CSS Forums

CSS Forums (http://www.cssforum.com.pk/)
-   Computers and Technology (http://www.cssforum.com.pk/off-topic-section/computers-technology/)
-   -   techniques to learn about computer (http://www.cssforum.com.pk/off-topic-section/computers-technology/108531-techniques-learn-about-computer.html)

ursula Thursday, March 31, 2016 08:26 PM

techniques to learn about computer
 
Well, reading the bugging problem in Facebook and in other social websites has really dangled my mind, though I found some sites, but it proved insufficient for noob like me.I am expecting some good explanation, particularly aiming at my teachers"Quantum X and Mustansar Hussain. I hope my query would be resolved, but at the level of [B]mine[/B].

mustansar~hussain Thursday, March 31, 2016 09:48 PM

[QUOTE=ursula;924694]Well, reading the bugging problem in Facebook and in other social websites has really dangled my mind, though I found some sites, but it proved insufficient for noob like me.I am expecting some good explanation, particularly aiming at my teachers"Quantum X and Mustansar Hussain. I hope my query would be resolved, but at the level of [B]mine[/B].[/QUOTE]
What kind of techniques?

ursula Thursday, March 31, 2016 09:59 PM

:unsure:[QUOTE=mustansar~hussain;924707]What kind of techniques?[/QUOTE]

Bugging and its fixation in fb:?
Dude, visit discussion section as well and also explain that one.

mustansar~hussain Thursday, March 31, 2016 10:36 PM

[QUOTE=ursula;924709]:unsure:
Bugging and its fixation in fb:?
[/QUOTE]

To learn bugging & its fixation, one must be well acquainted with
computer programming. Google defines programming as:
[B]"The process of writing computer programs."[/B]

Candidly speaking, its not possible to learn computer programming in short span of time or through
forum discussion. You will be surprised to know that it is that kind of art
which is deliberately avoided in Pakistan by majority of Computer science students because of its rigid nature. It requires practice for long hours, patience for approximately 6 to 8 months and ceaseless commitment to master it perfectly.

Learning to program and CSS preparation cannot be carried together. However, sufferings test strength of endurance.

[B]“If we focus on the problems of life, we will be paralysed. But we dwell on the promise of God; we find the faith, hope and courage to survive life.” [/B]

[QUOTE=ursula;924709]
Dude, visit discussion section as well and also explain that one.[/QUOTE]
[URL="http://www.cssforum.com.pk/general/news-articles/dawn/108534-threat-cyberterrorism.html#post924716"]Click here[/URL]

ursula Thursday, March 31, 2016 11:12 PM

[QUOTE=mustansar~hussain;924714]To learn bugging & its fixation, one must be well acquainted with
computer programming. Google defines programming as:
[B]"The process of writing computer programs."[/B]

Candidly speaking, its not possible to learn computer programming in short span of time or through
forum discussion. You will be surprised to know that it is that kind of art
which is deliberately avoided in Pakistan by majority of Computer science students because of its rigid nature. It requires practice for long hours, patience for approximately 6 to 8 months and ceaseless commitment to master it perfectly.

Learning to program and CSS preparation cannot be carried together. However, sufferings test strength of endurance.

[B]“If we focus on the problems of life, we will be paralysed. But we dwell on the promise of God; we find the faith, hope and courage to survive life.” [/B]


[URL="http://www.cssforum.com.pk/general/news-articles/dawn/108534-threat-cyberterrorism.html#post924716"]Click here[/URL][/QUOTE]

Well I also read
[1] [url]http://www.openthegovernment.org/sites/default/files/Letter%20for%20the%20Judiciary%20Committee%20on%20Section%20702%20Hearing.pdf[/url]

[2] [url]http://icontherecord.tumblr.com/topics/section-702[/url]
[3] [url]http://icontherecord.tumblr.com/topics/section-702[/url]
[4] [url]https://theintercept.com/2016/01/28/congressional-hearings-on-surveillance-programs-to-kick-off-in-secret/[/url]
[5] [url]https://theintercept.com/2016/01/28/congressional-hearings-on-surveillance-programs-to-kick-off-in-secret/[/url]

Regarding CSS (course or syllabus or whatever the Greek it may be), I already subscribed it on my Gmail account, I thought I should start it now, cause I already got very goood and decent teachers, such as Quantam and you.:pp
Lastly, dude, I'm " passionate" to learn new and difficult things, even though it consumes a century.May be bit lunatic but that's what I believe in and I hope I will learn it.Inshallah!:thinking
And today's question, what is " matadata" in surveillance.?

