Blog

  • Kali Linux – The Best Tool For Penetration Testing?

    Kali Linux – The Best Tool For Penetration Testing?

    [ad_1]

    Kali Linux – The Best Tool For Penetration Testing?

    The Best Tool For Penetration Testing ?

    The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing in mind. It is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In this blog post, we will discuss what penetration testing is, why Kali Linux is such a good tool for this activity, and how you can use it to test your own systems. We will also provide some tips for using Kali Linux effectively, and mention some other tools in its category.

    What Is Penetration Testing?

    Penetration testing, often known as “pentesting” or “security testing,” is the art of simulating an attack from a malicious individual to assess the security of a computer system or network. This can be done either manually or automated, and it typically involves trying to exploit vulnerabilities in order to gain access to sensitive data or systems. Penetration tests can be used to test both internal and external systems, and they are often used as part of a larger security assessment.

    Debian is the Linux distribution employed in penetration testing and security auditing. It includes dozens of tools that allow you to perform all sorts of attacks against your targets. In this blog post, we will discuss what penetration testing is, why Kali Linux is such a good tool for this activity, and how you can use it to test your own systems. We’ll show you how to use this Linux distribution efficiently, as well as other tools in the same category.

    Why Is Kali Linux Such a Good Tool for Penetration Testing?

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester.

    Some of the reasons why Kali Linux is such a good tool for penetration testing include:

    – It has a large number of pre-installed security tools, making it easy to get started with penetration testing.

    – Kali Linux is regularly updated with new features and tools.

    It’s easy to use. It’s completely free and may be used on a variety of platforms.

    How to Use Kali Linux for Penetration Testing: A Step-by-Step Guide

    There are a few things to think about before you start using Kali Linux for penetration testing. In particular, you need to choose your targets, gather information about them, and then select the appropriate tools for the job. Let’s look at each of these phases in further depth below.

    Choosing Your Targets

    The first step in any penetration test is choosing your targets. This can be done either manually or automatically, but it is important to make sure that you have permission from the owners of the systems before proceeding. In addition, you need to choose targets that are likely to be vulnerable to the types of attacks that you plan to use.

    Gathering Information

    The next stage is to obtain information about your target. This can include things like network diagrams, system architecture diagrams, and lists of installed software. You should also attempt to learn as much as possible about the individuals who work on the system, including their positions and duties.

    Selecting Tools

    After you have gathered information about your target, it is time to select the appropriate tools for the job. Kali Linux includes dozens of tools that can be used for penetration testing, so it is important to select the right ones for the task at hand. You should be aware of the various sorts of assaults you may make.

    Performing the Attack

    Once you have selected your targets, gathered information about them, and selected the appropriate tools, it is time to start attacking. This can be done in a variety of ways, but typically involves trying to exploit vulnerabilities in order to gain access to sensitive data or systems. Kali Linux includes a number of tools that make this process easy, so be sure to take advantage of them.

    Tips for Using Kali Linux Effectively

    Here are a few tips for using Kali Linux effectively:

    – Be familiar with the different types of attacks that you can perform.

    – Select the appropriate tools for the job.

    – Read the documentation for each tool before using it.

    – Keep your Kali Linux installation up to date.

    Other Tools in This Category

    In addition to Kali Linux, there are a number of other tools that can be used for penetration testing. Some of these include:

    What Does Penetration Testing With Kali Linux Mean?

    How to Install Metasploit on ubuntu 20.04

    How to make Hacking Machine under 7000 in 2021

    Penetration testing with Kali Linux means using the tools and features of Kali Linux to test the security of systems and networks. This can be done either manually or automatically, but it is important to make sure that you have permission from the owners of the systems before proceeding. In addition, you need to choose targets that are likely to be vulnerable to the types of attacks that you plan to use.

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester.

    Conclusion

    Kali Linux is one of the most popular security distributions in the world, and it includes dozens of tools that allow you to perform all sorts of attacks against your targets. In addition, Kali Linux is regularly updated with new features and tools, making it an essential tool for any penetration tester. If you want to use Kali Linux for penetration testing, be sure to familiarize yourself with the different types of attacks that you can perform, and select the appropriate tools for the job.

