Google spends 1billion u$d for making earth Wifi-ed

The Wall Street Journal is reporting that Google plans to spend over $1 billion on a fleet of satellites that will be used to provide internet to parts of the world that currently lack digital connections.

According to “people familiar with the project,” Google will use 180 “small, high-capacity satellites” that will orbit the Earth at low altitudes. Led by Greg Wyler, who set up satellite startup O3b Networks Ltd, Google has been on a hiring spree to recruit engineers from satellite company Space Systems/Loral LLC, claims the Journal.

Now, if the report is accurate, Wuler is heading up a team of “between 10 and 20 people,” ultimately reporting to Larry Page. The project is scoped to provide internet to areas around the world without wired connections, and cost between $1 billion to more than $3 billion, depending on the network’s final design and size. The Journal claims that a later phase “could double the number of satellites. ”

Aside from organizational details, information about the project remains scant. But it’s not Google’s only drive to deliver internet from the skies: it’s already running tests with internet providing balloons, and it’s bought a drone company to cover the world in Wi-Fi, too.

While previous attempts to smother the world in internet via satellite have proved unsuccessful, that’s largely been due to escalating costs. If the the report is accurate, Google is now working on three high-profile projects to use airborne craft to connect the world. Clearly, cost isn’t too much of a concern for Page & Co..

Why? Well, aside from the obvious-being filthy rich-the provision of internet to currently unconnected locations across the globe opens up vast new markets. Google clearly wants it products and services to be the default option; we’ll just have to wait and see if it can pull it off. [Wall Street Journal]

INCREASE YOUR INTERNET SPEED BY ATLEAST 50 % !!!! BY THIS METHOD

As Internet technology has become more advanced and intuitive, it is easy to forget that there is a rather complex set of protocols behind every website, YouTube video, or online game. These protocols control every aspect of data transmission, and are the reason we can enjoy the content available online with such reliability.

Well ……. fortunately T.C.P. Optimizer is a Software that will automatically tweak your Windows Registry and network settings to most efficiently make use of your Internet connection.

TCP Optimizer
TCP Optimizer looks complicated, but the Optimal settings are often enough.TCP — or Transmission Control Protocol — is one of the central standards that Internet data transmission is based on. Without it, there would be no World Wide Web, no downloads, and, essentially, no Internet — at least not as we know it.

The central thing that the TCP accomplishes is to ensure that any set of data packets being transmitted to your computer is complete and consistent with what was sent. The TCP detects if any packets were lost or corrupted, requests replacement packets from the originator of the data if needed, and arranges the packets in the proper order.

TCP Optimizer uses specialized algorithms and an innovative bandwidth-delay product to detect the optimal settings for your computer and Internet connection. It can be used by novices and experts alike, offering both automation or fine-tuning capability.

How to Use TCP Optimizer

To take advantage of TCP Optimizer’s automated optimization functionality:

  • Download TCP Optimizer.
  • Right-click on it and click Run as Administrator. You need to be logged as the administrator or have the password to do this.
  • Ensure the General Settings tab is selected.
  • Set your maximum bandwidth of your internet connection in kilobits per second. As ISPs often list connection speed in megabits per second, you can convert simply by multiplying by 1,000 (i.e. a 10 megabit connection is equivalent to 10,000 kilobits). This doesn’t have to be exact — just make your best guess based on the Internet plan you’ve been using.
  • Select the network adapter that connects your computer to the internet. In general, choose wired or wireless.
  • Select Optimal Settings in the lower part of the window.
  • Click Apply Changes, then click OK.
  • Reboot your computer once the process is complete.

This will often produce a dramatic improvement in network performance across a wide range of applications.

Download link : http://www.speedguide.net/downloads.php

TOP 10 HACKING TOOLS FOR ANDROID DEVICES !!! NOT FOR NOOBS

1.SpoofApp
SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been banned from the Play Store for allegedly being in conflict with The Truth in Caller ID Act of 2009.

2.Andosid

The DOS tool for Android Phones allows security professionals to simulate a DOS attack (an http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones.

