thelazypanda69
thelazypanda69
@nonYmou$
23 posts
This page belongs to 127.0.0.1
Don't wanna be here? Send us removal request.
thelazypanda69 · 4 years ago
Text
Privacy
The silicon valley trackers are working around giving the products at a price which is unexpectable and in return they are collecting from you the most precious thing of your life which is your data they are providing you with the information that how the data is collecting anonymously and the individual cannot be identified with the data that they collecting but that is wrong. There is no clear evidence that the data that they collecting are nit being used by the third parties for advertising you with the targeted ads and that those ads are collecting the data and sending to the selected servers which the data is stored and manipulated for future use.  For the sake of humanity these companies are not providing the right information that how the data is used and collected so it is our duty to look into it and try not to get manipulated otherwise it is high time.
0 notes
thelazypanda69 · 5 years ago
Text
Children's data at high risk:
Some 46 million records stolen from children’s gaming service Animal Jam have found its way onto the dark web following a hack of the company in October.
Animal Jam is a popular online virtual world created by WildWorks Inc. with more than 130 million users catering to children between the ages of four and eight. The site has a zoo theme featuring mini-games, puzzles, adventures, parties and social interactions.
The hack and subsequent theft of data was confirmed on the Animal Jam site in a statement. WildWorks describes the theft as involving a database containing some Animal Jam user data on the server of a vendor the company uses for intra-company communication. The data stolen included usernames, email addresses, encrypted passwords and birth dates along with in some cases the names of parents and their billing address. No financial details were stolen.
Although the passwords were encrypted, they used only SHA1 hashing. That’s an old cryptographic standard that can easily be decrypted by hackers.
WildWorks only became aware of the theft of the data after being contacted by security researchers Nov. 11. The hack and data theft is believed to have occurred Oct. 10-12.
Where the story takes an unexpected twist is how the hack is believed to have taken place. WildWorks Chief Executive Officer Clary Stacy told Bleeping Computer that he believes those behind the hack obtained WildWork’s Amazon Web Services Inc. key after compromising the company’s Slack sever.
“The exposure of 46 million Animal Jam user records further validates that no personal data is safe, even on an innocent online game website,” Robert Prigge, CEO of identity verification company Jumio Corp., told SiliconANGLE. “As children’s education and activities have rapidly shifted online amid the COVID-19 pandemic, it’s likely children are using the same usernames and passwords across multiple applications and online accounts, meaning this exposure allows hackers to gain access to more than just Animal Jam.”
Chloé Messdaghi, vice president of strategy at cybersecurity intelligence firm Point3 Security Inc., noted that it’s never appropriate to target kids’ data and the services that make this available need to be stopped.
“A lot of companies use communications apps such as Slack without two-factor authentication, which seems to be the case with Animal Jam,” Messdaghi added. “Instead, companies assume they’re not targets, or mistakenly believe that using a password that’s too short is sufficient. This just underscores that any shared service — GitHub, Citrix, whatever – needs to be protected with multifactor authentication apps or preferably a token, and it underscores just how important password managers are.”
3 notes · View notes
thelazypanda69 · 5 years ago
Text
Health Infrastructure at high risk :
Public health has been compromised by the pandemic. The health of pharmaceutical companies is under threat too, but from a different kind of source. The Indian pharmaceutical company, Lupin, is the latest victim of this ‘contagion’ — cyber attacks. This incident has been reported just a fortnight after Dr Reddy’s Laboratories isolated its data centre services after suffering a similar cyber strike. What is especially worrying is that the attack took place soon after the latter got the nod to conduct trials of Sputnik V, a vaccine for Covid-19 developed by a Russian research institute. During the period from July to September, India has allegedly witnessed 4.25 lakh cloud security breaches and the country, it has been reported, is the sixth most vulnerable nation when it comes to such depredations on pharmaceutical firms. A study by Deloitte has also revealed that the pharmaceutical industry is one of the principal targets of cybercriminals. Even though commercial and medical data are under serious threat, the discourse on data privacy in India is disproportionately tilted towards protecting personal data. The intellectual property of private companies such as research data belonging to pharmaceutical companies are incredibly valuable and, hence, vulnerable. If the integrity of research data is compromised, a medication may lose consumer trust or, worse, be rendered ineffective.
In India, protecting such data remains the onus of the pharmaceutical companies themselves. Although the government introduced the personal data protection bill, 2019, it does not adequately address the vulnerabilities of India’s data economy. Instead, the bill proposes a preventive framework that is inclined towards excessive government intervention. This could lead to a significant increase in compliance costs for businesses and end up in a troubling dilution of privacy rights of companies vis-à-vis the State. This is not the only anomaly. The push towards a digital economy has not been accompanied by a simultaneous emphasis on online security. A legal framework for the future of health data privacy is, hearteningly, in the works. The draft digital information security in healthcare bill is being crafted to protect citizens’ health data as part of an ambitious health data digitization drive. Could the scope of this legislation be widened to include medical data of companies rather than just personal data of patients? What would be even better is to have one comprehensive law that covers all aspects of data. It should be drafted in consultation with the State, commercial firms and individuals — the critical stakeholders in the matter.
