ramachandra chowdduru

45 Flips | 6 Magazines | 75 Likes | 1 Following | @ramachandra5 | Keep up with ramachandra chowdduru on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “ramachandra chowdduru”

Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP

Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled …

Linux

Buying and selling bitcoin, explained

A quick and dirty introduction to trading the world’s most exciting cryptocurrency.<p><i>Before you jump into this overview of how to buy and sell bitcoin, check out our first article in this series,</i> <i>Bitcoin, explained</i><i>.</i><p>Mining bitcoin isn't the only way to get your hands on the stuff, you know.<p>In fact, …

Bitcoin

How To Create A Fake Identity And Stay Anonymous Online

You don't need to have evil motives for wanting to fake your identity or go incognito online; for many people, it's a matter of privacy and avoiding …

Security Training Awareness: 3 Big Myths

The once-overwhelming consensus that security awareness programs are invaluable is increasingly up for debate.<p>Organizations of all sizes continue to …

Machine-Learning and Artificial Intelligence: The Difference, and What They're For [Infographic]

By now you've heard of machine-learning (ML) and artificial intelligence (AI), but understanding these technologies can be overwhelming.<p>Today's …

Artificial Intelligence

Practical Machine Learning with R and Python – Part 3

(This article was first published on <b>R – Giga thoughts …</b>, and kindly contributed to R-bloggers)<p>In this post ‘Practical Machine Learning with R and …

It will take more than a lone vigilante to save the IoT from botnets

Like everyone else, I caught the new trailer for the next Star Wars movie on Monday and “saw raw, untamed power … and beyond that, something truly special.” I’m now spotting Lucasfilm metaphors everywhere. Since IoT is my personal and professional obsession, botnet foes like Persirai and Mirai and …

Building Distributed Systems and Microservices in Go with NATS Streaming

A while ago, I have written a blog post Introducing NATS to Go Developers for using Apcera NATS as the messaging system for building distributed …

Why FireEye, Inc. Could Be a Gold Mine for Growth Investors

The cybersecurity upstart is trying to right the ship, and if it does shareholders will reap the rewards.<p>A glance at <b>FireEye</b>'s (NASDAQ:FEYE) …

Journey Across 7 Countries on the World's Newest Long-Distance Trail

Hiking this 1,200-mile-long trail along the Dinaric Alps is worth the trek.<p>The mountains have vanished in swirling mist. Deep in the highlands of Bosnia and Herzegovina, peaks roll under a wet blanket of fog. Each step is a good faith effort to believe the summit is in blind reach. My hiking …

Hiking

Our Favorite Food Trucks in Every State

A true melting pot of world cuisine, food truck operators deliver mobile eats to the people on city streets, at universities, in business parks …

dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol

dnscat2 is a DNS tunnel that WON'T make you sick and kill you!This tool is designed to create an encrypted command-and-control (C&C) channel over the …

Linux

How to Earn Money as a Bug Bounty Hunter

Are you a coder or white-hat hacker looking to make some money on the side? Bug bounty hunting might be the perfect gig for you.<p>What Is Bug Bounty …

Delete yourself from the internet with this website

If endless cyber attack scare stories, viral fake news articles, online abuse and the election of Donald Trump have given yourself the resolve to walk away from the internet, you're in luck.<p>Developers in Sweden have created a website that can help you delete your online presence with just a few …

Internet

Bugs in Popular Hacker Tools Open the Door to Striking Back

The concept of "hacking back" has drawn attention—and generated controversy—lately as geopolitics focuses increasingly on the threat of cyberwar. The …

How to Setup Local DNS Using /etc/hosts File in Linux

DNS (Domain Name System or Service) is a hierarchical decentralized naming system/service that translates domain names into IP addresses on the …

Linux

Mediterranean style diet may prevent dementia

<b>(CNN) —</b> Meals from the sunny Mediterranean have been linked to stronger bones, a healthier heart and longer life, along with a reduced risk for diabetes and high blood pressure.<p>Now you can add lowering your risk for dementia to the ever growing list of reasons to follow the Mediterranean diet or …

Holistic Medicine

Google, Amazon And Deep Instinct Deploy AI To Fight Malware

Deep Instinct co-founder and Chief Technology Officer Eli David says the day when a computer is as smart as a human, or smarter, may be a lot closer than many think.<p>AI programs, “are on an accelerating path of growth in their capabilities. In the near future, they will reach near human or …

From Botnet to Malware: A Guide to Decoding Cybersecurity Buzzwords

Where real zombies and trojan horses live.<p>Words like worm, trojan horse, and zombie may seem like the stuff of science fiction, but they're part of …

DNS Intrusion Detection in Office 365

In Office 365, we are committed to protecting our customer's data. We implement and exercise industry leading security practices to ensure that …

How to check your Linux servers for rootkits and malware

Linux is a reliable, secure choice for your data center. Even so, doing regular checks for rootkits and malware is always an advised best practice. …

Most important considerations with Malware Analysis Cheats And Tools list

<b>Static Malware Analysis</b><p>This procedure includes extraction and examination of different binary components and static behavioral inductions of an …

Cybersecurity

Darktrace's AI is now automatically responding to hacks – and stopping them

Darktrace's "digital antibodies" have stopped one Brexit-themed data protection threat: while trialling the machine-learning anti-hacking system's …

Machine Learning

Hackers Stole $800,000 From Russian ATMs With Disappearing Malware

The method was a complete mystery, and the only clues left behind were files containing a single line of English text: "Take the money, bitch."<p>It was fast and furious, and if not for the surveillance cameras that captured the heist in action, two banks in Russia would never have known what occurred …

Here’s how to tell if your web traffic travels through an NSA listening point

If you’ve ever wondered whether the National Security Agency (NSA) is monitoring your internet activity at any given moment, there’s now an app for …

Local Windows Admins Can Hijack Sessions Without Credentials

A researcher has published a method by which a local admin can hijack any other Windows sessions without the need for credentials.

Information Security

THE BLOCKCHAIN IN BANKING REPORT: The future of blockchain solutions and technologies

Nearly every global bank is experimenting with blockchain technology as they try to unleash the cost savings and operational efficiencies it promises to deliver.<p>Banks are exploring the technology in a number of ways, including through partnerships with fintechs, membership in global consortia, and …

Administrative Law

6 Hot Internet of Things (IoT) Security Technologies

Internet of Things (IoT) security breaches have been dominating the headlines lately. WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used to secretly record conversations. Trump’s advisor Kellyanne Conway believes that microwave ovens can spy on you—maybe she …

Internet of Things

Hundreds of Cisco switches vulnerable to flaw found in WikiLeaks files

The flaw was found by Cisco security researchers, despite WikiLeaks' claiming that the CIA hacking unit disclosures did not contain working …