Whatsapp Video Calling Features - Get It

Whatsapp Video Calling Features - Get It
Facebook owned, leading messaging service Whatsapp have finally rolled out what its users expecting. After the End-to-End encryption on its service Whatsapp have started rolling out video calling features. The video calling option is now live on beta version on Whatsapp for Android.

Since the features is expected to rolled out first for iOS platform, but the latest release (v20.16.80) for android have the video call option. Video calling features is not a public rolled-out, not all the features available as of now.

The UI design of for the latest release of Whatsapp Apk remain same as earlier, but when a users tap on the call option, there it gives the two option as Audio Call or Video Call.

The features is not available till yet and there is no updates on the Playstore for the following. Right now we can use the video calling features, but stay tuned for more update from Facebook.

Here we are providing android version of the Whatsapp which have the video calling features, (Download from Here). This version is also compatible with Android 6.0 Marshmallow version. 
Read More

Guide for GATE 2016 Exam

Guide for GATE 2016 Exam
gate 2016

The Graduate Aptitude Test in Engineering (GATE) is an All-India Examination conducted by the five IITs and IISC, Bangalore, on behalf of the Ministry of Human Resources Development (MHRD), Government of India. The objectives of GATE is to identify meritorious and motivated candidates for admission to Postgraduate Programs Engineering at the National level. Every year one IIT or IISc is selected as the Organizing Institute.

The candidates studying in the final year or passed engineering or Master of Science courses are eligible to sit in the GATE 2016 examination conducted by the joint committee of IIT’s and IISc. The GATE scores is used for admission to PG programmes in the field of Engineering (i.e. M.E/M.Tech and direct PhD) in IIT’s, IISc and various other government and private institution located across the country. The GATE score is also used by various private and Public sector companies for screening candidates for employment purposes.

Why should we take GATE:
To pursue M.Tech program in a leading institute of the country. The benefits of M.Tech are:More and better companies are coming for Campus Placement in leading Institutes. Higher salaries are being offered for M.Tech as compared to B.E. M.Tech degree leads to specialization and furthering of interest in a certain area which may lead to Ph.D. M.Tech degree is a must for those wishing to apply for Faculty/Research positions in educational Institutes/R&D centers. Scholarship is paid during M.Tech, so no headache to parents for financial requirements. The M.Tech program is a 3 semester (18 months) program; so get more time to work out career opportunities.
Most importantly to get to be a part of any Nationally reputed Educational Institute and enjoy learning and research.

Overview of GATE 2016
 The GATE exam is conducted for admission to Post graduate engineering courses, whereas JEE Main 2016 is an entrance exam for UG engineering courses. The GATE 2016 will jointly administered by the IISc and seven IIT’s namely Mumbai, Delhi, Kanpur, Roorkee, Madras, Kharagpur, Guwahati. The GATE organizing institute will be responsible for end to end process and making coordination among the other administering institutes. The candidates who qualify the GATE exam and pursue the Masters programs and direct doctoral programs in Engineering, Technology, Architecture and doctoral programs will be given financial assistance by MHRD, government of India. Here in this article we will discuss complete details regarding GATE 2016, application procedure for the GATE exam, GATE exam Pattern, Eligibility criteria and process of selection Some Important points for GATES appearing students:

Important Dates:
  • Availability of GATE forms: October, 1st week 
  • Last Date for filling up forms: November, 1st week 
  • Exam Date: 2nd Sunday of February 
  • Results: March 31st 
  • General Information and Results are also published on the Web. 
Examination Details:The examination is a single paper of 3 hours duration and generally consists of Section A (Objective Type) which is of 75 marks and Section B (Problem Type) which is of 75 marks.Total: 150 marks.

GATES Exam patterns:

Students who're appearing for GATES exam should check the exam patterns earlier to know the types of question and its base marks.
The GATE question paper will comprises of two types of question as mentioned below:

Multiple Choice Questions (MCQ)

The multiple choice questions will carry 1 or 2 marks, these questions will have 4 alternatives for every question, and the candidates will have to answer only one correct response.

Numerical Answer Questions

They will carry 1 or 2 marks in each section of the question papers, the answer of these question will have to be entered by the candidate


So here are some basic  guidelines for GATES 2016. Hope its help you
Read More

Basic Key factors in website development

Basic Key factors in website development
Before you settle down to developing your website you need to have a well thought out plan ahead of you. This will ensure the success of the website once it is up and running. The design of your website has a lot to do with the way visitors perceive it once it is done. A number of aspects go into ensuring the success of your website.

Display of information
Anyone coming to your site wants to find information in an easy and quick manner. Most people will not spend a lot of time on a page that does not offer information in an easy manner. This is a very important factor for you to consider when designing your website as it is what will ensure you have people coming back for more information after the initial visit.