0 notes
thelazypanda69 · 5 years ago
Text
GPIO
Stands for "General Purpose Input/Output."  GPIO is a type of pin found on an integrated circuit that does not have a specific function.  While most pins have a dedicated purpose, such as sending a signal to a certain component, the function of a GPIO pin is customizable and can be controlled by software.Not all chips have GPIO pins, but they are commonly found on multifunction chips, such as those used in power managers and audio/video cards.  They are also used by system-on-chip (SOC) circuits, which include a processor, memory, and external interfaces all on a single chip.  GPIO pins allow these chips to be configured for different purposes and work with several types of components.A popular device that makes use of GPIO pins is the Raspberry Pi, a single-board computer designed for hobbyists and educational purposes.   It includes a row of GPIO pins along the edge of the board that provide the interface between the Raspberry Pi and other components.  These pins act as switches that output 3.3 volts when set to HIGH and no voltage when set to LOW.  You can connect a device to specific GPIO pins and control it with a software program.  For example, you can wire an LED to a GPIO and a ground pin on a Raspberry Pi.  If a software program tells the GPIO pin to turn on, the LED will light up.
Most computer users will not encounter GPIO pins and do not need to worry about configuring them.  However, if you are a hobbyist or computer programmer, it can be helpful to learn what chips have GPIO pins and how to make use of them.
0 notes
thelazypanda69 · 5 years ago
Text
RUP
Stands for "Rational Unified Process."  RUP is a software development process from Rational, a division of IBM.  It divides the development process into four distinct phases that each involve business modeling, analysis and design, implementation, testing, and deployment.  The four phases are:
Inception - The idea for the project is stated.  The development team determines if the project is worth pursuing and what resources will be needed.
Elaboration - The project's architecture and required resources are further evaluated.  Developers consider possible applications of the software and costs associated with the development.
Construction - The project is developed and completed.  The software is designed, written, and tested.
Transition - The software is released to the public.  Final adjustments or updates are made based on feedback from end users.
The RUP development methodology provides a structured way for companies to envision create software programs.  Since it provides a specific plan for each step of the development process, it helps prevent resources from being wasted and reduces unexpected development costs.
0 notes
thelazypanda69 · 5 years ago
Text
ISR
Stands for "Interrupt Service Routine."  An ISR (also called an interrupt handler) is a software process invoked by an interrupt request from a hardware device.  It handles the request and sends it to the CPU, interrupting the active process.  When the ISR is complete, the process is resumed.A basic example of an ISR is a routine that handles keyboard events, such as pressing or releasing a key.  Each time a key is pressed, the the ISR processes the input.  For example, if you press and hold the right arrow key in a text file, the ISR will signal to the CPU that the right arrow key is depressed.   The CPU sends this information to the active word processor or text editing program, which will move the cursor to the right.  When you let go of the key, the ISR handles the "key up" event.  This interrupts the previous "key down" state, which signals to the program to stop moving the cursor.Similar to Newton's law of inertia (an object in motion tends to stay in motion), computer processes continue to run unless interrupted.  Without an interrupt request, a computer will remain in its current state.  Each input signal causes an interrupt, forcing the CPU to process the corresponding event.
Many types of hardware devices, including internal components and external peripherals can sent interrupts to the CPU.  Examples include keyboards, mice, sound cards, and hard drives.  A device driver enables communication between each of these devices and the CPU.  ISRs prioritize interrupt requests based on the IRQ setting of the device (or port).  Typically the keyboard is at the top of the IRQ list, while devices like hard drives are further down.
0 notes
thelazypanda69 · 5 years ago
Text
CTP
Stands for "Composite Theoretical Performance."  CTP is used to measure the performance of computer processors.  The values returned by CTP calculations are used for benchmarking purposes, which compare the performance of different processors.  For example, Intel and AMD use CTP calculations to measure how many millions of theoretical operations per second (MTOPS) their processors can perform.  An Intel Pentium M 770, which runs at 2.13 GHz, has a CTP of 7100 MTOPs, while an AMD Opteron 146, which runs at 2.0 GHz, has a CTP of 7168 MTOPS.As seen in the example above, faster processor speeds do not always result in a higher CTP.  Other considerations, such as the processor's architecture and the speed of the frontside bus also affect the overall performance.  CTP is useful for comparing different brands of processors, as well as comparing different models of processors made by the same company.  With dual and quad processors becoming more prevalent, CTP is now also being used to measure the performance increase when multiple processors are used together.
CTP also stands for "Computer to Plate."  This is a process where printing plates are made without using costly film.  Instead, the images are sent directly to the plate from the computer.