3.Faceniff

Allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks.

4.Nmap

Nmap (Network Mapper) is a security scanner originally written by Gordon Lyon used to discover hosts and services on a computer network, thus creating a “map” of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyses the responses.

5.Anti-Android Network Toolkit

zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety.

6.SSHDroid

SSHDroid is a SSH server implementation for Android. This application will let you connect to your device from a PC and execute commands (like “terminal” and “adb shell”) or edit files (through SFTP, WinSCP, Cyberduck, etc).

7.WiFi Analyser

Turns your android phone into a Wi-Fi analyser. Shows the Wi-Fi channels around you. Helps you to find a less crowded channel for your wireless router.

8.Network Discovery

Discover hosts and scan their ports in your Wifi network. A great tool for testing your network security.

9.ConnectBot

ConnectBot is a powerful open-source Secure Shell (SSH) client. It can manage simultaneous SSH sessions, create secure tunnels, and copy/paste between other applications. This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.

10.dSploit

Android network analysis and penetration suite offering the most complete and advanced professional toolkit to perform network security assesments on a mobile device

CLEAR YOUR QUESTIONS ABOUT KEY LOGGERS !!

1. What is keylogger ?
You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.
2. How it can harm you ?
In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
3. Types of keyloggers
There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.
HARDWARE KEYLOGGER
SOFTWARE KEYLOGGER
4. How to Protect yourself from keyloggers ?
Keylogger can be used by your enemy to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password…

ThankYou..:)

Linksys jumps into the 4×4 and tri-band Wi-Fi frays with its new E8350 and EA9200 routers

Linksys spokesperson Karen Sohl tells me Linksys uses the WRT designation—and its old-school form factor—to identify routers with alternative open-source firmware support. To that end, Linksys has released two SDKs (software development kits) for the Attitude Adjustment and Barrier Breaker versions of OpenWRT. Full source code is availablehere.

The company has not released a complete set of wireless drivers for the WRT 1900AC, however, so the SDKs are somewhat academic (and the typical consumer is not likely to be interested in them anyway, since switching over isn’t a simple plug-and-play affair).

EA-series routers offer Linksys’s Smart Wi-Fi technology, which supports first- and third-party apps, plus the ability to access and configure the router via the cloud (the WRT-1900AC also supports Smart Wi-Fi, but I’m glad it’s not called the WRT-EA1900AC). E-series routers, meanwhile, have neither open-source firmware nor Smart Wi-Fi support, though that doesn’t mean they’re low-end, bare-bones models.

And now, on to the products:

Linksys E8350

Linksys sent me a pair of the E8350 models, but not in time for me to review. As mentioned above, this is a 4×4 802.11ac model, meaning it can support four spatial streams on the 5GHz frequency band to deliver throughput up to 1733Mbps. The router supports three spatial streams (plus 256QAM support) on the 2.4GHz band to deliver throughput up to 600Mbps. It has four removable antennas and supports beamforming.

Linksys E8350
The Linksys E8350 is a 4×4 802.11ac router that supports beamforming and—eventually—MU-MIMO.

Like the Asus RT-AC87U and the Netgear Nighthawk X4 , which are also based on Quantenna’s chipset, the Linksys E8350 will support MU-MIMO (multiple user, multiple input/multiple output) whenever Quantenna finishes the firmware to enable that feature.

Buyers shouldn’t actually expect to experience that high throughput in most situations, however. If your laptop is outfitted with an 802.11ac client adapter to begin with, it’s probably a 2×2 or even a 1×1 model (MacBook Pros are notable for having 3×3 802.11ac adapters). And on the 2.4GHz band, relatively few client adapters support 256QAM.

One way to take full advantage of a router like this is to configure a second router with the same capabilities as a wireless bridge, to which you then hard-wire your clients. If you want to wirelessly stream media from a server in your closet to a networked TV in your home theater, for instance, an 802.11ac wireless bridge is the ideal solution.

Linksys router
Linksys provides a combo USB 2.0/eSATA port in back, along with a USB 3.0 port. (Note: Its four antennas have been removed in this photo.) 