    [ad_2]

  • A Utility Designed To Aid In Bypassing User-Mode Hooks

    A Utility Designed To Aid In Bypassing User-Mode Hooks

     
    A Utility Designed To Aid In Bypassing User-Mode Hooks

    RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtCreateSection, NtOpenSection and NtMapViewOfSection found in the LdrpThunkSignature array. After that, there are two techniques that the user can choose to bypass the user-mode hooks.

    Technique-1, reads the NTDLL as a file from C:\Windows\System32\ntdll.dll. After parsing, the .TEXT section of the already loaded NTDLL (where the hooks are performed) in memory is replaced with the .TEXT section of the clean NTDLL.

    In Technique-2, NTDLL reads as Section from KnownDlls, \KnownDlls\ntdll.dll. (beacuse DLL files are cached in KnownDlls as Section.) After parsing, the .TEXT section of the already loaded NTDLL (where the hooks are performed) in memory is replaced with the .TEXT section of the clean NTDLL.

    The detailed flow of the methodology and all techniques is given below:

    How to Use

    You can open and compile the project with Visual Studio. The whole project supports x64 architecture for both Debug and Release modes.

    The RefleXXion-EXE solution generates the EXE for PoC purpose. If you want to understand how the project works step by step, it will make your job easier. Main function contains Technique1 and Technique2 functions definations. Comment one of them and compile. Do not use both functions at the same time.

    The RefleXXion-DLL solution generates the DLL that you inject into the process you want to bypass the user-mode hooks for NTDLL. At the beginning of the main.cpp file, there are definitions of which technique to use. You can choose one of them and compile it. Do not set all values at the same time, set only the one technique you want. Example configuration is given below.

    // Techniques configuration section
    define FROM_DISK 1 // If you set it to 1, the Technique-1 will be used. For more information; https://github.com/hlldz/RefleXXion
    define FROM_KNOWNDLLS 0 // If you set it to 1, the Technique-2 will be used. For more information; https://github.com/hlldz/RefleXXion

    Operational Usage Notes & OPSEC Concerns

    • RefleXXion currently is only supports for x64 architecture.
    • RefleXXion only unhooks NTDLL functions, you may need to unhook other DLLs (kernel32.dll, advapi32.dll etc.) as well. For this, you can easily edit the necessary places in the project.
    • The RefleXXion only uses the RWX memory region when overwriting the .TEXT section process starts. For this process a new memory reginon is not created, the existing memory region (the TEXT section of the NTDLL that is already loaded) is RWXed and then converted to RX.

    ULONG oldProtection;
    ntStatus = NtProtectVirtualMemory(NtCurrentProcess(), &lpBaseAddress, &uSize, PAGE_EXECUTE_READWRITE, &oldProtection);
    memcpy()…
    ntStatus = NtProtectVirtualMemory(NtCurrentProcess(), &lpBaseAddress, &uSize, oldProtection, &oldProtection);

    • P.S. The RefleXXion invokes the NtProtectVirtualMemory API over the cleanly installed NTDLL. It uses the CustomGetProcAddress function for this because the clean NTDLL is not in the In Load Order Module List even though it is loaded into memory. So a solution like here (https://stackoverflow.com/questions/6734095/how-to-get-module-handle-from-func-ptr-in-win32) will not work. That’s why the custom GetProcAddress function exists and is used.
    • You can load RefleXXion DLL from disk to target process. You may not prefer a run like this for sensitive work such as a Red Team operation. Therefore, you can convert the RefleXXion DLL to shellcode using the sRDI project or integrate the RefleXXion code into your own loader or project.
    • Even if NTDLL (as file or as section) is reloaded to the injected process, it does not remain loaded. RefleXXion close all opened handles (file & section handles) for own processes.

     

  • EU accuses Apple of market abuse with NFC and Apple Pay

    EU accuses Apple of market abuse with NFC and Apple Pay

    [ad_1]

    Above a desk somewhere at Apple HQ someone has probably pasted the slogan, “Another week, another lawsuit,” and this week seems no different as the EU is targeting Apple Pay, or to be more specific, how Apple constrains use of the NFC chip inside iPhones.

    What’s the claim?

    The second charge in Europe this year, EU antitrust regulators have alleged that Apple restricts competitors by denying access to the NFC (Near-Field Communications) technology it uses in its mobile wallet.

