Pages

Friday 11 November 2016

What's the difference between an Intel Core i3, i5 and i7?

Intel Core i3, Core i5, and Core i7 CPUs have been around for a few years now, but some buyers still get stumped whenever they attempt to build their own systems and are forced to choose among the three. With the more recent Haswell (fourth generation ) architecture now on store shelves, we expect the latest wave of buyers to ask the same kind of questions.

ALSO lLIKE:10 Best android hacking apps
ALSO LIKE:How to make virus that crashes PC!!!

Core i3, Core i5, Core i7 — the difference in a nutshell

If you want a plain and simple answer, then generally speaking, Core i7s are better than Core i5s, which are in turn better than Core i3s. Nope, Core i7 does not have seven cores nor does Core i3 have three cores. The numbers are simply indicative of their relative processing powers.
Their relative levels of processing power are based on a collection of criteria involving their number of cores, clock speed (in GHz), size of cache, as well as Intel technologies like Turbo Boost and Hyper-Threading.
Note: Core processors can be grouped in terms of their target devices, i.e., those for laptops and those for desktops. Each has its own specific characteristics/specs. To avoid confusion, we’ll focus on the desktop variants. Note also that we’ll be focusing on the 4th Generation (codenamed Haswell) Core CPUs.

Number of cores

The more cores there are, the more tasks (known as threads) can be served at the same time. The lowest number of cores can be found in Core i3 CPUs, i.e., which have only two cores. Currently, all Core i3s are dual-core processors.
Currently all Core i5 processors, except for the i5-4570T, are quad cores in Australia. The Core i5-4570T is only a dual-core processor with a standard clock speed of 2.9GHz. Remember that all Core i3s are also dual cores. Furthermore, the i3-4130T is also 2.9GHz, yet a lot cheaper. Sounds like it might be a better buy than the i5. What gives?
At this point, I’d like to grab the opportunity to illustrate how a number of factors affect the overall processing power of a CPU and determine whether it should be considered an i3, an i5, or an i7.
Even if the i5-4570T normally runs at the same clock speed as Core i3-4130T, and even if they all have the same number of cores, the i5-4570T benefits from a technology known as Turbo Boost.

Intel Turbo Boost

The Intel Turbo Boost Technology allows a processor to dynamically increase its clock speed whenever the need arises. The maximum amount that Turbo Boost can raise clock speed at any given time is dependent on the number of active cores, the estimated current consumption, the estimated power consumption, and the processor temperature.
For the Core i5-4570T, its maximum allowable processor frequency is 3.6GHz. Because none of the Core i3 CPUs have Turbo Boost, the i5-4570T can outrun them whenever it needs to. Because all Core i5 processors are equipped with the latest version of this technology — Turbo Boost 2.0 — all of them can outrun any Core i3.

Cache size

Whenever the CPU finds that it keeps on using the same data over and over, it stores that data in its cache. Cache is just like RAM, only faster — because it’s built into the CPU itself. Both RAM and cache serve as holding areas for frequently used data. Without them, the CPU would have to keep on reading from the hard disk drive, which would take a lot more time.
Basically, RAM minimises interaction with the hard disk, while cache minimises interaction with the RAM. Obviously, with a larger cache, more data can be accessed quickly. The Haswell (fourth generation) Core i3 processors have either 3MB or 4MB of cache. The Haswell Core i5s have either 4MB or 6MB of cache. Finally, all Core i7 CPUs have 8MB of cache, except for i7-4770R, which has 6MB. This is clearly one reason why an i7 outperforms an i5 — and why an i5 outperforms an i3.

Hyper-Threading

Strictly speaking, only one thread can be served by one core at a time. So if a CPU is a dual core, then supposedly only two threads can be served simultaneously. However, Intel has a technology called Hyper-Threading. This enables a single core to serve multiple threads.
For instance, a Core i3, which is only a dual core, can actually serve two threads per core. In other words, a total of four threads can run simultaneously. Thus, even if Core i5 processors are quad cores, since they don’t support Hyper-Threading (again, except the i5-4570T) the number of threads they can serve at the same time is just about equal to those of their Core i3 counterparts.
This is one of the many reasons why Core i7 processors are the creme de la creme. Not only are they quad cores, they also support Hyper-Threading. Thus, a total of eight threads can run on them at the same time. Combine that with 8MB of cache and Intel Turbo Boost Technology, which all of them have, and you’ll see what sets the Core i7 apart from its siblings.
The upshot is that if you do a lot of things at the same time on your PC, then it might be worth forking out a bit more for an i5 or i7. However, if you use your PC to check emails, do some banking, read the news, and download a bit of music, you might be equally served by the cheaper i3.
At DCA Computers, we regularly hear across the sales counter, “I don’t mind paying for a computer that will last, which CPU should I buy?” The sales tech invariably responds “Well that depends on what you use your computer for.” If it’s the scenario described above, we pretty much tell our customers to save their money and buy an i3 or AMD dual core.
Another factor in this deliberation is that more and more programs are being released with multithread capability. That is, they can use more than one CPU thread to execute a single command. So things happen more quickly. Some photo editors and video editing programs are multi-threaded, for example.
Hopefully this gives you some insight for your next CPU selection.
Happy computing!

Thursday 10 November 2016

10 Best Android Hacking Apps!!!!!

Some years back, hacking used to be a thing for experts. Normally, these experts would have very sophisticated computers. But the modern smartphone is sophisticated too. We can’t seem to point out what a computer can do that a smartphone cannot do. Technology has made it possible for you to hack into almost everything from the screen of your mobile device. Take a look at ten of the best Android Hacking apps you can use.

