Disqus for Cyber Fort

Thursday, 31 October 2013

Top 10 Proxy WebSites To Unblock Any Site

1 Comment
If you have a slow connection to a certain website, or can’t access it at all because of the restriction of your ISP, workplace or school, or simply desired to protect yourself online by hiding your private information, then an online proxy website will help you.
With the assistance of an online proxy service, you do not access your target website( e.g. Facebook ) directly, you make a request, the web proxy fetch the web page( and encrypt its content, remove scripts and advertisements ), and send it back to your browser. This makes it possible to unblock any banned site, or surf any site anonymously without leaving your footprint.
image credit www.techroadies.com
While surfing online, sometimes we come across websites which can’t be accessed due to our location or IP restrictions. Have you ever noticed this type of problem while browsing websites? This happens usually because the owner of website restricts access of website to only specific IP addresses. Sometimes they also block IP ranges of whole country so that no one from that country can access their website or content.  The other reason can be that your internet connection provider restricts access to specific websites.Similarly  most of the USA based websites are not available in other countries.
In order to access blocked websites, you will need a proxy server that automatically randomize your IP address and will assign a different IP address of another country to you. So, if your IP address is of USA, then you will be able to access websites that are blocked in your country and their access is only limited to US users. For example, YouTube is blocked in Pakistan and now only option for opening YouTube in Pakistan is with proxy. There are also some Google chrome extensions that can help you open YouTube and other blocked websites with the help of proxy. Most of the time in colleges, universities and offices etc. internet access is restricted to only specific websites. So, in order to unblock other websites, you can use proxy websites or softwares.
If you do not want to go through installation of Proxy softwares then anonymous browsing with proxy websites is the best option for you. So, in this article I am sharing a list of 5 best free Proxy websites of 2013 that will let you surf internet anonymously and securely.

1. 000FreeProxy

2. kkProxy

3. MyAddr

4. RX Proxy


5. AnonyMouse


6. Zend2


7. NewIPNow


8. KProxy


9. Mega Proxy


10. AD Free Proxy


all the image credit http://myappmag.com







Read More

Tuesday, 29 October 2013

Top 10 Most Popular Android Apps

Be The First To Comment

There are more than 700,000 apps in the Google Play store. You don't need every one of them, but you do need to download these 10 must-have apps right now.


image credit  http://www.pcmag.com

When I first created my Must-Have Android list two years ago, the Android Market was still playing catch up to the Apple's App Store. Now, a renamed and revamped, Google Play offers more apps than Apple. Developers are increasingly launching new apps on Android first and then porting them to iPhone. Clearly, a lot has changed. So has my list of essential applications.
A few disclaimers before we get into the list. First, these are *essential* downloads. If you want the 10 Best Android Apps, we have a list for that as well. These are my picks for the *first* 10 apps you should download. And yes, I had to leave some really great apps off the list.
I talked to lot of the guys in labs about these picks, but I should be clear my opinions are sometimes different from the analysts. I would have probably made SnapSeed an Editors' Choice, but Jeff Wilson has some reservations. This is my personal list so it shows some of my idiosyncrasies.
For example, when I think of "essential apps," I don't think games. Angry Birds and Temple Run 2 are fantastic time killers, but you already know that. They will get a million downloads whether I list them here or not.
I've also chosen not to include what I consider no-brainer Google apps, such as Google Maps. As far as I'm concerned, Google Maps is a gimme. If you are an Android user, you should already have it installed. And, this goes for the native Gmail client as well. Google+ and Google Music are neat apps, but they have a way to go before I would call them essential. And while I love the new Google Chrome Beta for Android, it isn't available on enough devices for me to recommend. that are as follows:- 
1. Twilight
twlightTwilight continues to solidify itself as one of your top apps to download.

2. Taskbar – Windows 8 Style

taskbar windows 8 style

Great application for those looking to replicate the Windows look on their device.

3. Floating Touch

Floating touch provides quick access to settings options on your device including turning on/off WiFi and adjusting the brightness.
4. Pimp Your Screen with Widgets

Pimp Your screen helps you customize your device.
5. Awoken – Lucid Dreaming Tool

If you’ve ever desired to learn about Lucid dreaming, make sure you check out Awoken.

