Seven months ago Samsung Galaxy S8 was launched and rumors have come out for the Galaxy S9.
“Ice Universe” has published on Twitter that the back of the new smartphone will change a lot. Although no details of this changes are given, “Ice Universe” is a reliable source since it has been predicting the changes of mobile phones for the past years.
“100% secure, the Galaxy S9 will not have fingerprint recognition. The back will change a lot, “posted on Twitter. It is thought that the Galaxy S9 will have a camera capable of shooting fantastic videos in “slow motion”. According to the “Tech Radar”, Samsung is working on a rear camera that can shoot 1,000 frames per second.
Samsung will present galaxy A7 and A5 at the beginning of the year.
OnLeaks in collaboration with MySmartPrice released a 360-degree view of the upcoming Samsung phones, Galaxy A5 2018 and Galaxy A7 2018.
The images reveal the phones in each of the corners and an almost skewed display just like the Galaxy S8 and Note 8.
Both models can have one camera along with a fingerprint scanner hooked up to that. A Flash module will also be present Flash even though OnLeaks has left it in oblivion by not telling.
The specifications
According to speculation by industry insiders, the Galaxy A5 will have a 5.5-inch Full HD + screen while the Galaxy A7 6-inch, but with the same resolution.
But regardless of the size difference, the internal phone hardware will be the same. The processor ranges from an Exynos 7885 to a Snapdragon 660 depending on the markets, coupled with 4GB of RAM for each.
An eye-catching feature is the two-sensor front camera. Internal memory will start from 32GB, phones are expected to be waterproof and dust-proof due to IP68 certification.
Operating system
Last but not least is the operating system that can disappoint many users because it will be Android 7.1.1 Nougat and not Android 8.0 Oreo.
When will they debut? The information is scarce but traditionally presented at the beginning of the year.
First off i need to say that this will NOT steal anyones password unless they log in while you are monitoring them. This will however give you their cookies which you can use to steal there session and have full acess to their account. This will work for Facebook, a lot of emails (sorry no gmail), and just about any forum (except this one). If you are familiar with SSLstrip you can use this method to hijack any session (paypal, bank websites, any email, etc.)
Wireshark Software to capture cookies:
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.
Requirements:
Cain and Abel :Download Here Wireshark :Download Here Firefox 3 (or one compatable with add n edit) :Download Here Add n Edit (cookie editor for firefox) :Download Here Acess to the network with user you want to hack Network traffic
and also you can use greasemonkey Add-on
Prerequisites:
Download and install all above programs. To add "Add n Edit" to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.
Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies.
First: Gain acess to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain acess using Backtrack. Tip: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password. Second: Right click Cain and choose 'run as administrator.' on the top bar go to 'configure' and be sure to select your wireless card/adapter. now click where it says 'Sniffer' then this litte button towards the top left:
Next click any empty white box then the blue "+" symbol near the button you pressed just before. choose okay should look like this:
these are all the devices it was able to detect.
now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It's easiest to just go one by one and choose all possibilities.
now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this:
we are done here, just minimize Cain for now.
Third: Run wireshark as administrator. On the top bar choose 'Capture' then 'Interfaces.' Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.
Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type "http.cookie" in the filter. (Something to consider is to just filter to "http" and scroll through the entries looking for ones that start with the word "POST" this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them: http://www.md5decrypter.co.uk/ )
here is an image:
You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forum freerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put 'facebook' there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).
What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts.
copy the cookies as value and save them into a notepad (shown in pic above). I would suggest to seperate everywhere you see a ";" bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.
Third: Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like this:
The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is "/" and my domain is ".freerainbowtables.com" mine looks like this:
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!
A researcher says the Pentagon exposed huge amounts of web-monitoring data in a security failure.
Anyone with a free Amazon Web Servicesaccount could have looked at the hoard of information stored in the cloud by the U.S. Defense Department, according to Chris Vickery, a researcher at cybersecurity firm UpGuard who discovered the exposure.
Amazon Web Services is a cloud platform that individuals, businesses and the government use for things like storing data and boosting computing power. Amazon said on its website it is best practice to restrict access to information stored in the cloud to "people that absolutely need it."
The military databases hold at least 1.8 billion internet posts scraped from social media, news sites, forums and other publicly available websites, Vickery told CNN Tech. The posts are in multiple languages and originate from countries across the world, including the United States.
The information, which Vickery said goes back as far back as 2009, is held by U.S. Central Command (Centcom) and U.S. Pacific Command (Pacom). There's no indication that malicious attackers accessed the databases.The Defense Department secured the data by October 1 after Vickery alerted officials of the problem in mid-September, he said.