Don't forget to mention some good book, that is worth mentioning to be read so that I can be able to grasp the main idea and that it works.

mustansar~hussain Thursday, March 31, 2016 11:45 PM

Both questions, assignment for tomorrow.

ursula Thursday, March 31, 2016 11:50 PM

Well, dude, I don't understand the questions,
Anticipated answer of yours: nhy afa?
But do tell me which questions as well,
I hope you also visited discussion portion!

mustansar~hussain Friday, April 01, 2016 12:03 AM

[QUOTE=ursula;924728]Well, dude, I don't understand the questions,
Anticipated answer of yours: nhy afa?
But do tell me which questions as well,
I hope you also visited discussion portion![/QUOTE]

I dont have any intention to disappoint you, but the thing you want to learn is prodigiously hectic for you. It can easily take years.

ursula Friday, April 01, 2016 12:09 AM

[QUOTE=mustansar~hussain;924732]I dont have any intention to disappoint you, but the thing you want to learn is prodigiously hectic for you. It can easily take years.[/QUOTE]

No,hectic is better than fazool chawlyan, instead such activities will save me rambling here and there(iss trahan main much seekh buy jaun g air burry sahubbat aur burre khyalat se bye).I know it'd be difficult, but not impossible, cause the word impossible says- I'm possible.Atleast a pinch of salt to be learnt.
I hope you would help me.:)

quantumX Friday, April 01, 2016 12:14 AM

Ursula sister, I am just a newbie here, and have just stepped into this CSS world lately, so I don’t deserve to be called “Sir” as my knowledge is very little. In fact I consider both of you my teacher, and have learned a lot from you, because of the contribution you made to the forum. I hold you members in high esteem because of enormous knowledge you have.

Now let’s come to the query being asked by you, but in order to comprehend the concept of how a bug can affect a computer system, it is required to first understand the a few basics, that how a combination of both software and hardware work together to perform a task.

Basically digital computers which we use normally, operate on bits, and bit is smallest unit of information. Bit can either be 0(zero) or 1(not literally). Zero is considered as an off signal, and 1 is considered as an ON signal. For our own ease, the convention was set by the pioneers that 0 and 1 would represent OFF and ON signal. For example if you write “A” in computer’s notepad, then how computer understands it is something like “01000001”. 8 bits can represent any character. So these bits are flowing through circuits which a hardware of computer is composed of, and bits are basically signals which instruct/tell hardware that what action is to be performed.

Software contains a set of instructions which tells exactly what a hardware has to perform. Instructions are composed of bits (combination of 0s and 1s), which are signals for a hardware. Hardware understands those signals and perform accordingly. And software programs which programmers write may seem like an amalgamation of math and some English, to ordinary people. These programs are then converted into binary form, which is 0 and 1, which a computer hardware understands accurately.

Now I give you my explanation regarding why Facebook was affected by that bug. A bug is basically a flaw in a software program, which produces unintended results. It is a mistake made by a programmer while writing a program. As you know Facebook is the biggest social media web application, which is expanded over hundreds of thousands of computers, which work together to serve billions of users’ requests daily. So to instruct these thousands of computers, there are thousands of different developers who develop software programs for that purpose. So many different developers are working on many different pieces of the bigger software system, and all these pieces fit together to perform a specific task. So imagine that there are billions of billions of lines of code which is responsible for delivering such a service to billions of users. And programming is done by a programmer which is a human, and human make mistakes, but in software industry, sometimes it is common practice that programmers tend to make mistakes normally, and it’s inevitable, because of the nature of the work. E.g.,

If ( isThereEmergency == True)
{
Find_Affected_Area
Notify_Affected_Area_People
}
Else
{
No_Action
}

Let us assume that if Find_Affected_Area code has some bug then it would not produce desired results.