6. Locket

Locket allows you to earn money simply from swiping your lock screen.

7. dialapp: context aware dialer

Dialapp is a solid dialer replacement that utilizes a new approach in managing your call history.

8. PowerLine
Powerline is a great app that provides a slick visual overview of your device.
9. Sparky Lock Screen

Simple and unique lock screen options make Sparky stand out.10. Unit Converter UltimateThis is my new go-to application when needing to convert units.pls don't miss to see  How to Unlock Android Pattern Lock And Password Lock


Read More

Sunday, 27 October 2013

How to Unlock Android Pattern Lock And Password Lock

1 Comment


Android is most used OS in the cell phone today’s everybody use android  phones now days. this is a android is LINUX based operating system provide by Google. android phones is very easy to access there is lot of companies who sell android phones. Biggest seller of android is Samsung and HTC and many other who made android based phones. today every one wants higher configuration phones so there is lot of phones today i like s3 and Samsung note these phones are very fast and good to use but little expensive for everyone. in today there is lot of  apps for android  available for Google play store you can download free of coast of buy some apps very easily . How To Unlock an Android Pattern  droid  phones is easy to accessible and you can play every thing in  this phones there is LAKH’S  of  app for android  is available in the play store there is many inbuilt apps available for most android p hones .there is many ways to give security to your phones with some apps you can use inbuilt unlock pattern or  unlock codes  for easy security you can also download some  unlock codes  app from play store easily.. there is lot of games available for phones the most used app is TEMPLE RUN 2 and many other  these are free of cost apps available for everyone in the play store app in the  android  phones.  

Steps On How to Unlock Android Pattern Lock Or Password


To get your pattern lock or password of your android device unlocked please follow the instructions well and am sure you will get what you are going to get your device unlocked without problem.
  1. First you will switch of your Android device.
  2. After switching of your android device, press your up volume button and Press It down.
  3. Now press the power button and hold it too along with the volume up button.
  4. It will start a secret terminal interface.
  5. Then press to use home button for scroll up and down.
  6. Then you will get to the choose option DELETE ALL USER DATA.
  7. Select the option and wait
  8. Your device will take some time but after it will restart and you will find out your android device has been unlocked.

Conclusion

These above method will help you unlock your android phone which have been lock by password or even the popular pattern lock easily but NOTE by performing this method you will loose all your contacts and everything on your phone, everything will be back to default as you bought the android device. I hope you understand how to unlock Android Pattern lock and password easily.

Read More

Some of Internet Ethics which Govern the Internet Usage

Be The First To Comment
Some of the internet ethics which govern the internet usage and you should always follow are:



1. You should never use bad language on the internet while using any service like email, chatting, blogging or anything else like this.

2. Email and instant messaging is meant to chat and talk with the friend and relatives. It is not meant to talk with strangers. You should avoid talking with strangers as it can be a great risk. Avoid forwarding emails to unknown persons.

3. You should not try to be someone else or we can say that you should not try to take someone else’s identity as it can be a crime. Do not try to fool others by giving a wrong identity. You should not break copyrights. You can listen or watch songs, can watch movies etc on the internet but do not download them.

4. Do not steal anyone’s information. It is a crime under cyber laws. Do not hack anyone else’s account.

5. It can lead to the loss of important information to the user of the account and the second thing is that it is a crime too.

6. You should respect copyright laws and all the other cyber laws. Keeping all that in mind, you should use internet and computer. If you need to gain access to a file which is not your own, then first seek permission from the owner of that file and only after that make use of that file.

7. You should avoid displaying pornography on the internet. This is the major and the biggest concern today. You should avoid being obscene on the internet.

8. You should respect obscenity laws. Avoid sending viruses and spam emails to the people. This is also one of the major concerns for the people using internet today.

9. All the above mentioned norms should be strictly followed. Respect the cyber laws and keep them in mind.

10. Respect privacy of others and as you want others to respect yours. Internet is an open medium of knowledge for the people. Use it properly and in a healthy way.

