Loading

Great Tip For Mp3 Searching On Google

Go to google copy and paste in

?intitle:index.of? mp3

and after mp3 put in an artist or album or whatever and hit enter... what you get is lists of downloadable mp3s

 eg:?intitle:index.of? mp3 santana
Another trick:

Use the following

inurl:microsoft filetype:iso

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

Another trick:

http://www.google.com/ie?q=parent-directory+"Warez"+exe+OR+zip+OR+rar+OR+gzip+OR+tar+OR+bzip&num=100

Replace "Warez" with "Gamez" "Mp3" anything you like....

Combine 3G 4G Mobile Data + Wifi together to Boost Download Speeds

For your mobile downloads, you often have a choice to take your web browsing or downloads over Mobile data (3G or 4g) OR Wifi.

With 3.5G and 4G speeds attaining great speeds, it is comparable to those available via Wifi. However, sometimes your Need for Speed is higher than the both, How about combining 3G / 4G Mobile data with Wifi internet to boost your download speeds?

BackTrack 5 R3 Released


Backtrack is one of the best Linux distribution for penetration testing, it helps ethical hackers to perform the penetration testing on the network, web application, wireless network, RFID and many more. Backtrack 5 was the last released but now backtrack 5 R3 has been released by the backtrack community.






What official website describe about it:

Seeds/Peer Increase by submitting torrent btReAnounceR


Increasing Torrent speed is fully depends on how much Seed And Peer your torrent file have.If your torrent file have very low seed and peer than its very hard to get a good downloading speed.So its good to have more Seed And Peer.
If your torrent have a zero seeds than your downloading will never get complete.
Than what to Do??

Torrific.com Alternative-same as Torrific.com

Because of SOPA we have lost some good services like Torrific.com .I have got this site which leeches torrents on server just like Torrific.com , you can download torrents Directly from download managers, like IDM.

about torrific.com but torrific is down and now you can migrate to this site








*first you have to sign up for new account, after give your email, password etc and sign up for this service



*After that download the torrent file and upload it to the zbigz site






*Upload it to the zbigz site





*After done click the green button and choose Free download






*Now choose Free download





*Then you can see like this







Download speed depending on your Internet connection.

I have personally tested http://zbigz.com/ , worked very well.

Cryogenically frozen RAM bypasses all disk encryption methods


Summary: Computer encryption technologies have all relied on one key assumption that RAM (Random Access Memory) is volatile and that all content is lost when power is lost. That key assumption is now being fundamentally challenged with a can of compressed air and it’s enough to give every security professional heart burn. We all had [...]



Computer encryption technologies have all relied on one key assumption that RAM (Random Access Memory) is volatile and that all content is lost when power is lost. That key assumption is now being fundamentally challenged with a  can of compressed air and it’s enough to give every security professional heart burn.
We all had some theoretical concerns, but surely it would be too difficult to transport hot memory from one computer to another to extract its contents right? That’s what we all thought until a group of researchers from Princeton Universityshowed that memory wasn’t as volatile as we had all assumed (see Techmeme). As a matter of fact, memory would hold its contents for a duration of seconds or even minutes with the power cut off. If that wasn’t long enough, a can of compressed air used upside down will cryogenically freeze memory and keep the data intact for several minutes to an hours. This means the ultrasensitive encryption keys used to protect data can be exposed in

An antivirus program won't stop this: Hackers can steal computer data by listening to the noise your PC makes


Savvy hackers can steal a computer’s secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.

CAMBRIDGE, Mass. — In the last 10 years, cryptography researchers have demonstrated that even the most secure-seeming computer is shockingly vulnerable to attack. The time it takes a computer to store data in memory, fluctuations in its power consumption and even the noises it emits can betray information to a savvy assailant. 

Attacks that use such indirect sources of information are called side-channel attacks, and the increasing popularity of cloud computing makes them an even greater threat. An attacker would have to be pretty motivated to install a device in your wall to measure your computer’s power consumption. But it’s comparatively easy to load a bit of code on a server in the cloud and eavesdrop on other applications it’s running.