mustansar~hussain Friday, April 01, 2016 12:19 AM

[QUOTE=ursula;924733]No,hectic is better than fazool chawlyan, instead such activities will save me rambling here and there(iss trahan main much seekh buy jaun g air burry sahubbat aur burre khyalat se bye).I know it'd be difficult, but not impossible, cause the word impossible says- I'm possible.Atleast a pinch of salt to be learnt.
I hope you would help me.:)[/QUOTE]
hmmm thats good to read. Ok I will assist you InshaaAllah :-)

quantumX Friday, April 01, 2016 12:24 AM

If you have found some terminology difficult or have not fully understood, or have any question then let me know.

ursula Friday, April 01, 2016 12:26 AM

Well newbie,
Do you know I'm " [B]noob[/B]"
Everybody who is here or in fact everywhere on this planet Earth is in learning stage, that's why I justapositioned that we simultaneously are all students and teachers of each other.Look in my profile picture, I hope you will learn how I perceive about the learning.Any ways that also reflect your humbelness and I appreciate your this kind and sooty attitude.:pp
Now, thanks for your wonderful elaboration, believe me today I learnt that have I possess the teachers like" Quantum an Mustansar ",nothing is impossible, please just elaborate me what the matadata really is?:thinking
Sir, your student won't gotten hesitate to ask any question, don't worry about this.
@mustansar
Inshallah sir!

Inshallah having a next session, allahafiz to my both teachers.

mustansar~hussain Friday, April 01, 2016 12:49 AM

[QUOTE=ursula;924738]
@mustansar
Inshallah sir![/QUOTE]
InshaaAllah after 1st March 2017. No possibility before it because of some personal issues.

quantumX Friday, April 01, 2016 10:26 AM

Metadata is basically data about other data. You may be familiar with the data, and it is of different types, like video data, audio data, text data, and image data. Metadata is a bit more technical term, and is being used in many different areas of computer science. It is another way of looking at data, to make it more meaningful for various purposes. Like you have a pdf document in your computer, for you it’s a data, but it has some other information associated with it, like who the author is, when the document was written, a little information of what your document is all about, when it was last modified, and various other information. So all this information about your data, is used by your computer for its own purpose, like computer doesn’t only have just data, but it has also some information about your data, which is called metadata. Like, websites uses metadata to make their content more useful, meaningful for the programmers. For example the articles which are published on the websites, have meta tags (or metadata) associated with it. You look at the content's value, which is metadata.
<link rel="canonical" href="http://tribune.com.pk/story/1076703/bloody-sunday/">
<meta property="og:locale" content="en_US">
<meta property="og:type" content="article">
<meta property="og:title" content="Bloody Sunday - The Express Tribune">
<meta property="og:description" content="The list of ‘they’ keeps growing — TTP, Afghan Taliban, ISIS and the like">
<meta property="og:url" content="http://tribune.com.pk/story/1076703/bloody-sunday/">
<meta property="og:site_name" content="The Express Tribune">
<meta property="article:tag" content="Lahore attack">
<meta property="article:section" content="Opinion">
<meta property="article:published_time" content="2016-03-31T23:23:37+00">
Above is some part of the webpage, but it is not visible on your screen, and it is hidden from user because reader is only concerned with the data(here article), but not with the metadata. So the ones, who develop software application are more concerned with such things.

ursula Friday, April 01, 2016 04:32 PM

[QUOTE=mustansar~hussain;924740]InshaaAllah after [B]1st March 2017[/B]. No possibility before it because of some personal issues.[/QUOTE]
Dude, are you kidding me or gonna to celebrate under' [B]lunatics April Fool[/B]',
if no, than babe, it makes one whole year!:laughing:laughing
[QUOTE=quantumX;924766] You look at the content's value, which is metadata.
<link rel="canonical" href="http://tribune.com.pk/story/1076703/bloody-sunday/">
<meta property="og:locale" content="en_US">
<meta property="og:type" content="article">
<meta property="og:title" content="Bloody Sunday - The Express Tribune">
<meta property="og:description" content="The list of ‘they’ keeps growing — TTP, Afghan Taliban, ISIS and the like">
<meta property="og:url" content="http://tribune.com.pk/story/1076703/bloody-sunday/">
<meta property="og:site_name" content="The Express Tribune">
<meta property="article:tag" content="Lahore attack">
<meta property="article:section" content="Opinion">
<meta property="article:published_time" content="2016-03-31T23:23:37+00">
Above is some part of the webpage, but it is not visible on your screen, and it is hidden from user because reader is only concerned with the data(here article), but not with the metadata. So the ones, who develop software application are more concerned with such things.[/QUOTE]
first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist, now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA.
oh!
once again,[B]Thanks[/B], for your kind elaborations.:dd