Read More

Saturday, 26 October 2013

Top 10 Technology In This Months

Be The First To Comment
Science-fiction technology often seems too fantastical to be real, like gadgets from a future so distant we will never see them fully realized. With tech advancing faster than ever before, the distance between the fictional future and the present is growing smaller. In some ways, the future is already here with these latest inventions that seem to be pulled out from the pages of a sci-fi novel.
The U.S. Army is building its own Iron Man suit to protect soldiers in the field. While it won't have the flight and weapon capabilities of the fictional armor, the Tactical Assault Light Operator Suit (TALOS) will be bullet-proof and have hydraulic limbs to aid in the soldier's speed and movement. Find out more about how TALOS can heighten its wearer's sense of sight and measure important vital signs.
Read More

Improve Your Laptop Wi-Fi Signals

Be The First To Comment
A wireless router's signals can decrease for many reasons--a physical obstruction of the router, bad router placement or even out-of-date router drivers. Upgrading to a higher-speed Internet service won't help, since the problem is caused by the router's signals, not a faulty Internet service. To improve Internet speed, eliminate anything that could obstruct its ability to send out signals and add upgrades to the router.


improve laptop wi fi singnals

 things you'll need
1) Antenna - ready network adaptar 
2)Wireless repetor
3)Internet access

Instructions


    • 1
      Move the wireless router to the center of a room. Put it on a nonmetallic table or desk if possible--the floor can weaken the signals. Avoid putting it against anything that can obstruct the wireless signals, including walls, metal objects, metal desks or file cabinets.
    • 2
      Remove wireless electronics that use the 2.4 GHz frequency. This can interfere with wireless signals. Instead, purchase cordless phones or wireless electronics with a 5.8 GHz frequency.
    • 3
      Check whether the wireless router and network adapter are from the same vendor. Routers and adapters do not work as well if they are from different vendors, reducing Internet speed. Purchase a new network adapter if it is not the same brand as the wireless router.
    • 4
      Purchase a network adapter with an antenna. Antennas are installed in place of the network adapter in the computer.
    • 5
      Purchase a wireless repeater. Place the repeater halfway between the router and the computer to increase the strength of the router's signals.
    • 6
      Visit the websites for the wireless router and network adapter. Check whether any updates are available for the drivers that were installed after the wireless router and network adapter installation. If there are, download and install them.

Read More

How Biometrics Works (a complete tutorial of Biometrics)

1 Comment

Introduction to How Biometrics Works

Imagine you're James Bond, and you have to get into a secret laboratory to disarm a deadly biological weapon and save the world. But first, you have to get past the security system. It requires more than just a key or a password -- you need to have the villain's irises, his voice and the shape of his hand to get inside.

Vein scanning is one form of 
   biometric identification.
Image courtesy Hitachi Engineering Co.
You might also encounter this scenario, minus the deadly biological weapon, during an average day on the job. Airports, hospitals, hotels, grocery stores and even Disney theme parks increasingly use biometrics -- technology that identifies you based on your physical or behavioral traits -- for added security.
In this article, you'll learn about biometric systems that use handwriting, hand geometry, voiceprints, iris structure and vein structure. You'll also learn why more businesses and governments use the technology and whether Q's fake contact lenses, recorded voice and silicone hand could really get James Bond into the lab (and let him save the world).
You take basic security precautions every day -- you use a key to get into your house and log on to your computer with a username and password. You've probably also experienced the panic that comes with misplaced keys and forgotten passwords. It isn't just that you can't get what you need -- if you lose your keys or jot your password on a piece of paper, someone else can find them and use them as though they were you.
Instead of using something you have (like a key) or something you know (like a password), biometrics uses who you are to identify you. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords.
Biometric systems can seem complicated, but they all use the same three steps:

Biometrics uses unique features, like the iris of your eye, to identify you.
Photo courtesy Iridian Technologies
  • Enrollment: The first time you use a biometric system, it records basic information about 
  • you, like your name or an identification number. It then captures an image or recording of your specific trait.
  • Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a  smart card that you carry with you.
  • Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.