The information that was exposed had been publicly available -- it was not, for instance, sensitive user data. Still, the failure to fully secure the data raises concerns about government cybersecurity practices.
"[It's] a pretty serious leak when you're talking about intelligence information being stored in an Amazon cloud service and not properly safeguarded," said Timothy Edgar, a former White House official in the Obama administration and former U.S. intelligence official.
Edgar said he frequently questioned the security and implementation of cloud technology while working in intelligence. "That's exactly what we were worried about," he said.
Cloud computing allows a large organization like a government agency or business to readily access information stored on remote servers from far-flung locations. It is increasingly how data is stored.
The Defense Department confirmed the exposure in an email to CNN Tech.
"We determined that the data was accessed via unauthorized means by employing methods to circumvent security protocols," said Maj. Josh Jacques, a spokesperson for U.S. Central Command. "Once alerted to the unauthorized access, Centcom implemented additional security measures to prevent unauthorized access."
How the data was discovered
Amazon(AMZN, Tech30) servers where data is stored, called S3 buckets, are private by default. Private means only authorized users can access them.For one to be made more widely accessible, someone would have to configure it to be available to all Amazon Web Services users, but users would need to know or find the name of the bucket in order to access it.
By searching specific keywords, Vickery identifies information that companies and organizations inadvertently expose. In this case, he looked for buckets containing the word "com."
Three S3 buckets were configured to allow anyone with an Amazon Web Services account to access them. They were labeled "centcom-backup," "centcom-archive" and "pacom-archive," Vickery said.
Last week, Amazon introduced new S3 security features, including displaying an indicator next to any bucket that is publicly accessible.
This is not the first exposure of data Vickery has discovered. He previously found major leaks from Verizon and a Republican analytics firm. Both firms closed the security holes once alerted to the issue.
"The overall goal is to make people aware that data breaches and companies exposing data haphazardly is a huge, epidemic-sized problem," Vickery said. "If something of this size and importance suffers from the same problem, we need to start taking it a lot more seriously."
This isn't the first time Centcom experienced an online security failure. In 2015, hackers took over the agency's Twitter account.
What's inside
The data that was exposed includes information from Twitter, Facebook and other public websites.
The posts originate from many countries and are written in different languages, with an emphasis on Arabic, Farsi, and other Central and South Asian dialects spoken in Afghanistan and Pakistan, according to Vickery. Although the content goes back eight years, the uploads appear to have begun in 2013 and were ongoing when Vickery found the data.
Vickery analyzed a small fraction of it. Posts included comments from YouTube, Twitter and Facebook; local U.S. websites that focus on sports and guns; scam alert websites; and forums containing offensive content.
UpGuard, Vickery's firm, shared some English-language posts with CNN Tech.
Topics included: American history, President Trump, former presidential candidate Hillary Clinton, "killer clowns," Russia, former President Obama, Russian president Vladimir Putin, American pop stars, and the Pope.
Inside one Centcom data bucket is a folder labeled Outpost. Vickery's analysis indicates the folder contains information from a third-party contractor called Vendor X.This company no longer has an active presence online.
According to the LinkedIn profile of Erik Kjell Berg, former vice president of product at Vendor X, Outpost is "a multilingual social analytics platform designed to positively influence change in high-risk youth in unstable regions of the world, built exclusively for the Dept. of Defense."
Berg and other former executives for Vendor X did not respond to requests for comment.
Jacques, the spokesperson for U.S. Central Command, said Centcom has used commercial off-the-shelf and web-based programs for information gathering."The information we gather is widely available to anyone who conducts similar online activities," he said.
What the data is used for
The purpose of the data collection effort is not clear.
Jacques said it is "used for measurement and engagement activities of our online programs on public sites." He declined to elaborate, although he said it "is not collected nor processed for any intelligence purposes."
Edgar worked in the Office of the Director of National Intelligence under President George W. Bush and later advised President Obama on privacy and cybersecurity issues.
He said the rules around open-source information gathering by government agencies remain at least partly unclear.
"There have been continuing question marks about the role of collecting publicly available information from social media," he said. "Government intelligence officers say we shouldn't inhibit ourselves when we're talking about collecting information about potential terrorists. If the rules allow it, we should do it. But that kind of approach can get problematic because it doesn't offer a whole lot of guidance."
Another expert, Andrea Little Limbago, chief social scientist at cybersecurity firmEndgame, said it's not uncommon for the Pentagon to collect vast sums of internet data.
"At times, you do need to cast a wide net, and then do the analytics to narrow down what you're trying to find," said Limbago, a former analyst with the Defense Department between 2007 and 2011.
