zombie computer and become part of a global network of machines used to hide information or route further attacks.”
Shortened links pose an identification challenge for current anti-virus software as well as for social media users. That’s in part because many anti-virus solutions have a tough time detecting previously unseen cyber attacks without knowing their code signatures, Burnap said. By analyzing the machine logs for suspicious patterns, the new cybersecurity research could eventually help develop a real-time system capable of protecting Twitter and Facebook users.
The machine classifier system trained itself by analyzing tweets containing shortened URLs from the 2015 Super Bowl and cricket world cup finals. Burnap and his colleagues from several other UK universities hope to stress-test the system by analyzing Twitter traffic from the European Football Championships coming up next summer.
To collect and analyze those Twitter links, researchers used an open-source “client honeypot” called Capture HPC, which was originally developed by Victoria University of Wellington in New Zealand. The client honeypot acts as a security device capable of monitoring and isolating data to investigate it for suspicious activity.
In this case, Capture HPC looked for possible patterns of malicious activity related to malware by monitoring changes in the files, registry files and processes. It also ran within a Virtual Machine environment to further isolate the malware’s changes to the system. More details on the research come from a paper presented at the 2015 IEEE / ACM International Conference on Advances in Social Networks Analysis and Mining in August 2015.

Facebook Monitoring you

Whenever you’re on Facebook, do you ever get the feeling that you’re being watched? An ad pops up that’s right up your alley, or three new articles show up in your feed that are similar to something you’ve just clicked on.
Sometimes it seems like Facebook knows you personally, and that’s because it does. It has algorithms that track what you like, watch and click on. That information is then passed along to Facebook advertisers.
Facebook itself isn’t the only culprit. Tons of companies use Facebook’s platform as a way to track you. In fact, right now there a probably dozens of companies that are watching your posts, storing your profile information and more, without you even realizing it. Today, I’m going to tell you how to stop it.
How did this happen in the first place?
When Facebook first started out, people rushed to the platform because of the many perks that it offered. One of those perks, and probably the most appealing, was the fact that Facebook was entirely ad-free. You could use the platform to connect with family and friends without being bothered by someone trying to sell you something.
Well, like they say, “All good things must come to an end.”  Eventually, Facebook began selling ads like everyone else. And that’s when everything changed.
People realized that Facebook provided a treasure trove of information for advertisers. By clicking “like” users were telling companies exactly what they wanted -- more of this, less of that, please. This led to the big data tracking we now see.
Three sneaky ways companies are tracking you:
Most people understand that Facebook is tracking their preferences whenever they use the app. But, few realize they’re being tracked in other ways too. And, that’s what these third-party companies are banking on. If you don’t know you’re being tracked, then you won’t ask them to stop. So, here are three things to watch out for.
Facebook appsThis is when you receive a request to play a Facebook game your friends are obsessed with, and you decide to sign up. If you’ve ever done this before, then you’ve allowed that app developer track you. These third-party apps integrate with your Facebook profile and generally have permission to pull whatever information they want. And although you can edit what information they can access, very few people do.
Facebook logins: This is when you visit a site and it says "Log in with Facebook," and you do, then you're letting that company track you.
Friends’ apps monitoring you: Even if you didn’t download an app, Facebook's default settings allow apps your friends have installed to also see YOU. It’s pretty scary.
How to stop it from happening:
You might be wondering why this even matters, and how it really impacts you personally. The easiest way to answer those questions is to point out all of those big data breaches you hear about almost daily. Hackers rarely waste time on individuals these days. They’ve got much bigger fish to fry. Large retailers, for example – or the databases where these third-party companies store the information they’ve gathered. That’s why everyone should take these steps to protect their private information.
Review and edit installed apps: To see what apps you've installed over the years, open Facebook in your browser, click the down arrow in the upper right corner and select "Settings." Then click on the "Apps" header in the left column.
To see what information an app is accessing, click the pencil icon next to any of the apps to see and edit the settings. The first setting lets you set who can see that you use the app. It defaults to "Only Me," so it isn't a big deal. Below it, however, is another story.
In the case of Skype, for example, it pulls your public profile information along with your list of friends, email address, birthday and hometown.
Remember that this information is being stored on a third-party server. Not every app developer is going to have Microsoft-level security, and hackers are good at turning tiny pieces of stolen information into big gains.
If you want to keep using the app, you can deselect certain items, such as your email address. Be aware that won't remove the information from the app developer's servers, however. If you change your email address in the future, however, the developer won't get the new one.
Remove apps you don’t use: If you don't want to use the app anymore, you can click the "Remove app" link at the bottom of the page. Just remember that this won't automatically remove your information from the app developer's servers. For that you'll need to contact the app developer directly. Facebook has a link for more information on this under the "Remove info collected by the app" section in the app's settings.
Turn off apps completely: If you've deleted all the apps, and you're not keen on accidentally installing more in the future, you can turn off the app platform completely. Just note you won't be able to install apps or log in to third-party sites using Facebook until you turn this back on.
To turn off the app platform, go back to the App Settings page. Under "Apps, Websites and Plugins," click the "Edit" button. At first, this just looks like a way to disable app notifications and invites from other people, which is a big help on its own. However, you'll want to click the "Disable Platform" link in the bottom left corner.
Facebook gives you the standard warning about what disabling the platform does. If you're OK with it, click the "Disable Platform" button. Again, this won't remove information that app developers might have collected about you already.
Stop logging into sites using Facebook: In the future, when you're adding an app or logging into a website try to avoid logging in with Facebook. But, if you must use Facebook to log in, then look for the "Log in Anonymously" or “Guest” option so it won’t share your information.
Stop friends' apps from seeing your info: Apps can still get your information through your friends. By default as your friends install apps, those apps have permission to grab whatever info about you your friends can see.
To put a stop to this, go back to the App Settings page. Then under "Apps Others Use" click the "Edit" button.
You'll see everything that your friends' apps can see about you. Go through and uncheck every option listed on the page, and then click "Save." Now companies can't track new information about you.
Apps aren't the only worry you'll run into on Facebook. Recently I told you how scammers use Facebook like-farming can put your privacy at risk