This laptop features a fingerprint scanner, bringing biometric security to the home.
Image courtesy Consumer Guide Products
Systems also use the same three components:
  • sensor that detects the characteristic being used for identification
  • computer that reads and stores the information
  • A Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons
Biometric security systems, like the fingerprint scanner available on the IBM ThinkPad T43 (right), is becoming more common for home use. You can read other HowStuffWorks articles to learn about face recognition and fingerprint scanning.
Next, we'll examine how biometrics provides security using other traits, starting with handwriting.

Handwriting (digital signature)

This Tablet PC has a signature verification system.
Photo courtesy Softpro

At first glance, using handwriting to identify people might not seem like a good idea. After all, many people can learn to copy other people's handwriting with a little time and practice. It seems like it would be easy to get a copy of someone's signature or the required password and learn to forge it.

But biometric systems don't just look at how you shape each letter; they analyze the act of writing. They examine the pressure you use and the speed and rhythm with which you write. They also record the sequence in which you form letters, like whether you add dots and crosses as you go or after you finish the word.
Unlike the simple shapes of the letters, these traits are very difficult to forge. Even if someone else got a copy of your signature and traced it, the system probably wouldn't accept their forgery.
A handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.

A hand geometry scanner
Photo courtesy Ingersoll-Rand

Hand and Finger Geometry

People's hands and fingers are unique -- but not as unique as other traits, like fingerprints or irises. That's why businesses and schools, rather than high-security facilities, typically use hand and finger geometry readers to authenticate users, not to identify them. Disney theme parks, for example, use finger geometry readers to grant ticket holders admittance to different parts of the park. Some businesses use hand geometry readers in place of timecards.
Systems that measure hand and finger geometry use a digital camera and light. To use one, you simply place your hand on a flat surface, aligning your fingers against several pegs to ensure an accurate reading. Then, a camera takes one or more pictures of your hand and the shadow it casts. It uses this information to determine the length, width, thickness and curvature of your hand or fingers. It translates that information into a numerical template.
Hand and finger geometry systems have a few strengths and weaknesses. Since hands and fingers are less distinctive than fingerprints or irises, some people are less likely to feel that the system invades their privacy. However, many people's hands change over time due to injury, changes in weight or arthritis. Some systems update the data to reflect minor changes from day to day.
For higher-security applications, biometric systems use more unique characteristics, like voices. We'll look at those next.

Speaker recognition systems use spectrograms to represent human voices.
Photo courtesy Richard Horne

Voiceprints

Your voice is unique because of the shape of your vocal cavities and the way you move your mouth when you speak. To enroll in a voiceprint system, you either say the exact words or phrases that it requires, or you give an extended sample of your speech so that the computer can identify you no matter which words you say.
When people think of voiceprints, they often think of the wave pattern they would see on anoscilloscope. But the data used in a voiceprint is a sound spectrogram, not a wave form. A spectrogram is basically a graph that shows a sound's frequency on the vertical axis and time on the horizontal axis. Different speech sounds create different shapes within the graph. Spectrograms also use colors or shades of grey to represent the acoustical qualities of sound. This tutorial has a lot more information on spectrograms and how to read them.
Some companies use voiceprint recognition so that people can gain access to information or give authorization without being physically present. Instead of stepping up to an iris scanner or hand geometry reader, someone can give authorization by making a phone call. Unfortunately, people can bypass some systems, particularly those that work by phone, with a simple recording of an authorized person's password. That's why some systems use several randomly-chosen voice passwords or use general voiceprints instead of prints for specific words. Others use technology that detects the artifacts created in recording and playback.
Other systems are more difficult to bypass. We'll look at some of those next.

Eye anatomy
Photo courtesy Iridian Technologies

Iris Scanning

Iris scanning can seem very futuristic, but at the heart of the system is a simple CCD digital camera. It uses both visible and near-infrared light to take a clear, high-contrast picture of a person's iris. With near-infrared light, a person's pupil is very black, making it easy for the computer to isolate the pupil and iris.
When you look into an iris scanner, either the camera focuses automatically or you use a mirror or audible feedback from the system to make sure that you are positioned correctly. Usually, your eye is 3 to 10 inches from the camera. When the camera takes a picture, the computer locates:
  • The center of the pupil
  • The edge of the pupil
  • The edge of the iris
  • The eyelids and eyelashes
It then analyzes the patterns in the iris and translates them into a code.