The E8350 has a four-port gigabit ethernet switch and a gigabit WAN port for connecting to your Internet gateway. There’s a USB 3.0 port and one USB 2.0/eSATA combo port in back for sharing storage devices and printers over the network. The router is outfitted with a 1.4GHz CPU, and it supports drives formatted FAT, FAT32, NTFS, or HFS+. It has UPnP and DLNA media servers, but no iTunes server.

Linksys EA9200

It looks as though the industry will persist in labeling routers that support two independent networks on the 5GHz frequency band and one on the 2.4GHz band “tri-band” routers. That’s how Linksys is labeling the EA9200. Like the Netgear Nighthawk X6 and the vaporish Asus RT-AC3200, the Linksys EA9200 boasts six antennas and supports three spatial streams on each of its three networks (delivering throughput of 1.3Mbps on each of its two 5GHz networks, and 600Mbps on its 2.4GHz network).

Linksys EA9200
The Linksys EA9200 is designed to operate vertically, probably because that’s the best orientation for its internal antennas. 

Only three of the EA9200’s antennas are external and adjustable/removable. The other three are fixed inside the chassis. Like the E8350, beamforming support is included. A 1GHz dual-core CPU supports a four-port gigabit Ethernet switch, a gigabit WAN port, and one USB 2.0 and one USB 3.0 port to share storage and a printer over the network.

Linksys has a feature it calls Smart Connect that automatically balances connected devices over the router’s two 5GHz networks in real time, to ensure everything enjoys an optimal connection.

Pricing and availability

The Linksys E8350 is available now and is priced at $300. The EA9200 is also available now at a promotional price of $250 (regular price is $280). I’ll post reviews of both models in the coming weeks.

SEND A MESSAGE THAT WILL AUTOMATICALLY DELETE IN FRIEND’S INBOX !!

Sometimes you need to share private information (password, credit card details or bank account information) with a family member, friend or colleague. It is possible to simply send the personal information via email or a chat message to the recipient. However, there is a risk that they might forget to delete the message and your private information may still remain in their inbox or computer. This means that a malicious user, who manages to illegally access the recipient’s computer or account in the future, could potentially access your private information and misuse it. Wouldn’t it be fantastic to be able to share your private message with the recipient via a self-destructing message which automatically gets deleted once it has been read?

this is where a very useful website known as Burn Note (www.burnnote.com) comes into the picture. It allows a user to send a message to someone else in such a manner that the message will be automatically deleted immediately or after a predefined number of seconds after it has been read. This ensures that your message remains truly private and cannot be accessed by anyone after it has been conveyed to the intended recipient.

In this example, let us assume that a family member needs your credit card number for an urgent purchase and you wish to share in the form of a secure self-destructing message.

All you need to do is to simply start your browser and connect to www.burnnote.com and type the private message of your choice in the space provided.

For added security, it is not only possible to prevent the recipient from being able to copy your private message, but also to put a password on the self-destructing message. This gives you double protection against unauthorized access to your private information. Moreover, Burn Note also allows you to specify the number of seconds after which the private message will automatically self-destruct.

Click on the Options button to access all the various options available to you while creating the private message.

once you are done writing the private message and selecting the various options related to it, click on the Send button. Burn Note will now create a URL or link to a special temporary web page where your private message will be stored.

To share the message with your friend, you simply need to send this link to your friend via email, chat or mobile application.

When the recipient opens the link, they will be taken to the special temporary web page where your private message has been stored. However, they won’t be allowed to view the private message without entering the password (if you chose to set one).

Only once the correct password is entered will the recipient be allowed to view your private message (in this case, your credit card number). The best part is that the private message can be viewed only once and will be automatically deleted after the predefined number of seconds (in this case 180 seconds).

The recipient of your private message also has the option to reply to your message with another self-destructing Burn Note private message from right within your message.

00008

00009

00010

 00012

Creator of Internet Demands For Internet Bill of Rights To Ensure Greater Privacy

Creator of Internet Demands For Internet Bill of Rights To Ensure Greater Privacy

The creator of the WWW has cautioned that the liberty of the internet is endangered by the government and corporation concerned in controlling the web.

