Search This Blog

Tuesday, January 3, 2017

Make money online

 Real Ways to Actually Make Money Online



 How many articles are there about making money online? Thousands?  Millions? Enough? Probably. But there’s a problem. Too many of them are just sales pitches to convince you to sign up for some seminar, webinar, training session or some other way to become an online millionaire.
They really give online money making a bad name. But it is possible to make money online. I mean, the people selling all of those millionaire pitches are making money, right?
There are legitimate ways to make money online. The problem is that the real ways to m

Monday, December 12, 2016

parrot os security and hacking

 Parrot Security OS:

        Parrot Security OS (or ParrotSec) is a GNU/LINUX distribution based on Debian. It is designed for penetration testing (computer security), Vulnerability Assessment and Mitigation, Computer Forensics and Anonymous Web Browsing. It is developed by the Frozenbox Team.

     
ParrotSec

Target

ParrotSec is thought to give a light environment, highly compatible and complete. It offers many contents about web and computer systems analysis, a lab directed towards forensic digital use, with legally recognized tools and the opportunity to work with cryptography, offering a large set of possibility. Moreover, it allows you to surf and work anonymously.

Core

Parrot is based on Debian's testing branch (stretch), with a custom hardened linux 4.6 kernel with a grsecurity patched branch available. It follows a development line of rolling release kind.
The desktop environment is MATE, and the default display manager is LightDM.[1]
The project is certified to run over machines which have 256MB of RAM at least and it is suitable to both 32bit (i386) and 64bit (amd64).[2] Moreover, the project is available for ARMv7 (armhf) architectures. It even offers an edition (both 32bit and 64bit)[3] developed for servers only to carry out cloud pentesting.

2016-10-15 Parrot 3.2 CyberSloop  download parrotSec in  this link


 

KALI Linux


KALI Linux 2


    Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers.

 

Development

 

        Kali Linux is preinstalled with over 300 penetration-testing programs, including Armitage (a graphical cyber attack management tool), nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP (both web application security scanners).[2][3] Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.
It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution based on Knoppix. The third core developer Raphaël Hertzog joined them as Debian expert.
Kali Linux is based on Debian Testing. Most packages Kali uses are imported from the Debian repositories.
Kali Linux is developed using a secure environment with only a small number of trusted people that are allowed to commit packages, with each package being signed by the developer. Kali also has a custom-built kernel that is patched for injection. This was primarily added because the development team found they needed to do a lot of wireless assessments.

  Download this in  Kali linux download

 

Sunday, December 11, 2016

Raspberry Pi

   
                              
Raspberry pi logo

 The Raspberry Pi is a series of credit card-sized single-board computers developed in the United Kingdom by the Raspberry Pi Foundation to promote the teaching of basic computer science in schools and in developing countries. The original model became far more popular than anticipated, selling outside of its target market for uses such as robotics. Accessories including keyboards, mice and cases are not included with the Raspberry Pi. Some accessories however have been included in several official and unofficial bundles.
In February 2016, the Raspberry Pi Foundation announced that they had sold eight million devices (for all models combined), making it the best-selling UK personal computer, ahead of the Amstrad PCW. Sales reached ten million in September 2016.

          
Model Pi 3


Overview:

 

Several generations of Raspberry Pis have been released. The first generation (Raspberry Pi 1 Model B) was released in February 2012. It was followed by a simpler and inexpensive model Model A. In 2014, the foundation released a board with an improved design in Raspberry Pi 1 Model B+. The model laid the current "mainline" form-factor. Improved A+ and B+ models were released a year later. A cut down "compute module" was released in April 2014, and a Raspberry Pi Zero with smaller size and limited input/output (I/O) and general-purpose input/output (GPIO) abilities was released in November 2015 for US$5. The Raspberry Pi 2 which added more RAM was released in February 2015. Raspberry Pi 3 Model B released in February 2016 is bundled with on-board WiFi and Bluetooth. As of December 2016, Raspberry Pi 3 Model B is the newest mainline Raspberry Pi. These boards are priced between US$5–35.
All models feature a Broadcom system on a chip (SoC), which includes an ARM compatible central processing unit (CPU) and an on chip graphics processing unit (GPU, a VideoCore IV). CPU speed ranges from 700 MHz to 1.2 GHz for the Pi 3 and on board memory range from 256 MB to 1 GB RAM. Secure Digital (SD) cards are used to store the operating system and program memory in either the SDHC or MicroSDHC sizes. Most boards have between one and four USB slots, HDMI and composite video output, and a 3.5 mm phone jack for audio. Lower level output is provided by a number of GPIO pins which support common protocols like I²C. The B-models have an 8P8C Ethernet port and the Pi 3 has on board Wi-Fi 802.11n and Bluetooth.
The Foundation provides Raspbian, a Debian-based Linux distribution for download, as well as third party Ubuntu, Windows 10 IOT Core, RISC OS, and specialised media center distributions. It promotes Python and Scratch as the main programming language, with support for many other languages. The default firmware is closed source, while an unofficial open source is available.