Content for your site

A lot depends on what you hope to achieve with the content that you have on your website. Content is mainly targeted at the people who visit your site and what it is they find there. There is also the consideration of how you rank on the search engines as well. Tools such as keywords can be used to help your site attract more visitors on search engines.

Color scheme

One of the best attractions to your site is having the right colors in place. You do not want to deviate from the information on display thereof but also should not override the purpose of it with too much color. Choose suitable colors and images for your product or service to help enhance the effectiveness of your site. It is how well you are able to get the message across that matters when it comes to good website development at the end of the day.

Layout design


For people to access information on your site a good layout is necessary. This is what will make information accessible to visitors and should be as simple as possible. Even the most inexperienced visitor should be able to find what they are looking for a short while on your website.

A lot of what goes into website development requires the hand of an expert. It is hard for a layman to get it right on first trial and many people seek out experts to help them build their websites. A look at Magicdust Review reveals that our team has a good standing when it comes to building websites for clients. Having done countless similar jobs with our team, we offer much more than merely putting up a website for you. Consideration goes into our work as we regard details of the website before the job begins. All factors are taken into consideration by our team to ensure that we capture every detail pertaining to your business beforehand.

It is worth investing into expertise when it comes to one of the most important marketing tool for your business. We have what it takes to build a successful website for any individual or company that requires our help.


Read More

Apple's Mac is Open Source Now

Apple's Mac is Open Source Now
Now everyone one turning to Open Source, as earlier Microsoft have announced that it is bringing Linux to Windows 10 by adding Bash Shell for porting SQL Server.

Here's again competition going and Apple won't going behind it. Apple announced open sourcing its Swift programming language last year. Now it has shocked the world by announcing that it is going to open source its flagship Mac OS X operating system.

Speaking at Worldwide Developer Conference (WWDC), on April 1st, Apple CEO Tim Cook said:
At Apple, we have always valued Open Source. We used BSD Kernel without even using BSD license. That was the first step towards Open Source. With Swift going Open Source, it is time to take the next big step and open source OS X. This will ensure our position as the leader of Open Source innovation.
The Free and Open Source version of OS X will be called FOSX.

Tim Cook further added that the OS X always meant Open Source X and the new F in FOSX stands for Free as in ‘weekly FREE App on Apple Store’. He also said that open source version of OS X will be fully compatible with Apple hardware. and if you buy a MacBook or iMac, it will come free with it.
Read More

Warning! First iOS malware found

Warning! First iOS malware found
Its been seen that iOS device is much effective as compared to Android regarding security issue. But now iOS device is also in danger.

Security company Palo Alto Networks announcedit found a Trojan that exploits flaws in Apple’s DRM without needing to abuse enterprise certificates, and they’re calling it “AceDeceiver.” Currently, AceDeceiver only activates when the device’s geotag is in China.

The process for how the malware works is a little complicated. According to Palo Alto Networks, AceDeceiver uses a mechanism called FairPlayMan-in-the-Middle, where attackers purchase apps and save the authorization code needed for it to work on an iOS device. People who download the client AiSiHelper, a program that mimics iTunes, will now be in possession of an infected computer. When they plug in their iOS device, attackers can send an authorization code to trick a victim’s device to make it believe it purchased the app, and then it will download it.

Once the app has been downloaded on a victim’s phone, it will prompt them for their Apple ID and password, which the attacker's then have access to.

According to Palo Alto Networks, this method has been used to pirate apps before, and this is the first time FairPlay MITM has been used maliciously. It also said the method is pretty simplistic, and is likely to be copied by other attackers. AceDeceiver could also be easily changed to work in regions besides China, although the security company said its region-locked activation makes it harder to be discovered by Apple or security firms.

Palo Alto Networks said that it notified Apple about AceDeceiver in late February and the AceDeceiver apps were promptly removed from the App Store.
Read More

Team GhostShell founder came with his Identity

Team GhostShell founder came with his Identity
Hackers group, hacking FBI, Pentagon, security
World's most nitrous hackers group Team GhostShell - which are behind some major cyber attacks including attacks on the FBI, NASA and the Pentagon as well as a leak that saw 2.5 million Russian “government, educational, academic, political and law enforcement” accounts compromised, now came forward and gives its own identity.

GhostShell was most active in 2012, penetrating the aforementioned hacks on US and Russian intelligence agencies, but the silence that came in the three years between their last public attack and the subsequent return wasn’t quite the death of the group that many thought it would be.

G Razwan Eugen, was the man behind the Team GhostShell. Eugen came forward with a generic email address named White Fox that claimed to be the leader of the infamous hacker collective.