An iris scanner
Photo courtesy Iridian Technologies
Iris scanners are becoming more common in high-security applications because people's eyes are so unique (the chance of mistaking one iris code for another is 1 in 10 to the 78th power. They also allow more than 200 points of reference for comparison, as opposed to 60 or 70 points in fingerprints.
The iris is a visible but protected structure, and it does not usually change over time, making it ideal for biometric identification. Most of the time, people's eyes also remain unchanged after eye surgery, and blind people can use iris scanners as long as their eyes have irises. Eyeglasses and contact lenses typically do not interfere or cause inaccurate readings.

Vein scanners use near-infrared light to reveal the patterns in a person's veins.

Vein Geometry

As with irises and fingerprints, a person's veins are completely unique. Twins don't have identical veins, and a person's veins differ between their left and right sides. Many veins are not visible through the skin, making them extremely difficult to counterfeit or tamper with. Their shape also changes very little as a person ages.
To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner. A camera takes a digital picture using near-infrared light. The hemoglobin in your blood absorbs the light, so veins appear black in the picture. As with all the other biometric types, the software creates a reference template based on the shape and location of the vein structure.
Scanners that analyze vein geometry are completely different from vein scanning tests that happen in hospitals. Vein scans for medical purposes usually use radioactive particles. Biometric security scans, however, just use light that is similar to the light that comes from aremote control. NASA has lots more information on taking pictures with infrared light.
Next, we'll look at some of the concerns about biometric methods.

Privacy and Other Concerns

Some people object to biometrics for cultural or religious reasons. Others imagine a world in which cameras identify and track them as they walk down the street, following their activities and buying patterns without their consent. They wonder whether companies will sell biometric data the way they sell e-mail addresses and phone numbers. People may also wonder whether a huge database will exist somewhere that contains vital information about everyone in the world, and whether that information would be safe there.
At this point, however, biometric systems don't have the capability to store and catalog information about everyone in the world. Most store a minimal amount of information about a relatively small number of users. They don't generally store a recording or real-life representation of a person's traits -- they convert the data into a code. Most systems also work in only in the one specific place where they're located, like an office building or hospital. The information in one system isn't necessarily compatible with others, although several organizations are trying to standardize biometric data.
In addition to the potential for invasions of privacy, critics raise several concerns about biometrics, such as:
  • Over reliance: The perception that biometric systems are foolproof might lead people to forget about daily, common-sense security practices and to protect the system's data.
  • Accessibility: Some systems can't be adapted for certain populations, like elderly people or people with disabilities.
  • Interoperability: In emergency situations, agencies using different systems may need to share data, and delays can result if the systems can't communicate with each other.


Sources

  • Bromba, Dr. Manfred. "Biometrics FAQ." http://www.bromba.com/faq/biofaqe.htm#Biometrie
  • Brown, Greg. "Connecting the Dots." Latin Trade, April 2005. http://www.findarticles.com/p/articles/mi_m0BEK/is_4_13/ai_n13798070
  • FindBiometrics http://www.findbiometrics.com/
  • Homeland Security: Biometrics. GlobalSecurity.org http://www.globalsecurity.org/security/systems/biometrics.htm
  • Mainguet, Jean-François. "Biometrics." 2004. http://perso.wanadoo.fr/fingerchip/biometrics/biometrics.htm
  • Ross, A., S. Prabhakar and A. Jain. "An Overview of Biometrics." http://biometrics.cse.msu.edu/info.html
  • Resources Related to Biometrics and People with Disabilities http://www.icdri.org/biometrics/biometrics.htm
  • Thalheim, L., J. Krissler and P. Ziegler. "Body Check." WIBU Systems, November 2002. http://www.heise.de/ct/english/02/11/114


Read More