Empowering Students around the world to achieve more


Microsoft committed to building immersive and inclusive learning experiences for students and teachers. Experiences that build 21st-century skills like communication, collaboration, critical thinking, creativity and computational thinking.
Everything Microsoft create will be centered around four core promises — empowering teachers and students to:
  • Create and share in entirely new ways
  • Teach and learn through doing and exploring
  • Accommodate any learning style
  • Focus the classroom experience on learning outcomes — not technology
ChrisCap Call Final v2Microsoft working hard to bring these promises to life through compelling experiences that we hope you will love — experiences like OneNote, Skype, Sway and Minecraft.
Microsoft seeing incredible excitement around OneNote — it’s a really powerful tool that makes it easy for teachers to organize all of their class materials into one digital notebook. Accessing and preparing lessons and assignments from any device, and combining handwriting, text, Web content, even audio and video, for more compelling content and personalized learning.
OneNote Class Notebooks provide a framework for teaching and learning. It’s a central collaboration space, a content library to store class materials and an individual notebook for every student in the class that teachers can see real time  to provide feedback.
Take a look at how the Torkinmäki School in Finland uses OneNote Class Notebook on a daily basis to enable new ways of creating and sharing:
I also really love the new Learning Tools for OneNote add-in – where students can access expanded reading and writing experiences, with support for learning disabilities like dyslexia. Learning Tools incorporates special text formatting, advanced dictation, focus mode and immersive reading modes that can make classroom activities easier for students with learning differences.
onenote
Skype in the Classroom is an amazing, free global community for teachers to collaborate on classroom projects using Skype.  With Skype in the Classroom you can play Mystery Skype with another classroom from around the globe, connect with guest speakers to inspire your classroom and take students on virtual field trips.
Sway is a really cool storytelling app that makes it quick and easy to create polished, interactive lessons, assignments, reports, newsletters and more – right from any device. Sways are easy to share with the class, or the world, and look great on any screen.​​​
“Minecraft” is loved by students and teachers around the world, and is already being used in more than 7,000 classrooms in more than 40 countries  — teaching students everything from STEM subjects to art and poetry. In January, Microsft announced the new Minecraft: Education Edition that offers an expanded set of features designed for the classroom.
“In education, Microsoft constantly seeking pathways to explore learning beyond the confines of a textbook. Minecraft allows us that opportunity,” said Rafranz Davis, executive director of Professional Development and Learning at the Lufkin Independent School District in Texas. “When we see our kids enjoying the process of learning in this way, it’s a game changer.”
One of the most exciting computer science resources is the BBC micro:bit, being rolled out by the BBC, supported by Microsoft and a range of other partners — it will soon be empowering virtually every Year 7 student (age 11-12) in the United Kingdom. The BBC micro:bit is a wearable computing device smaller than a credit card that students can use to explore the possibilities of computer science – doing, making and creating!
Devices for every learning style
More and more, educators are asking us about affordable devices and simple management. Microsoft have a great portfolio ofnew Windows 10 devices starting at $199, designed for the demands of education.
And Microsoft want teachers focused on learning, not technology. The combination of new Windows 10 devices, the Lightspeed Systems Management Bundle for Windows, and free online productivity tools for teachers and students through Office 365 Education make for simple and easy device setup and management – driving lower total cost of ownership.
Looking ahead
There are 1.5 billion teachers and students in primary and secondary education today — and Microsoft  committed to the quest to empower them to achieve more. We’re hard at work to surprise and delight you with great new education experiences – Microsoft expect to share some exciting news in April, so stay tuned!
Finally, Microsoft love hearing your feedback and seeing the amazing things happening in your classroom with Microsoft technology. Give us a shout — @microsoft_edu @tony_prophet #MSFTEDU.