mustansar~hussain Friday, April 01, 2016 08:29 PM

[QUOTE=ursula;924851]Dude, are you kidding me or gonna to celebrate under' [B]lunatics April Fool[/B]',
if no, than babe, it makes one whole year!:laughing:laughing
[/QUOTE]
Nice question. Next Please! :D

ursula Friday, April 01, 2016 08:42 PM

[QUOTE=mustansar~hussain;924910]Nice question. Next Please! :D[/QUOTE]
Already mentioned the next question, please!
Teachers are getting slow to realize that.
Ooooooopsssss!

mustansar~hussain Friday, April 01, 2016 08:47 PM

[QUOTE=ursula;924919]Already mentioned the next question, please!
Teachers are getting slow to realize that.
Ooooooopsssss![/QUOTE]

I didn't find any question for me. Can you please raise it again?

mustansar~hussain Friday, April 01, 2016 09:00 PM

@Ursula
I have finalized material for you which you have to cover at least before you die. Covering it within one year, will be a laudable achievement. So, ready for start?

ursula Friday, April 01, 2016 09:03 PM

[QUOTE=ursula;924851]
first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist,[B] now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA:dd[/B][/QUOTE]
Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd!

mustansar~hussain Friday, April 01, 2016 09:05 PM

[QUOTE=ursula;924924]Here it is please.
Respected teacher!
What about your 2017 planning, were enjoying April fool, or something, duuuuuddd![/QUOTE]
Include it as well in your assignment questions.

ursula Friday, April 01, 2016 09:15 PM

Already included,
I want some intro from you as well.
Lagta he assignment ab month pe jae g.(student bhag jae ga)dedupppp
Oh, April fool is already included in assignment as well.

[QUOTE=mustansar~hussain;924923]@Ursula
I have finalized material for you which you have to cover at least before you die. Covering it within one year, will be a laudable achievement. So, ready for start?[/QUOTE]

More than welcome, let's share your outline that we're going to "cover".

mustansar~hussain Friday, April 01, 2016 10:03 PM

[B][Try to explore things by yourself][/B]
You have to go through following 11 levels. This whole process can take approximately 01 to 03 years.

[B]Levels:[/B]
[B]1)[/B] Java Programming: An Introduction to Software | Coursera
[B][B]2)[/B][/B] Full Stack Web Development
[B]3)[/B] HTML, CSS, and Javascript for Web Developers - Johns Hopkins University | Coursera
[B]4)[/B] Android App Development | Coursera
[B][B]5)[/B][/B] Search Engine Optimization (SEO) | 7 march - 1 Aug
[B]6)[/B] Cybersecurity and Its Ten Domains | Coursera
[B]7) [/B]Cybersecurity | Coursera
[B]8) [/B]Interaction Design | [B]Optional[/B]
[B]9)[/B] PHP and MySQL Tutorial in Urdu / Hindi Complete - Lecture 1 - YouTube
[B]10)[/B] Introduction to Research for Essay Writing | Coursera
[B]11)[/B] How to Write and Publish a Scientific Paper (Project-Centered Course) | Coursera

For each level, I will be providing you its description and guidance. You will have to update me with your progress regularly.


Level 01: [URL="https://www.coursera.org/specializations/java-programming"]Java Programming: An Introduction to Software | Coursera[/URL]

[B]Deadline for whole specialization: 31 August.[/B]

[B]Assignment 01: [/B]Submit your review about this specialization. Your review should answer following questions:
1) what is this specialization about?
2) How many sub-levels, it encompasses?
3) Short intro about its each sub-level.

Deadline for Assignment 01: 09:30 P.M; 03 April 2016

[B][B]"Failure will never overtake you if your determination to succeed is strong enough."[/B][/B]

[B]Best of Luck.[/B]

ursula Friday, April 01, 2016 11:17 PM

insahllah, i will meet the goal.:):)
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.:oo
Can i register free of cost????

mustansar~hussain Saturday, April 02, 2016 11:27 AM

[QUOTE=ursula;924949]insahllah, i will meet the goal.:):)
just one question, the brief introduction of these courses that are four in number?

the problem is that it is not free of cost, please help me in this regard.:oo
Can i register free of cost????[/QUOTE]

Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.

ursula Saturday, April 02, 2016 01:41 PM

[QUOTE=mustansar~hussain;924988]Precise introduction of all those four courses.