Tim Berners-Lees, the British computer scientist who is famous for inventing the web 25 years ago, on Saturday demanded for a bill of rights that will guarantee the freedom of the internet as well as user’s privacy.

In London at the Web We Want festival, Sir Tim Berners-Lee said about the future of internet:-

“If a company can control your access to the internet, if they can control which websites they go to, then they have tremendous control over your life”

“If a government can block you going to, for example, the opposition’s political pages, then they can give you a blinkered view of reality to keep them in power.”

“Suddenly the power to abuse the open internet has become so tempting both for government and big companies.”

 

Sir Tim Berners-Lee who is aged 59 is the director of the World Wide Web Consortium, a federation which creates guidelines for the improvement of the internet.

He demanded for an internet version of Magna Carta, 13th century English agreement attributed with assuring basic rights and freedoms.

Apprehensions over the freedom and privacy on the internet have increased in the wake of the exposure of mass government monitoring of online action succeeding leaks by the former US intelligence contractor Edward Snowden.

A presiding by the European Union to allow individuals to ask search engines like Google to remove links to information about them, called as the “right to be forgotten”, he also elevated his concerns on the potential for censorship.

Sir Tim Berners-Lee said:-

“There have been lots of times that it has been abused, so now the Magna Carta is about saying… I want a web where I’m not spied on, where there’s no censorship”

He included that in order to be a neutral medium, the internet have to reveal all of humanity, even if it includes some ghastly stuffs.

Sir Tim Berners-Lee included:-

“Now some things are of course just illegal, child pornography, fraud, telling someone how to rob a bank, that’s illegal before the web and it’s illegal after the web”

SKYPE TO MAKE GROUP VIDEO CALLING FOR FREE ???

skype


Skype announced that it is making group video calling (GVC) available free of charge on Windows desktop, OS X, and the Xbox One. At the same time, the company is also promising it will enable group video calling across all platforms at no cost “in the future.”

Technews website thenextweb talked to Phillip Snalune, Skype’s General Manager of Consumer Product Marketing, to learn more, and he specifically listed apps for the following platforms: Windows modern (read: Metro app), Windows Phone, Android, and iOS. Unfortunately, he refused to share exact timing details.

source: softonic

Snalune also wouldn’t disclose how much revenue the feature has generated or how many users actively accessed it. Skype started charging for GVC in January 2011; to use the feature, at least one person on the call needed to have a Premium account ($4.99 for a day pass or $8.99 per month).

On the desktop, Skype can support up to 10 PCs and Macs for group video calling. On the Xbox One, up to four devices are supported. Snalune said Skype wasn’t ready to share yet how many devices other platforms would support, but the minimum will naturally be three.

Today, the company merely plans to inform existing paying users that the feature is now free. The vast range of calling packages offered by Skype that include the GVC component will continue to be sold at the same price, Snalune told TNW.As for why today was chosen to flip the free switch, Snalune merely said Skype wanted to offer “the best communication experience for our users” and that there was “a lot of demand” for group chat and group audio calling, so GVC was the next logical step. When pressed about whether Google Hangouts, which has offered free group video calling for a few years now, had anything to do with it, Snalune just said the decision was user-driven and the “appetite” for the feature was growing.

Skype is already known for 1:1 video calling, and now the Microsoft-owned company has finally realized groups matter as well. Whether it will become king for group video calling remains to be seen, but that is certainly a likely possibility.

SHARE YOUR INTERNET CONNECTION WITH ICS PREBUILT ON WINDOWS OPERATING SYSTEMS

This tutorial is compressed on three steps to share internet connection using ICS. One is enabling ICS, the second one is configuring ICS and the third is about making some changes to the remote computers.

Step I) Enabling ICS for Windows

So, first of all we are going to learn to enable Internet Connection Sharing (ICS) for Windows. You need to enable ICS on the Host computer means the main computer where your internet is mainly configured and connected.

