Disqus for Cyber Fort

Showing posts with label intelligence. Show all posts
Showing posts with label intelligence. Show all posts

Sunday, 16 February 2014

Top 25 Free Educational Video Sites

7 Comments

RefSeek's guide to the 25 best online resources for finding free educational videos. With the exception of BrainPOP and Cosmeo, all listed sites offer their extensive video libraries for free and without registration.

Academic Earth
Thousands of video lectures from the world's top scholars.
academicearth.org
Big Think
Video interviews with 600+ thought leaders in a range of fields.
bigthink.com
Brightstorm
Short-form online video lessons by professional educators. Free math lessons.
brightstorm.com
CosmoLearning
Aggregator of free, online video lessons and documentaries.
cosmolearning.com
Coursera
Lectures taught by world-class professors and reinforced through interactive exercises.
coursera.org
EdX
Courses designed specifically for interactive study via the web.
edx.org
Futures Channel
High quality multimedia content ideal for use in the classroom.
thefutureschannel.com
Howcast
Professional and user-generated how-to videos.
www.howcast.com
Internet Archive
Collection of more than two-hundred thousand free historical videos, many academic.
archive.org
iTunes U
Free lectures, language lessons, audiobooks, and more accessible via Apple iTunes.
Apple iTunes - Apple iTunes Software
Khan Academy
Self-pased learning with extensive video library, interactive challenges, and assessments.
khanacademy.org
Learner.org
Professionally developed programming for K-12 classrooms.
learner.org
Math TV
Professional video lessons in mathematics. Covers basic math through calculus.
mathtv.com
MIT Open CourseWare
Lectures and course materials for students, teachers, and self-learners.
ocw.mit.edu  |  Also see: OpenCourseWare Finder
MIT Video
Guide to more than 11,000 interesting MIT videos and lectures.
video.mit.edu/
NeoK12
Aggregator of high-quality educational videos from around the Web.
www.neok12.com
ResearchChannel
3,500 videos from distinguished researchers and scholars.
youtube.com/user/ResearchChannel
PBS
Free videos from your favorite PBS programs, including NOVA and Frontline.
video.pbs.org
SchoolTube
Video sharing platform for schools featuring original content created by students.
www.schooltube.com
SchoolsWorld
Engaging, professional videos and practical resources for educator development.
www.schoolsworld.tv
SnagFilms
Library of free, full-length documentary films.
www.snagfilms.com
TeacherTube
Online aggregator of educational videos.
www.teachertube.com
TED
Fascinating presentations by the world's leading thinkers and doers.
www.ted.org
Videojug
Collection of videos from professors, professionals, coaches, teachers, and consultants.
www.videojug.com
WatchKnowLearn
Comprehensive online directory of educational videos aggregated from across the Web.
www.watchknowlearn.org
WonderHowTo
Search engine and directory of free how-to videos.
www.wonderhowto.com
Open Yale Courses
Free access to a selection of introductory Yale courses.
oyc.yale.edu
YouTube EDU
Free lectures from more than one hundred colleges and universities.
www.youtube.com/edu  |  Also see: Talks@Google
Additional sites that are not free but offer outstanding content:
BrainPOP
Provider of original, animated educational videos. Subscription required.
www.brainpop.com
Cosmeo
30,000 video segments from Discovery Education. Subscription required.
www.cosmeo.com  |  Also see: Discovery Education Streaming

general interest

Hulu
Joint venture between NBC Universal and News Corp. Features TV shows and movies.
www.hulu.com  |  Also see: PBSNational Geographic
Metacafe
Specializes in short-form original video content.
www.metacafe.com
Vimeo
Upload, share, and explore user-generated videos.
www.vimeo.com
YouTube
Hosts millions of user-generated and professional videos.
www.youtube.com
Read More

Thursday, 13 February 2014

J.A.R.V.I.S : Artificial Intelligence Assistant Operating System for Hackers

Be The First To Comment

A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them.

Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis.
With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project.
Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions. 
Project Task Completed: In the current version of Jarvis v1.0, it is capable of:
  • Answering questions asked by the administrator
  • Compile reports on any topic asked by the user.
  • Control lights by voice.
  • Basic interaction with the user.
  • Handling Facebook, Email and Social profiles of users
  • Using Twitter Account with voice control
  • Basic OS kernel is ready.
  • Can Scan targets for Hackers
  • Gathering Basic information about the target
All the above functionalities are completely controlled by voice. It has only been four months since they have started this project and have achieved a lot in this short period of time.

The team will announce the OS publicly soon after completion of phase 3, but for now Chiragh proudly shows off his creation on the J.A.R.V.I.S project website.

Read More

Top 7 Best Operating System For Hacking

Be The First To Comment


Hacking is not an art than can be mastered overnight, it requires dedication and off-course time. Have you ever thing why Hacking is possible because of “unaware developers and inappropriate programming techniques” . As a Ethical hacker i personally realize that You can never stop hackers to hack something, you can just make his task harder by putting some extra security. if you are really interested in Hacking, You need to be know Which Operating systems are used Hackers.

Today i want to say u that which is the best operating system for hacking a/c hackers .
1.  Kali Linux :-



Kali Linux is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on GitHub.
2. BackTrack 5r3 :-

The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, IWHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world.
3. BackBox Linux :-

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.
4. Samurai Web Testing Framework :-

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.
5. NodeZero Linux :- 
Best-operating-system-used-for-Hacking1
Penetration testing and security auditing requires specialist tools.The natural path leads us to collecting them all in one handy place. However how that collection is implemented can be critical to how you deploy effective and robust testing.
All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.
6.  Knoppix STD :-
STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.



7.  CAINE :-
Best-operating-system-used-for-Hacking1
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics
CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.



Read More

Thursday, 9 January 2014

Recruitments at NHDC for 42 posts

Be The First To Comment
INDIA TODAY ONLINE  NEW DELHI, JANUARY 8, 2014 | UPDATED 16:05 IST
Narmada Hydroelectric Development Corporation Ltd. (NHDC Ltd.) invites applications for recruitment for various posts that include Trainee Engineer, Junior Engineer, Supervisor and Hindi Translator. The interested and eligible candidates can apply for the post through the prescribed format before 14th February, 2014. 
Posts: 42
1.    Trainee Engineer (Civil) / (E2): 3 posts
2.    Trainee Engineer (Electrical) / (E2): 10 posts
3.    Trainee Engineer (Finance) / (E2): 5 posts
4.    Trainee Engineer (HR) / (E2): 3 posts
5.    Trainee Engineer (PR) / (E2): 1 post
6.    Junior Engineer (Electrical) / (S1): 10 posts
7.    Junior Engineer (Mechanical) / (S1): 5 posts
8.    Supervisor (IT) / (S1): 4 posts
9.    Hindi Translator/ (W6): 1 post

Eligibility Criteria: 