Courses are free of cost. They charge money for providing a certificate only.
Search each course individually in the search bar, then join that freely.[/QUOTE]

first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away:haha
[B]Assignment[/B]
first, what is web: an address used in the virtual world for example [url]www.google.com[/url]
second;how this web page is created, for example if i wanted to create [url]www.ursula.com[/url] (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these informations in our daily life i.e. in projects formation etc.

mustansar~hussain Saturday, April 02, 2016 04:42 PM

[Try to explore things by yourself]
 
[QUOTE=ursula;925014]first of all im highly indebted for suggesting me such a nice course and i found the teachers very cooperative and nice one,yeah, you are right its free and went through the course as well.
Now, alhamdollillah got your assignment and answer is!
i'm very excited, though late night disappointments has haunted me, which has vanished away:haha
[B]Assignment[/B]
first, what is web: an address used in the virtual world for example [url]www.google.com[/url]
second;how this web page is created, for example if i wanted to create [url]www.ursula.com[/url] (it is created through CS and html)
third:java script programming (that is used to manipulate imaging, computing and algorithms), which is understood by programmers only.
Fourth: the most important part that how and where to use these information in our daily life i.e. in projects formation etc.[/QUOTE]

That's good to read.

All courses provide assignments in the same way weekly with a deadline. They all have separate discussion groups as well. Now, you have to accomplish each course, [B]individually[/B], with its assignments. Its 2nd of April today and you have to finish whole specialization before 31 August to proceed for [B]LEVEL 02[/B] .

Moreover, try to interact with other members and place your queries there in the concerned group of the course. Here, you should [B]precisely [/B]type your progress [B]only[/B]. Your questions should be raised there only in the concerned discussion forum.


[B]Assignment 02:[/B]
Completely finish first level of specialization, Programming and the Web for Beginners, with its assignments and helpful readings. Raise questions in the discussion forum and assist others there. Make notes out of each lecture in any way you feel comfortable. I took snapshot of each slide and compiled a complete ppt file to make notes. Then, printed that ppt file with 04 pages per one side.

[B]Deadline: 20 April 9 P.M[/B]

[B][B]
Wish You Very Best Luck.[/B][/B]

ursula Saturday, April 02, 2016 04:49 PM

Yeah, I got it! Inshallah I will try, Thanks again.

quantumX Saturday, April 02, 2016 07:11 PM

[QUOTE=ursula;924851]Dude, are you kidding me or gonna to celebrate under' [B]lunatics April Fool[/B]',
if no, than babe, it makes one whole year!:laughing:laughing

first of all i am highly indebted for your kinndda good elaborations and now im understanding the technical terms with elujidations and what i gotten something is that our programmers have complete information or more appropiately accessibility to our secret data evenly as ones privacy is point of enchraochment for field specialist, now my question to you is that how spy agencies use the matadata to gain accessibility to individual beings, like, i hope you will be familiar with "Edward Snowdown",the lunatic man has already elaborated the american spy program of NASA.
oh!
once again,[B]Thanks[/B], for your kind elaborations.:dd[/QUOTE]

Let me start with my story of how one of my close friend and I got interested in developing a hacking software, while studying at university. It was, I think, 3rd semester when we had been quite much familiar with programming languages, and quite good at making logics. We were quite close friends, so he started revealing his intentions of making a spy software, and hacking into computers of a few girls of our batch. I was never interested in such time consuming and useless activity, even though my programming skills were quite polished, but I never intended to do such thing throughout my stay at university. He asked me to be a part of his mission but I refused in a very friendly way. The only thing he used to discuss with me, was the programing logics of the spy software, which he was going to develop. I thought of it as a purely educational stuff for me, I never even wrote a single line of code for him, but we would just discuss concepts. A long story short, He finally got his hands on a fully working spy software (miniature one), after carrying out months of effort, which would log the keystrokes, and all the cache (where passwords are stored) of the browser, and then send it to an email address, which he had set in his software. He, then, started his mission by sending the executable file to the class mates’ email address, their Facebook accounts, whom he wanted to hack. The ones who clicked/run that malicious file in their computers/laptops were hacked, and let that malicious software do what it had been coded for, so this way their computers were compromised, and my friend got insight into their digital life. The reason why I told you this story is to make you familiar a bit in advance for the following explanations of what happens in the hacking world.