9 Crazy things we learned about pluto last Year

Pluto haze and more

For years, Pluto was just a blue dot in diagrams of the solar system, but very recently a more colorful view of the former planet has come together thanks to one well-traveled robot.
It's been over a year since NASA's New Horizons spacecraft first sent back images of Pluto, leading up to its dramatic fly-by in July of 2015. Data is still streaming back to Earth for analysis, adding to the more complete picture of the dwarf planet that New Horizons is painting for us.
In this gallery we've highlighted the strangest, most surprising and just plain awesome things we've learned about Pluto in the past year. For starters, it's super hazy on Pluto. In this image about 20 haze layers are visible extending over hundreds of kilometers of the dwarf planet.

Photo by: NASA/JHUAPL/SwRI/Gladstone et al./Science (2016) / Caption by: 

Friday, March 18, 2016

Inspirational Quote

"We only lose that game which we not played"   Attique ur rehman

it's means that at-least we should try despite sit idle.if win that's good else we'll learn something from Losing game.And learning..............! you know if you learn something despite nothing then you won.


Apps that every Gentleman should have in his smart phone

Your phone is best friend these days you use it for everything like getting more knowledge, sharing things or entertainment.
But smartphone can be used for useful purpose once you have proper tools.
I’ve created a lit of usefull apps that every modern gentleman should have on his smartphone.
From Duolingo to how to cook everything in the event of a deadly snake bite, these apps will make any man’s life easier.

1Duolingo

A modern gentleman is always learning, and that includes new languages.
A quick and easy way to do that is with Duolingo, which provides easy to follow lessons that anyone can complete in a spare minute or two. Fluency in one of Duolingo’s 10 languages is only a few taps away.
Duolingo is available for free on iOS and Android.

2Sworkit

You don’t need a personal trainer — there’s an app for that. Just enter in your goals and what kind of workout you’d like to do, and a personalized plan will be created just for you. Then watch the videos of trainers doing the exercises, which are then easy to repeat.
Sworkit is available for free on iOS and Android.

3Flightaware

If you’re a frequent flier, Flightaware is a lifesaver. It tells you everything about where your flight is, if it’s delayed and why, gate numbers, where it’s coming from, and more. After all, when flying knowledge is power.
Flightaware is available for free on iOS and Android.

4Weber’s Grill

With Weber’s Grill, you don’t need to actually be a grill master — but everyone will think you’re one. It tells you how to cook things, how long to cook things, and is chock full of grilling tips you never knew.
Weber’s Grill is available for free on iOS and Android.

5SAS Survival Guide

It’s not every day you need to know how to treat a snake bite, but when it comes time for that knowledge to come in handy, you’re going to be glad you downloaded SAS Survival Guide. Based off a book by the same name written by a real British special forces trainer, it has everything you need to know when confronted with life-threatening situations.
SAS Survival Guide is available for $5.99 on iOSand Android.

6How to Cook Everything

When How to Cook Everything promises that it will teach you how to cook everything, it really means it. Required for a man who is clueless in the kitchen but desires to not be.
How to Cook Everything is available for $10 on iOS.