She said she would be surprised if the Defense Department was targeting U.S. individuals without the proper authorization.
We’ve all gone a bit giddy over Nvidia’s new 900-series graphics cards. The GTX 980 and 970 are both massive overclockers—the 970 overclocked can run almost as fast as the reference 980—and those overclock boosts help separate them from the still-fast AMD R9 cards and Nvidia GTX 700 series. But you don’t need a new graphics card to be able to indulge in a little GPU tweakery. If your card is a year or two (or three) old, overclocking is the best way to squeeze a little more life (and higher graphics settings) out of it without spending any money.
Years ago, eager overclockers did genuinely run the risk of cooking their chips. Overclocking wasn't the most user-friendly process. But now times have changed. There are so many safeguards in place in your silicon that you’d have to really try to brick your hardware while doing some standard overclocking. There is still a little risk to overclocking, however: depending on which aftermarket vendor made your card, you may void your warranty. If anything goes wrong, you'll probably just crash your machine and need to restart; you're unlikely to do serious damage to your graphics card unless your overclock keeps the card at dangerous temperatures for long periods of time.
Every GPU is different, and some cards are champion overclockers. I was able to break the 1.5GHz barrier with my GTX 970 G1 Gaming edition, partly because Gigabyte specially check their overclocking card’s chips to make sure they’re the ones with the most headroom. I was able to get mighty close to 1.5GHz with my reference GTX 980 too, but the extra cooling of the Gigabyte card meant my GTX 970 also runs an awful lot cooler.
Temperature is something to think about before you start tweaking your GPU. If you’ve got an AMD Radeon R9 290X with a stock cooler then your card is likely to be running at some 93ºC under load already. You’re not going to get anywhere overclocking that beastly GPU.
If you're stuck with a bad cooler, you can pick up third-party GPU coolers to fit yourself, though it may be time for a GPU upgrade. Arctic do some impressive aftermarket coolers for the homebrew crowd. Using their Accelero Xtreme IV I was able to run my reference R9 290X at just 66ºC compared to the 93ºC it was running at with the stock cooler.
Once your card is fit for overclocking—and if you have an aftermarket card from Asus, Gigabyte, Sapphire, EVGA, or another vendor, it's probably raring to go—it's time to dig into some overclocking software.
As I said before, there are certain inherent risks to overclocking your GPU, so proceed with a level of caution befitting tweaking an expensive bit of electronics. That said, in all my years breaking hardware, it’s never been down to overenthusiastically twisting the nuts off my graphics cards…
The first thing you want to do is know where you’re starting from. As a control method it’s worth getting an accurate measure of your card’s current performance. To do so, I recommend downloading some free benchmarking and analytics software.
First off, grab the Heaven 4.0 benchmark. That will give you a platform-agnostic take on your GPU’s performance. It also runs happily in a window on the desktop, which is immensely handy, and will stress your card to make sure it’s all stable.
My personal favourite GPU tweaking tool for Nvidia is EVGA’s PrecisionX software. You’ll need to create a free account to download it from their site, but there are alternatives, such as MSI's Afterburner, if you’re not comfortable with that. PrecisionX also has a handy hardware monitoring window you can pull out which gives you a great bead on how much GPU is being used and the temperature of your card.
With AMD cards, you don't need to download any special software. You can use the Overdrive feature in the Performance tab of the Catalyst Control Centre. Overclocking with Catalyst is a similar basic process to the one I’m going to outline with the EVGA tool, and AMD's graphical interface makes overclocking extremely user friendly.
Once downloaded and installed, boot up PrecisionX to pull in the monitoring data from your graphics card.
Then run Heaven 4.0 in fullscreen at your native res and the highest settings with 4x AA to really push the GPU. You can run the benchmark by pressing F9.
Once that’s done, note down the minimum and average frame rates, quit the application and then note down the maximum frequency your GPU clocked to and the maximum temperature too.
This gives you your baseline performance.
Step 2: Go easy
To get the most out of your graphics card, your best bet is to adjust both the memory clocks as well as the GPU clockspeed. PrecisionX will allow you to do both, but from the outset you want to raise the power limits to 100% to allow full access to the GPU’s power.
Before you start tweaking, boot up Heaven again, but this time run it in a window on your desktop so you can see the looping demo as well as have access to the overclocking controls and the hardware monitor.
Now you can start the overclocking.
Starting with the memory, shift the slider to the right in small, 5-10MHz increments. This will allow you to hopefully see initial instabilities in the VRAM before you fully crash the machine. Moving up slowly like this will give you the best chance of avoiding frying your card too.