The thing you are referring to, is NSA (National Security Agency), not NASA, but before telling about NSA, I would like to explain about how an internet works and some history of it, so that you can understand the bigger picture. Before internet there was ARPANET, which helped researchers to visualize the need of a bigger network for future, which led to the creation of internet. Basically, ARPANET was the first very small network of computers, comprising of a few computers, and it was designed for military purposes. Slowly, ARPANET was started growing, and was then renamed as an internet later. But security was never a priority in the first place for researchers, but to build a simple communication medium which let computers to talk to each other. If we look around now then today’s internet is expanded all over the world, but still the problem is of security, which is a great threat to everyone who is a consumer of this technology. Now let me explain you about how internets works. Basically, it is a network of computers which are connected by some medium, like wire or wireless. Computers actually talk to each other because of a common protocol that is defined for communication. For example, you and I, can understand each other because of common languages, like Urdu, English. Similarly computers do have a common language (or protocol) for commutation with other computers, and for communication they need to be connected to some network by some medium, like wire or wireless, and there are special networking devices, which are part of a network to carry messages from one place to another. So you think that data (or message) that goes out of our computer has to travel through many networking devices to reach at destination. But the message being sent out to another networking device or computer, is not just a plain data, but actually it is encoded or encrypted by our computer before sending it to the internet, and when it reaches at destination then it again gets decoded or decrypted(means to transform it to its initial form). So this is how computers work while sending data to one another.

Basically, the story I told you, is just one way of accessing someone’s data. There are hundred other ways that can be used to look into someone’s digital life/activity. Considering NSA, let’s be clear that it is a part of a US govt., and they can go to any level to achieve their goals, whether they have to spy on their citizens, or the rest of the world. They have their own their own team, researchers, programmers, security professionals which are of fine quality, and have enormous computing power to collect data and analyze it. So the question you were asking me about how they gain access to our data may have different answers, but I will tell you what I know. The one who developed the software system, knows the loop holes of it, which can be exploited, like Microsoft knows what the loop holes in Windows operating system are. Similarly every software product has some loop holes, and can be exploited for various purposes. NSA tries to exploit those loop holes to get into someone’s computer, not only this, they have even asked big technology giants for “backdoors”, like Twitter, Facebook, Google, etc. Backdoor gives the whole access to the system. It’s like a “chor darwaza” but by the consent of the maker of the software. Like if Facebook provides backdoor to NSA, then they don’t have to exploit the loop holes, because they have now backdoor, which gives access of all the data of Facebook’s user to them. I have read the news somewhere a year back, that NSA was asking Facebook, and Google for backdoor, and I don’t know to what extent this news was true. There’s another way of gaining access to data, by intercepting the data which goes through ISP (Internet Service Provider). Like if had an access to the networking devices of PTCL, then I would try to intercept the data, and try to decode it, as you know once the data goes out of your computing device, whether it be computer, or cell phone, it is encrypted and coded. So if someone intercepts the data that flows through networking device, then they have to decode or encrypt it to make it readable. So NSA may have an access to the big ISPs and they may have intercepted the data of many users, and then have decoded by the super computers they have, which have enormous power of computing to process data, and even decode the data. NSA may have developed their own hacking tools to fulfill their needs. So I would lastly say that your computing device is secure as long as it is not connected to the internet.

I have never heard that computers are hacked by using metadata. This concept sounds weird to me. :)

ursula Saturday, April 02, 2016 08:44 PM

first of all, i feel my self the luckiest enough to acquire the teachers like you, thanks to my almighty Allah,:laugh:
Your nice elaboration is gotten by "noob" and for this im highly indebted by both of you guys.
Yup, i misselled NSA and i'm apologizing for this, kindly read "US Five eyes program in collaboration with countries like Canada, G.Britain, New Zealand, and Australia+PRISM( if you dont mind to elaborate it to me as well:D)
[QUOTE=quantumX;925078]
I have never heard that [B]computers are hacked by using metadata[/B]. This concept sounds weird to me. :)[/QUOTE]
well,as far as your query is concenered, you can consult the following site.
[url]http://www.reuters.com/article/us-usa-court-surveillance-idUSKCN0QX1QM20150828[/url]
i hope you enjoy this.:pp