Hardware:

            

The Raspberry Pi hardware has evolved through several versions that feature variations in memory capacity and peripheral-device support.
This block diagram depicts Models A, B, A+, and B+. Model A, A+, and the Pi Zero lack the Ethernet and USB hub components. The Ethernet adapter is internally connected to an additional USB port. In Model A, A+, and the PI Zero, the USB port is connected directly to the system on a chip (SoC). On the Pi 1 Model B+ and later models the USB/Ethernet chip contains a five-point USB hub, of which four ports are available, while the Pi 1 Model B only provides two. On the Pi Zero, the USB port is also connected directly to the SoC, but it uses a micro USB (OTG) port.

 top Raspberry projects :

 










more projects contact me ghilesmahleb@gmail.com






Saturday, December 10, 2016

Arduino technology

    Arduino, and its recent synonym Genuino2, are physically free cards on which is located a microcontroller (of Atmel AVR architecture like for example the Atmega328p). The diagrams of these maps are published in a free license. However, some components, such as the microcontroller for example, are not under free license.
Arduino card.

   
The microcontroller can be programmed to analyze and produce electrical signals, to perform various tasks such as home automation (control of domestic appliances - lighting, heating ...), piloting a robot, embedded computing, Etc.
  It is a platform based on a simple input / output interface. It was originally intended primarily but not exclusively to interactive multimedia programming to show or artistic events, which explains in part the descendants of its Processing Development Environment, itself inspired by the environment Wiring programming (one designed for production applications involving graphics and one for steering theaters)

                                            
Arduino IDE.

  Arduino can be used to build independent interactive objects (rapid prototyping), or can be connected to a computer to communicate with software (eg. Macromedia Flash, Processing, Max / MSP, Factory Hollyhock, Pure Data, SuperCollider). In 2011, the sold versions are pre-assembled. Information is provided for those wishing to assemble or build an Arduino card themselves.
  The Arduino project received an honorary degree at the Ars Electronica 2006 [ref. Necessary], in the Digital Communities category.
www.arduino.com 
 For more courses contact me: ghilesmahleb@gmail.com

                        









Thursday, December 8, 2016

The best phone of the year

  1. The top 3 telephone in 2016: 

      I- One Plus 3T

    The Qualcomm® Snapdragon™ 821 (2.35 GHz) runs even the most demanding apps and games with enhanced performance. Thanks to 6GB of RAM, the OnePlus 3T can juggle countless tasks without slowing down. Internal storage of up to 128GB means running out of space is a thing of the past. We took no short-cuts on our way to a device that performs as well in practice as it benchmarks.

      II- HTC 10










      The HTC 10 sets a new standard in sound quality with its new BoomSound Hi-Fi edition speakers, customizable audio profile and high-resolution audio headphones. All these elements combine wonderfully with the high-resolution 24-bit HTC 10 certified audio. Music has never been so enjoyable on a smartphone.


       



     The HTC 10 contains what may well be the best smartphone camera currently available. With innovations such as the world's first optical image stabilizer at the front and rear, 12MP UltraPixels, faster laser autofocus, and so on. A DxOMark score of 88 *, one of the highest scores of smartphone camera quality ever awarded, proves that we are truly on the right track.

     

     

    III- LG V20 

    159.7 x 78.1 x 7.6 mm (6.29 x 3.07 x 0.30 in) Weight 174 g (6.14 oz) SIM Single SIM (Nano-SIM) or Dual SIM (Nano-SIM, dual stand-by)  - MIL-STD-810G certified Display Type IPS LCD capacitive touchscreen, 16M colors Size 5.7 inches (~ 72.4% screen-to-body ratio) Resolution 1440 x 2560 pixels (~ 513 ppi pixel density) Multitouch Yes Protection Corning Gorilla Glass 4  - Secondary display, 160 x 1040 pixels, 2.1 inches - LG UX 5.0 Platform OS Android OS, v7.0 (Nougat) Chipset Qualcomm MSM8996 Snapdragon 820 CPU Quad-core (2x2.15 GHz Kryo & 2x1.6 GHz Kryo) GPU Adreno 530 Memory Card slot microSD, up to 256 GB (dedicated slot) Internal 32/64 GB, 4 GB RAM Camera Primary Dual 16 MP (29mm, f / 1.8) + 8 MP (12mm, f / 2.4), autofocus laser, OIS, flash LED, check quality Features 1 / 2.6 "sensor size @ 29mm, 1 / 3.2" sensor size @ 12mm, geo-tagging, 

my blog

  1. The goal of blog :

    •  All new in electronics
    •  The tests on the different Materials 
    •  Interviews with companies
    •  Defects in materials
    •  Processing software                   
    • And learning in electronics 
     
  2.  The GeForce® GTX TITAN Z:  

    GeForce GTX TITAN
    The GeForce® GTX TITAN Z is a true power monster. This new GeForce graphics card, the fastest in the world, accelerates the performance of the most powerful PCs in the world. With its dual-GPU architecture coupled with 5760 CUDA cores and 12 GB of dedicated memory, you can play the most demanding titles in multi-screens or on 4K monitors, without any drop in performance!
  3. Iran – Cops arrest hackers who robbed gold shops

     

According to the police, the hackers had accessed the data on the banking transactions of the gold shops.
Colonel Mohammad Mehdi Kakvan, the commander of Tehran cyber police, has said that,”The suspects used USB flash drives to break into the computer systems of the gold shops and used the keylogger malicious software, IRNA news agency reported.”
“The affected gold shops had failed to install and upgrade proper security software on the computers, which helped the hackers,” he added.
He described installing proper anti-virus software and keeping them upgraded as a major method to confront hackers from breaking into computers.