After every 10MHz step carefully check the Heaven window for artefacts. You’ll know when your memory is starting to fail as you’ll notice large blocks of solid colours or stars appear on-screen.
When you see those happen, dial back the settings a couple of notches and check the Heaven window again. Keep going backwards until you no longer see the signs of memory strain and you’ve found the limits of your video memory.
Now take a note of the frequency and drop it back down to the default memory clockspeed again.
Step 3: Chip clocking time!
Now we can start overclocking the GPU itself. You’re unlikely to be able to get as much extra speed out of the GPU as you were able to with the memory, but you’re also likely to get a bigger performance boost from tweaking the actual chip than the VRAM.
Follow the exact same method with the GPU slider as with the memory—move upwards in small increments until you start to see some instability in the Heaven window.
This time, though, you are looking for different artifacts in the benchmark display. Instead of stars or blocks of colour you need to keep an eye out for random, multi-coloured pixel-sized dots around the screen. GPU instability might also appear in the form of coloured flashes on-screen. These are the sure signs that your graphics chip is suffering.
As well as artifacts, it’s worth keeping an eye out for the temperature of your GPU in the hardware monitor window. You really want to make sure you can keep your temperature below 90ºC, otherwise you’re likely to start to see throttling, or severely shorten the life of your beloved graphics card. I'd recommend trying to keep the graphics temperature hovering in the 70-79ºC zone.
Again, when you start to see GPU artifacts, drop the GPU clock back until the Heaven window runs normally again. This then is the maximum frequency you’ll be able to achieve with this basic level of overclocking.
If you're using AMD's Catalyst Control Center, follow the same process as above. The interface you're using will look slightly different. Use the memory clock settings slider to adjust the memory speed, and the GPU clock settings box to slowly tick up the GPU speed. Remember, as mentioned above, you'll initially want to crank your power limit settings as high as they can go.
Step 4: Combination therapy
Once you’ve found the limits of both your chip and the video memory attached to it you can combine the two clockspeeds. In your overclocking application push the GPU and memory clock sliders up to your discovered maximums, hit apply and check your Heaven window.
Don’t be disappointed here if your machine crashes or you discover more artifacting in your test window. Pushing up the speeds of both memory and GPU at the same time puts more stress on the card as a whole.
The type of artifacting, as described above, should tell you which component needs dialing back. If you're not sure what the problem is, just set your overclock to 10MHz lower on both memory and GPU when you restart. Keep dropping your overclock by small increments until you get a stable display from Heaven.
Now, close down the Heaven window and restart the application in fullscreen at your monitor’s native resolution. Once the application is running hit F9 and it will start the benchmarking run again. This will both allow you to test if your overclock is stable and give you an immediate measure of just how much extra performance you’ve got out of your graphics card.
Step 5: Stress test
If your PC manages to get through a benchmarking run of Heaven that’s great, but it’s probably worth leaving the software open in fullscreen, running through the loop, for another twenty minutes or so.
That will allow you to really stress test your overclock and make sure it wont fall over in the middle of a tough gaming session. You can also use GPU intensive games, like Metro: Last Light with its tessellated character models, to stress your overclock in a real gaming environment. This is also a good way to see how hot your graphics card will get after extended play time.
Should your GPU not make it through the stress test—whether your whole machine crashes or the display adapter stops working—then simply reboot your system and set the overclock slightly lower again and run through the tests.
This patient, methodical approach should allow you to minimise the stress on your components and ensure you are as unlikely as possible to irrevocably brick your expensive hardware.
Once you’re completely happy with your overclock, it’s time to set it in stone. Your chosen overclocking application will allow you the option to set the new GPU and memory frequencies as Windows starts.
On PrecisionX it’s a simple checkbox and you’re good to go.
One final thing to remember: don't be too down-hearted if you don’t manage to get a huge boost in performance out of your now-overclocked graphics card. You’re never going to get an R9 270X running like a GTX Titan, but what you will be doing is improving the smoothness of your gaming experience.
Even a few extra FPS in a games can make the difference between unplayable and playable, or the ability to turn on that extra bit of post-processing.
You should also, hopefully, be closing the delta between the minimum frame rate and the average frame rate. This is the real key to smooth gaming.
And that’s it—you’re now an overclocker!
What I’ve outlined here is the most basic form of overclocking—if you want to go further you can replace the cooler on your graphics card or start indulging in the arcane art of voltage tweaking.
I’ve chosen to avoid that in this basic guide, as messing with the power going into your GPU raises the chances of something nasty happening to your hardware.
And if a bit of overclocking just convinces you that it's time for a newer and better card, check out or list of the best graphics cards currently available.