@mustansar
sir, i have started the course [B]now[/B], you know at the start everything looks quite [U]depressing[/U], am gonna through the same phase, still hope to learn it.inshallah
tick oot!

mustansar~hussain Saturday, April 02, 2016 09:24 PM

[QUOTE=quantumX;925078]
I have read the news somewhere a year back, that NSA was asking Facebook, and Google for backdoor, and I don’t know to what extent this news was true.
[/QUOTE]
Yes dear, you're right. [URL="http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism"]Visit here.[/URL]

[QUOTE=quantumX;925078]
I have never heard that computers are hacked by using metadata. This concept sounds weird to me.[/QUOTE]
Please visit following links:
[URL="http://null-byte.wonderhowto.com/how-to/hack-like-pro-extract-metadata-from-websites-using-foca-for-windows-0155076/"]Link 01[/URL]

[URL="http://null-byte.wonderhowto.com/how-to/linux-basics/"]Link 02[/URL]

[URL="http://resources.infosecinstitute.com/metadata-the-hidden-treasure/"]Link 03[/URL]

[QUOTE=ursula;925102]

@mustansar
sir, i have started the course [B]now[/B], you know at the start everything looks quite [U]depressing[/U], am gonna through the same phase, still hope to learn it.inshallah
tick oot![/QUOTE]
Keep it up.

ursula Saturday, April 02, 2016 09:49 PM

Is it true true that even a person can be shot dead through infected IP a dress, since a couple of months back I read that Iranian nuclear scientist was bombed in a car through internet connection.(unfortunately didn't remember the source)
If it is assumed to be true, than where we are heading towards?:blink:

mustansar~hussain Saturday, April 02, 2016 10:50 PM

[QUOTE=ursula;925110]Is it true true that even a person can be shot dead through infected IP a dress,[/QUOTE]
Yes, its possible.

ursula Saturday, April 02, 2016 10:50 PM

I found first lecture easy , though confused at the beginning, very interesting indeed!:pp
Did you ever gone through such info?(regarding killing of innocents through such giant techs)

quantumX Saturday, April 02, 2016 11:04 PM

I had no idea of how to hack using metadata. So I'm going to read the resources you both have shared above. @Ursula: I don't know about US Five Eyes Program, but I will study it tomorrow to know what exactly it is.

mustansar~hussain Saturday, April 02, 2016 11:11 PM

[QUOTE=ursula;925122]
Did you ever gone through such info?(regarding killing of innocents through such giant techs)[/QUOTE]
[URL="http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/"]Link[/URL]

[URL="https://www.theguardian.com/science/the-lay-scientist/2016/feb/18/has-a-rampaging-ai-algorithm-really-killed-thousands-in-pakistan"]Link[/URL]

ursula Saturday, April 02, 2016 11:14 PM

[QUOTE=mustansar~hussain;925121]Yes, its possible.[/QUOTE]

Sir, I have prepared a very special report as you you asked me for massive surveillance, unfortunately I postponed it ,cause here people are " more patriotic" than my imagination.
All those info I'm sharing now was part of that report, but anyways, phir kbhy.otherwise I'm gonna to dwell into that one as well.
So hope in the future, provided lectures drifted along smoothly.
@quantum x
Inshallah , you will enjoy this, add Canada based CSE (central security establishment) and its massive surveillance program in Brazil.
Have a tuck in it

I have a dream,
Can I share here?


We (mustansar, Ursula, quantum) will meet in civil services academy, inshallah.:)

mustansar~hussain Saturday, April 02, 2016 11:21 PM

You should share both report and dream.

ursula Saturday, April 02, 2016 11:27 PM

[QUOTE=mustansar~hussain;925129]You should share both report and dream.[/QUOTE]
Here it is!
[QUOTE=ursula;925128]
I have a dream,
We ([B]mustansar, Ursula, quantum) will meet in civil services academy, inshallah[/B].:)[/QUOTE]
Regarding report, inshallah at optimum timings,:))
Did you like this wish?
Sir quantum nice suggestion about my dream!!!!


10:24 PM (GMT +5)

vBulletin, Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.