1.    Age Limit: Age limit for all the posts mentioned above is 30 years as on 1st February 2014.
2.    Educational Qualifications:
  •     Trainee Engineer (Civil) / (E2): The candidate should have a full time regular bachelor's degree in Engineering/ Technology/ BSc. Engineering Degree in Civil Engineering from a recognized Indian University/ Institute approved by AICTE or AMIE in Civil engineering, with at least 60% marks or equivalent grade.
  •     Trainee Engineer (Electrical) / (E2): The candidate should have a full time regular bachelor's degree in Engineering/ Technology/ BSc. Engineering Degree in Electrical Engineering from a recognized Indian University/ Institute approved by AICTE or AMIE, with at least 60% marks or equivalent grade.
  •     Trainee Engineer (Finance) / (E2): The candidate should be a graduate with CA from Institute of Chartered Accountants of India/ CWA or CMA from institute of Cost Accountants of India (formerly known as ICWA)
  •     Trainee Engineer (HR) / (E2):The candidate should have a full time regular two years post graduate degree/ Post Graduate Diploma/ Post Graduate Program in Management with specialization in Human Resource/ Human Resource Management/ Human Resource Management and Labour Relations/ Industrial Relations/ Personnel Management/ Personnel Management & Industrial Relations.
  •     Trainee Engineer (PR) / (E2): The candidate should have a two year full time regular post graduate degree/ Post graduate diploma in Communication/ Mass Communication/ Journalism from a recognized Indian University or Institute approved by AICTE/ AIME in Civil Engineering with at least 60% marks or equivalent grade.
  •     Junior Engineer (Electrical) / (S1): The candidate should have a three years diploma in Electrical Engineering from a recognized Indian University/ Institute approved by AICTE with at least 60% marks or equivalent grade.
  •     Junior Engineer (Mechanical) / (S1): The candidate should have a three years diploma in Mechanical Engineering from a recognized Indian University/ Institute approved by AICTE with at least 60% marks or equivalent grade.
  •     Supervisor (IT) / (S1): The candidate should be a graduate with DOEACC 'A' Level/ Graduate with one year diploma in Computer Application or BCA/ BSc. (Computer Science) from a recognized Indian university/ Institute with at least 60% marks or equivalent grade.
  •     Hindi Translator/ (W6): The candidate should have a Master's degree from a recognized Indian University in Hindi with English as an Elective subject at the degree level or Master's degree from a recognized Indian University in English with Hindi as an Elective subject at the degree level.
How to apply:
The candidate should send completed applications in duplicate along with application fee and the attested copies of certificates in support of experience, age, qualification, caste / PWD and others as per applicability, with a recent passport size photographs duly signed and affixed at right upper corner of application. This should be sent in an envelope super-scribing the "name of the post applied for" and Advt. No. NHDC/HR/RECT-I/2013 to "SENIOR MANAGER (HR) - Rectt. NHDC Ltd., NHDC PARISAR, SHYAMALA HILLS, BHOPAL (M.P.) 462013 latest by 14th February 2014.

Application Fee:
SC/ST/PWD candidates do not have to pay any application fee. Others have to send an application fee of Rs.500/- in the form of crossed Demand Draft drawn in favour of "NHDC Ltd" payable at Bhopal, MP - along with an application.
Read More

Thursday, 2 January 2014

Top 10 Threat Predictions for 2014

1 Comment
During the past few years, security threats and actual breaches have grown exponentially. Malware has gone mainstream, social engineering has become far more sophisticated, high-profile database hacks have become disturbingly common, and distributed denial-of-service (DDoS) attacks have rocked businesses across a wide range of industries. These attacks have rendered countinue ...

Android Malware Will Expand

As the Android OS takes root in game consoles, wearable devices, home automation equipment and industrial control systems, malware will appear on these devices.

Use of Encryption Will Increase


Fears that critical data and intellectual property could be compromised or stolen through malware or government eavesdropping will lead to an uptick in the use of encryption.



Shutting Down Botnet Operators

Law enforcement will broaden its scope and focus on a broader set of global cyber-targets, including botnet operators and individuals selling cyber-crime services.

Battling for the Deep Web


Improved versions of anonymous services and file-sharing  applications will grow, and it will become more difficult to infiltrate and take down these systems.


Targetig Off-Net Devices
Cyber-crooks will target infrastructure over desktops. The first generic exploitation frameworks and mass malware agents for home devices will appear.



Becoming More Transparent

On the heels of an FTC crackdown in 2013, network security vendors will face increased scrutiny and accountability.



Botnets Will Migrate


Cyber crooks will transition from a traditional client-server botnet approach to a P2P strategy that makes it more difficult to dismantle and disrupt their activities.


Botnets Will Cross-Breed

Increasingly sophisticated botnets will seek out other botnets and cross-infect with them to more effectively increase their base of machines.


More Attacks on Windows XP

When Microsoft stops supporting Windows XP on April 8, newly discovered vulnerabilities will not be patched, and systems will become vulnerable.

Biometrics Will Increase

The use of two-factor authentication and biometric methods—including tattoos, iris scanning and facial recognition—will grow.
Read More