What Is SSH?

Consider the following situation. You are at your friend’s place with your laptop and you want to access your home computer to do something. May be you want to start a download or you want to run a program right away. What would you do in this situation? Will you go all the way to your house just to start a download? You already have a laptop at your disposal, so you should be able to use it somehow. You can just connect to your home computer through internet. But what if someone else hacks you while you do that? This is where SSH comes in.   Continue reading “What Is SSH?”

Automatic Downloading

Let’s say you are surfing the web and you come across a cool website with a great collection of pictures. Some of them are located on that page and many more can be reached through various links on that page. There are hundreds of pictures and you want to download all of them. How would you do it? Would you click and save each image separately? Let’s say you really like the design of that site and you want to download the whole thing along with the source code. How would you do it automatically without wasting time?   Continue reading “Automatic Downloading”

The Art Of Password Cracking

The elusive art of password-cracking has enticed many a mortal! Everyone has, at one point or the other, contemplated cracking someone’s password to get access to their private information. Whenever people hear the term ‘hacking’, the first thing that comes to their mind is ‘cracking passwords’. A lot of people think that password-cracking is the very definition of hacking. Some people think that password-cracking is the same as stealthily looking at someone type their password. I hate to burst your bubble, but that’s not password-cracking. What exactly is it then? How do we do it?   Continue reading “The Art Of Password Cracking”

The Computer Infections

Do you remember getting incensed because something slowed down your computer? You don’t remember what you did, but your computer is now slow, buggy and some of the things are not working the way they are supposed to. Sounds familiar? A layman would say “your computer has been infected with a virus”. Is that right? Sure, your computer has been infected. But not everything that infects is a virus. Just like how we have racists for races, we have softists for softwares! After reading this post, you will not be one of those. You would have come across terms like malware, spyware, worms etc. Now what exactly are these things?   Continue reading “The Computer Infections”

Hack Me Once, Shame On You. Hack Me Twice, Shame On Me.

We hear the word ‘hacking’ all the time. Most people think that hacking is something smart, cool and wrong. But what exactly is hacking? Is it just smart coders breaking into websites? The hacking culture is great and it inspires creativity, but why limit it to just a few people? People actually do it everyday in different ways and different capacities. It is in our inherent nature to get around the rules if we don’t get something we want. There’s a hacker in every one of us, we just don’t know it yet.   Continue reading “Hack Me Once, Shame On You. Hack Me Twice, Shame On Me.”

The Linkedin Debacle

If you are following tech news, you might very well be aware of the fact that there was a security leak in Linkedin recently. A Russian hacker leaked around 6.5 million Linkedin passwords along with 1.5 million passwords from a dating website (possibly eHarmony) to get the total to around 8 million. If you haven’t changed your Linkedin password yet, it’s about time! Now how on earth could this have happened? What exactly went wrong?   Continue reading “The Linkedin Debacle”

Exposing The SSL Encryption

In my previous blog post, I couldn’t discuss much about SSL encryption. I didn’t want to deviate from the main topic. So here, I discuss about the loopholes in the protocol. I have tried to simplify it as much as possible. SSL stands for Secure Sockets Layer and it is a protocol for secure communication over the internet. It just provides enough security to keep attacks at bay, but if someone reeeeally wants to get in, SSL will not be able to stop the attack. Here’s why:   Continue reading “Exposing The SSL Encryption”

Deconstructing The Geek Talk In The Movie ‘The Social Network’

Recently, I was watching a random Youtube video and I stumbled across a video which showed a scene from the movie ‘The Social Network’. This is a conversation between Mark Zuckerberg and Eduardo Saverin. In this scene, Zuck is interviewing candidates for the internship job in California for his company. It goes something like this:   Continue reading “Deconstructing The Geek Talk In The Movie ‘The Social Network’”