1. WiFiKill

Is the slow speed of your wireless connection irritating you? You could be busy trying to finish an assignment while some kid is busy downloading funny videos. Using WiFiKill you can kick out other users from a shared wireless connection. The application tricks your victims’ devices into thinking your device is the Wi-Fi router and kills their packets. To the victims, they are still connected but the connection is just too slow.

2. Shark For Root

Shark For Root is an application for expert hackers. The app is basically used to view other internet users’ traffic, otherwise called ‘traffic sniffing’. The app can sniff traffic over Wi-Fi, and 3G connections. The app uses the TCP dump concept, allowing the hacker to key TCP dump commands on an android device. You will need another app called Shark Reader to open the captured files. This Android hacking application is available on Google’s Play Store.
Also check: free movie apps

3. zAnti

zAnti is an Android hacking tool for professional hackers. Basically, it is a penetration testing toolkit. With this hacking tool, you can penetrate any device on your network. Aside from that, you can perform MITM attacks on devices on your network. It was developed for cyber security by Zimperium Mobile Security.

4. dSploit

dSploit is one of the best hacking apps for Android with a set of overwhelming functions. It is one of those penetration tools that can be used scan networks and retrieve information regarding the connected devices and their operating systems, ports that are open on connected devices, services running on the connected devices and check any vulnerabilities present. I can be maliciously used to perform ‘man-in-the-middle’ attacks.

5. AndroRat

AndroRat is an RAT (remote access tool). The application was designed to give a hacker control of the victim’s device. The attacker can control phone calls and messages from a control panel on his device. As if that is not enough, they will have access to GPS coordinates, camera, microphones and all files stored in the device. The victim’s phone is infected through an APK binder.
Also check: free android games

6. Fing Network Scanner

Fing Network Scanner is a hacking tool available on all platforms; Windows, iOS, and Android. The network scanner is also available on personal computers. The application scans the network and discovers all the connected devices. The application has a simple design and can be used by people with little tech knowledge.

7. Hackode

Hackode is a decent hacking tool for Android that is used by cyber security firms and penetration testers. Hackode can be used to perform functions such as reconnaissance, network scans, generating security feeds and performing a number of exploits. It is one of the best Android hacking apps for beginners.

8. Droid Sheep

Droid Sheep is one other hacking tool that was developed for a noble course, but can be exploited to perform evil acts. It performs security analysis in wireless connections by hijacking active sessions. Once it starts scanning it will display all unsecured sessions on that network. A heinous user may choose to open the displayed sessions, thus intruding on a victim’s privacy.
Also check: best caller id apps

9. Nmap

Nmap is a network mapper that scans a connection and finds ports. It is available on Android and Windows. Ethical hackers will find the application useful in finding characteristics of hosts. The application can be used on devices which are rooted as well as those which are not rooted. Using it on a device which is not rooted limits its potential.

10. FaceNiff

Like most hacking apps for Android, FaceNiff allows an attacker to hijack web sessions of other users on the same network. Secure connections are susceptible to this tool too; FaceNiff can access WPA, WPA-2 and WEP connections. However, FaceNiff cannot access secured browsing, https. Social media accounts are not automatically secured, you have to secure them manually.
There you have it, 10 of the best Android hacking apps in the market. Some of these applications, especially those available on Google’s Play Store are not free. You need to root your android device to hack using these applications. Download any of these applications to enjoy hacking from your Android device.

Wednesday 9 November 2016

Top 10 Facebook profile hacking techniques!!! for sure !!!


1. Phishing

Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attack, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log's in through the fake page the, the victims "Email Address" and "Password" is stored into a text file, and the hacker then downloads the text file and gets his hands on the victim's credentials.

2. Keylogging

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record everything victim types on his/her computer. The logs are then sent back to the attacker by either FTP or directly to hackers email address.

3. Stealer's

Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealers are software's specially designed to capture the saved passwords stored in the victim's Internet browser.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a HTTP (nonsecure) connection. In Session Hijacking attack, a hacker steals the victim's browser cookie which is used to authenticate the user on a website, and use it to access the victim's account. Session hijacking is widely used on LAN, and WiFi connections.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however, it's still popular nowadays. Firesheep is widely used to carry out side-jacking attacks. Firesheep only works when the attacker and victim are on the same WiFi network. A side jacking attack is basically another name for HTTP session hijacking, but it's more targeted towards WiFi users.

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victim's mobile phone then he can probably gain access to his/her Facebook account. There are lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are Mobile Spy and Spy Phone Gold.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.

10. Botnets

Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however, a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.


This is for education and knowledge purpose.Don't use it for wrong purposes.

Stay connected for lots of more........!!!!!!!!!!!!!!!!!!!!!!!!!!!  

Monday 7 November 2016

Top Best Hacking Tools Of 2016 For Windows, Linux and Mac OS X !!!!!

Top Best Hacking Tools Of 2016 For Windows, Linux and Mac OS X


All these hacking tools 2016 provided here are free of cost ,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.

Here are the Top Best Ethical Hacking Tools 2016:

#1 Metasploit.


Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cybersecurity tool around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.
This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

#2 Nmap.


Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.

#3 Acunetix WVS.


Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.

#4 Wireshark.


his free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.

#5 oclHashcat

This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later

#6 Nessus Vulnerability Scanner.

Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc. This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud.
Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.
Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

#7 Maltego

Maltego hacking tool is available for Windows, Mac, and Linux. Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment.
Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.

#8 Social-Engineering Toolkit.


Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows. Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more. On the show, Elliot is seen using the SMS spoofing tool from the Social-Engineer Toolkit.
This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more.

#9 Nessus Remote Security Scanner.


Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

#10 Kismet.


Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.



So above is the top best ethical hacking tools 2016 for Windows, Linux and MAC OS X and must have tools for every hacker and these tools used on pc and So if you like this post don’t forget to share with your friends!! If you face any problem feel free to discuss in below comments;