  • Firstly, Click on Start Menu and then Click on Control Panel and now from Control Panel Search forNetwork and Sharing Center
  • Ones you have found Network and Sharing Center. Click on View Network Connections
  • Afterwards, you will have your Network Connection there. Now right Click on your Network Connection and Click on Properties. You might get a request to enter the Administrative Password, if you have set any. You have to enter your Password and Proceed
  • Then you’ll have a window with different tabs. You need to click on Sharing Tab and then from there you have to check mark the box where will be written, “Allow other network users to control or disable this computer’s internet connection

Sharing Tab will not be appear for you if you have only one Network Connection. You have to create two or more network connection to proceed with these steps

Windows, WIndows 7

  • Now the ICS has almost enabled for you
  • Ones you have enabled the ICS, your local area network will establish a new IP address and configuration

That means you have to configure and establish same IP Address on the others computers or networks where you want to share internet connection. To dig it more, you need to go through the configuration section which is our step II.

Step II) Configuration of TCP/IP

After enabling the ICS, it is time to configure the networks in order to ensure the Internet connection sharing and make you understand that, “how to share Internet Connection?”

You have to make sure that on your all computers, the Local Area Network is configured in order to get IP addresses automatically

  • Firstly, Click on Start Menu and then Click on Control Panel and now from Control Panel Search forNetwork and Sharing Center
  • Ones you have found Network and Sharing Center. Click on View Network Connections
  • Afterwards, you will have your Network Connection there. Now right Click on your Network Connection and Click on Properties. You might get a request to enter the Administrative Password, if you have set any. You have to enter your Password and Proceed
  • Afterwards, you’ll have a box and from there you have to Click on Internet Protocol Version 4 (TCP/IPv4) or the version six (TCP/IPv6)
  • Then you will have another window and from there Click on Properties

IP,Internet Connection

  • Now you have to check mark on the option Obtain an IP Address automatically or obtain an IPv6 automatically
  • In last Click on OK
  • Congratulations! You have configured ICS

Step III) Make Following Changes to Other Computers With Whom you want to Share your Network

So, now it is another most important thing which you have waited for. So after enabling and the configuration process of ICS. Now it is time to make some changes with the computer with whom you want to share your internet connection.

You need to make the following changes with those computer on which you want to share your Internet connection in order to make this guide work for you.

  • First of all open Start Menu and go to Control Panel
  • Afterwards, Click on Network and Internet and then Click on Internet Options or Internet Properties for Windows 8
  • Now you will have a box with different tabs, you have to Click on Connection tab and then Click onNever dial a connection
  • Furthermore, Click on LAN Settings

Lan, share internet connection,windows

  • Now you will have another dialog box and from there check mark the “Automatically detect settings and Use automatic Configuration Script”
  • Afterwards, under Proxy Server Check mark the box-Use a Proxy Server for your LAN
  • Finally, Click on OK

Final Verdict

Now you can easily share your internet connection with other computers with the help of this detailed article. I am sure this would be proven helpful and will work for you.

However, do not forget that this guide is for the Windows users. Hence, if you want to ask any questions related to this article. Then do share your queries with us. We shall try to remove your all related queries as soon as possible

In last, if you think that this detailed tutorial which has guided you that, “how to share internet connection using ICS helpful in Windows” then do appreciate us with your shares and likes. As your shares and likes mean a lot to us and they can help any of your friend as well.

SPEED UP YOUR INTERNET SPEED BY AT LEAST 20% IN WINDOWS XP,7,8,8.1 PC’S

TO SPEED UP INTERNET BY ATLEAST 20% FOLLOW THE STEPS :

Here’s a simple little thing you can do to increase your bandwidth by at least 20%.

Ok here we go…

1.) log on as Administrator.

2.) start – run – type gpedit.msc

3.) expand “local computer policy” and “Computer Configuration”

4.) then expand “administrative templates”

5.) then expand “network branch”

6.) Highlight the “QoS Packet Scheduler”

7.) on right window double click “limit reservable bandwidth”

8.) on setting tab check the “enabled”

9.) change “Bandwidth limit %” to 0

You’re done.It would be a good idea to reboot after this.