He contacted to TWN security writer Bryan Clark, and Clark joined some other security journalist of wired, telegraph on the discussions. 
Without wasting a time all started discussions and verifying the claim (hacker). Verifying hackers is and always has been a tricky proposition. While it’s simple to verify that this person is a member of GhostShell, tying his true identity to that of a hacker pseudonym is infinitely more difficult.
Hackers, after all, are notoriously careful about keeping the two identities separate — OpSec mistakes in this crucial step are generally what lead to arrest.

To prove the true identity, he wrote story on mail (check below image), and also provide couple of account login screenshots like Twitter and Pastebin.

Group Pastebin account

Official Twitter account

Twitter account was used by the official GhostShell Twitter account (@TeamGhostBin) to disseminate leaked information before its suspension.

As this is not enough to prove the true identity, hence we can't relay on this.
Eugen told Bryan-
“I just want to own up to my actions, face them head on and hope for the best. What I really want is to continue being part of this industry. Cybersecurity is something that I enjoy to the fullest even with all the drama that it brings and legal troubles.
In return I hope other hackers and hacktivists take inspiration from this example and try to better themselves. Just because you’ve explored parts of the internet and protested about things that were important to you doesn’t mean you should be afraid and constantly paranoid of the people around you.”
Read More

Download Android N, Steps to Flash it

Download Android N, Steps to Flash it
Android N features, specs of Android N
We all know that Google had surprised everyone with announcement of the latest version of its mobile operating system, Android N Developer Preview. There are still two months to have Google I/O, but Google is clearly ready for the preview version of Android N.

As till yet only developer version had only been released, so we all have a doubt before flashing it to our regular using handset. Then also if you like to give a try with Android N, then here you find the link to the factory images for the Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Nexus 9 LTE, Nexus Player, and Pixel C, along with instructions on how to flash them.

Good luck!


Instructions for flashing factory images found here.
Read More

The Pentagon Wants You to Hack It

The Pentagon Wants You to Hack It
Hacking Pentagon system, Pentagon system hacked
US Defense team know as Defense Digital Service(DDS), which was established last year to bring US technology experts into the military, initiate the competition is called ‘Hack the Pentagon’, where they invites security experts and hackers to hack the Pentagon system.

The Pentagon has announced that it’s going to welcome outside hackers to help identify vulnerabilities in US Defense Department websites.

Currently US Defense Department has used internal “red teams” to test its networks but it hopes that by calling on external hackers, it will be able to deliver more comprehensive solutions.

Mean while the Pentagon hasn’t revealed any details of how the competition will work, it has said that it expects thousands of qualified applicants to get involved. There is also the possibility that it will involve a financial reward.

But to get into the competition is also not easy, as hackers have submit there background expertise to get into it.
Given that the DDS wants to bring more technology experts into the US military, it’s not out of the question that the winning hackers may end up with a change in career by the end of the project as well.
Read More

Know what Security Scanning of 396 Open Source Web application says: Infographic

Know what Security Scanning of 396 Open Source Web application says: Infographic
According to the latest reports of NetSparker , where they mentioned that since 2011 they had scanned 396 Open Source Web Applications with there automatic Web Application Vulnerability Scanner. In the vulnerability scanning they identified 269 issues and released 114 zero-day advisories. On this test conducted, only 30% of the open source web applications we scanned had some sort of direct impact vulnerability.

Top Most Vulnerabilities are:
Out of the 269 vulnerabilities the Netsparker web vulnerability scanners identified:
180 were Cross-site Scripting vulnerabilities. These include reflected, stored,DOM Based XSS and XSS via RFI.

55 were SQL Injection vulnerabilities. These also include the Boolean and Blind (Time Based) SQL Injections.

16 were File Inclusion vulnerabilities, including both remote and local file inclusions.

The rest of the vulnerability types are CSRF, Remote Command Execution, Command Injection, Open Redirection, HTTP Header Injection (web server software issue) and Frame injection.

Infographic about Report
Please include attribution to NetSparker | Cyber Kendra with this graphic.

Security test of Web Applications
Again XSS and SQLi are on top
Cross-site scripting vulnerabilities amount to 67% of all the identified vulnerabilities. SQL Injection vulnerabilities amount to 20% of the vulnerabilities. Together, these two vulnerability types amount to 87% of all the identified vulnerabilities.

Cross-site scripting and SQL Injection vulnerabilities have been included in the OWASP Top 10 since the project started, mainly because they are very easy to find and also very easy to exploit. And yet, even after years of raising awareness about these vulnerabilities, the majority of the web applications we use are vulnerable to these type of vulnerabilities.
Read More