0 notes
thelazypanda69 · 5 years ago
Text
NNTP
Stands for "Network News Transfer Protocol."  NNTP is the protocol used to connect to Usenet servers and transfer newsgroup articles between systems over the Internet.  It is similar to the SMTP protocol used for sending email messages, but is designed specifically for newsgroup articles.
NNTP enables both server/server and client/server communication.  NNTP servers, for example, can communicate with each other and replicate newsgroups among each other.  This is how the Usenet network is created and maintained.  In the client-server model, NNTP allows a client system to connect to a Usenet server and provides commands for browsing and viewing articles on the server
0 notes
thelazypanda69 · 5 years ago
Link
Great step by ISRO.
0 notes
thelazypanda69 · 5 years ago
Link
Please help our privacy?
1 note · View note
thelazypanda69 · 5 years ago
Link
UFO COMMUNITY??
1 note · View note
thelazypanda69 · 5 years ago
Text
Automatic Call Distributer
An automatic call distributor (ACD) in telephony is a system that distributes incoming calls to a specific group of terminals used by agents. It is a part of a computer telephony integration (CTI) system. ACDs recognize, answer and route incoming calls. They range from small systems maintaining a few lines up to systems maintaining a large number of lines for large applications. An ACD system handles incoming calls based on the numbers called and an associated database of handling instructions. Companies that offer sales and service support use automatic call distributors to validate callers, make outgoing calls, forward calls to the right parties, permit callers to record messages, gather usage statistics, balance the use of phone lines and provide various other services. ACDs provide caller identification such as that provided by dialed number identification service (DNIS), direct inward dialing, etc. They process high volume incoming calls and distribute them to single or group extensions. They also distribute calls equitably to extensions called as agent lines. They permit only a limited number of staff members to effectively handle large numbers of calls, while assuming that someone is always available at the receiver side to handle calls. An ACD system also maintains records of the peak calling hours, the number of incomplete calls and the incoming call volume. ACD systems are extensively used in offices handling large volumes of incoming phone calls from callers who require assistance. The routing strategy is a rule-based set of instructions, which tells the ACD how calls are handled in the system. This is the algorithm determining the most appropriate employees available to respond to the incoming calls. Additional data is also reviewed to determine the reason for each call, ascertained by a simple interactive voice response (IVR) system. Initially, the ACD function was internal to the private branch exchange of companies. The system is designed to enable common computing devices. Additional functions for external routing applications include computer-telephony integration, which can improve call center agent efficiency by matching incoming calls with important data on a PC. This is achieved through the Computer-Supported Telephony Applications (CSTA) protocol.
0 notes
thelazypanda69 · 5 years ago
Text
Piconet
A piconet is a network of devices connected using Bluetooth technology. The network ranges from two to eight connected devices. When a network is established, one device takes the role of the master while all the other devices act as slaves. Piconet gets its name from the word "pico", which means very small. This very small network is so called because the number is limited to seven devices, plus the master, which limits network and data sharing capability. Data transfer rates vary from 200 to 2,100 kbps at the application. A piconet is sometimes called a personal area network (PAN) because the range of optimal operation for Bluetooth is 10 meters, about the size of a living room.
0 notes
thelazypanda69 · 5 years ago
Text
Warchalking
Warchalking refers to drawing symbols in public spaces to denote an open Wi-Fi wireless network in a public space. Warchalking provides information about the type of wireless connection being used, which may be open node, closed node or wired equivalent privacy (WEP) node. This may attract hackers and make them aware of the Wi-Fi hot spot and its security. Hackers may use this information to attack the Wi-Fi network.
0 notes
thelazypanda69 · 5 years ago
Text
Teardrop Attack
A teardrop attack is a denial of service (DoS) attack conducted by targeting TCP/IP fragmentation reassembly codes. This attack causes fragmented packets to overlap one another on the host receipt; the host attempts to reconstruct them during the process but fails. Gigantic payloads are sent to the machine that is being targeted, causing system crashes.
1 note · View note
thelazypanda69 · 5 years ago
Text
Masquerade Attack
A masquerade attack is an attack that uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification. If an authorization process is not fully protected, it can become extremely vulnerable to a masquerade attack. Masquerade attacks can be perpetrated using stolen passwords and logons, by locating gaps in programs, or by finding a way around the authentication process. The attack can be triggered either by someone within the organization or by an outsider if the organization is connected to a public network. The amount of access masquerade attackers get depends on the level of authorization they've managed to attain. As such, masquerade attackers can have a full smorgasbord of cybercrime opportunities if they’ve gained the highest access authority to a business organization. Personal attacks, although less common, can also be harmful.
1 note · View note
thelazypanda69 · 5 years ago
Text
Line :-
No system is secure the problem is that we have to harden the resistance to the system.
1 note · View note