Fortunately, even as they’ve been researching side-channel attacks, cryptographers have also been investigating ways of stopping them. Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science at MIT, and her former student Guy Rothblum, who’s now a researcher at Microsoft Research, recently posted a long report on the website of the Electronic Colloquium on Computational Complexity, describing a general approach to mitigating side-channel attacks. At the Association for Computing Machinery’s Symposium on Theory of Computing (STOC) in May, Goldwasser and colleagues will present a paper demonstrating how the technique she developed with Rothblum can be adapted to protect information processed on web servers.

In addition to preventing attacks on private information, Goldwasser says, the technique could also protect devices that use proprietary algorithms so that they can’t be reverse-engineered by pirates or market competitors — an application that she, Rothblum and others described at last year’s AsiaCrypt conference. 

Today, when a personal computer is in use, it’s usually running multiple programs — say, a word processor, a browser, a PDF viewer, maybe an email program or a spreadsheet program. All the programs are storing data in memory, but the laptop’s operating system won’t let any program look at the data stored by any other. The operating systems running on servers in the cloud are no different, but a malicious program could launch a side-channel attack simply by sending its own data to memory over and over again. From the time the data storage and retrieval takes, it can infer what the other programs are doing with remarkable accuracy.

Goldwasser and Rothblum’s technique obscures the computational details of a program, whether it’s running on a laptop or a server. Their system converts a given computation into a sequence of smaller computational modules. Data fed into the first module is encrypted, and at no point during the module’s execution is it decrypted. The still-encrypted output of the first module is fed into the second module, which encrypts it in yet a different way, and so on. 

The encryption schemes and the modules are devised so that the output of the final module is exactly the output of the original computation. But the operations performed by the individual modules are entirely different. A side-channel attacker could extract information about how the data in any given module is encrypted, but that won’t let him deduce what the sequence of modules do as a whole. “The adversary can take measurements of each module,” Goldwasser says, “but they can’t learn anything more than they could from a black box.”

The report by Goldwasser and Rothblum describes a type of compiler, a program that takes code written in a form intelligible to humans and converts it into the low-level instruction intelligible to a computer. There, the computational modules are an abstraction: The instruction that inaugurates a new module looks no different from the instruction that concluded the last one. But in the STOC paper, the modules are executed on different servers on a network.

According to Nigel Smart, a professor of cryptology in the computer science department at the University of Bristol in England, the danger of side-channel attacks “has been known since the late ’90s.” 

“There’s a lot of engineering that was done to try to prevent this from being a problem,” Smart says, “a huge amount of engineering work. This is a megabucks industry.” Much of that work, however, has relied on trial and error, Smart says. Goldwasser and Rothblum’s study, on the other hand, “is a much more foundational study, looking at really foundational, deep questions about what is possible.”

Moreover, Smart says, previous work on side-channel attacks tended to focus on the threat posed to handheld devices, such as cellphones and smart cards. “It would seem to me that the stuff that is more likely to take off in the long run is the stuff that’s talking about servers,” Smart says. “I don’t know anyone else outside MIT who’s looking at that.”

Smart cautions, however, that the work of Goldwasser and her colleagues is unlikely to yield practical applications in the near future. “In security, and especially cryptography, it takes a long time to go from an academic idea to something that’s actually used in the real world,” Smart says. “They’re looking at what could be possible in 10, 20 years’ time.”


Story Source:
The above story is reprinted from materials provided byMassachusetts Institute of Technology.
Note: Materials may be edited for content and length. For further information, please contact the source cited above.

Google Algorithms Over Years


Google first appeared in 1998. By that time it was the first search engine that used link metrics for rankings. But the first major update didn’t happen until 2000.
From this day forward, it was an avalanche of small changes and big updates. The people from Google are doing all they can to always improve their search algorithm so that we, users, can get the best results and never be offered a spammy website.
To get really familiar with the updates that have happened over the past 12 years, make sure you take a look at this infographic. It shows thorough information about the little and bigger changes that you need to know about and how they affected the way we search today.

Related Posts Plugin for WordPress, Blogger...