    Apple has been sent a statement of objections in which regulators detailed how it has abused its dominance position in markets for mobile wallets on iOS in contravention of Article 102 of the TFEU.

    Apple Pay has access to the NFC Input APIs, which the company does not make available to third-party payment firms. However, other platforms do permit third parties to access NFC tech to make such payments.

    The EU statement says it “does not take issue with the online restrictions nor the alleged refusals of access to Apple Pay for specific products of rivals that the Commission announced that it had concerns when it opened the in-depth investigation into Apple’s practices.”

    Both the latter matters were part of the investigation when it began in 2020, allegedly in response to complaints raised by PayPal.

    The case is different from the proposals within the EU Digital Markets Act, which will also affect Apple’s business. Apple is facing scrutiny and regulation in most of its major markets, including the UK, US, Korea, Europe, Japa,n and elsewhere.

    What the EU says

    “In our Statement of Objections, we preliminarily found that Apple may have restricted competition, to the benefit of its own solution Apple Pay. If confirmed, such a conduct would be illegal under our competition rules,” Executive Vice President Margrethe Vestager said in a statement.

    Regulators argue that Apple has significant market power in the mobile device market and dominates mobile wallets. The Commission argues that the company is abusing this power by reserving access to NFC tech on its devices to Apple Pay, to the detriment of competitors and consumers.

    Apple will now have time to examine the allegations and respond to them as part of the ongoing investigation.

    The Statement of Objections should not be confused with being a final judgement — though Vestager has already rejected counterarguments concerning security and regulators seem deaf to the need for user privacy.

    What Apple says

    In a statement provided to me, Apple defended itself, saying: “We designed Apple Pay to provide an easy and secure way for users to digitally present their existing payment cards and for banks and other financial institutions to offer contactless payments for their customers.

    “Apple Pay is only one of many options available to European consumers for making payments and has ensured equal access to NFC while setting industry-leading standards for privacy and security. We will continue to engage with the Commission to ensure European consumers have access to the payment option of their choice in a safe and secure environment.”

    It is worth noting that Apple recently opened the NFC chip to Apple developers for use with Apple’s Tap to Pay feature, which turns iPhones into card readers. This does not yet allow rivals to use the NFC chip to make payments from iPhones. Apple also recently published a report that showed how successful third-party apps could be on its platforms.

    What’s the history?

    Apple really began laying the foundations for payment tech in iPhones years before the 2014 introduction of Apple Pay. In 2010, it acquired contactless/near field communications tech firm, VIVOtech and soon recruited industry expert Benjamin Vigier as its product manager of mobile commerce.

    Vigier was likely a key hire to enable Apple’s plans; he also led development of mobile payment systems for Starbucks and Paypal. That hire wasn’t random. Apple had already filed patents for use of NFC tech by then, and speculation concerning Apple’s plans to hold flight tickets on iPhones had already begun.

    When Apple did launch the service, it did so long behind everyone else, but Apple Pay soon eclipsed that of similar services from Samsung, HTC, and others. It turned out that people making mobile payments wanted brand trust, security, and biometric identity to seal these transactions.

    Since then, Apple Pay has possibly become the most widely used NFC-based payment system in the world; it’s arguable that the iPhone maker has done more than most to break down initial consumer resistance to mobile payment systems.

    Why is this happening?

    Apple is a victim of its own success. When the company introduced the iPod and launched its iTunes ecosystem, it was a small company fighting for survival against Microsoft and others.

    The same basic business plan Apple used with iTunes was subsequently transposed around iPhone and the App Store. Today the company has become the world’s most valuable tech company, which means it is under a different set of rules.

    While before it was a small player fighting for position, today it has become a major firm and must anticipate scrutiny. It must also develop a new approach to this side of its business, while shoring up revenue elsewhere.

    It seems inevitable the mobile payments space would become messy.

    Arguably, most mobile payment systems have failed amid suspicion about the entire sector that emerged in 2010. Apple has built a far deeper currency of trust across its customer base and seems to have bigger ambitions in the financial services space. These ambitions inevitably pit the company against incumbents in the space, so it’s of little surprise to see the regulators getting involved.

    What’s at stake?

    Money. If the EU finds Apple guilty, it could be fined up to 10% of its global turnover, though it is unlikely to be punished to that extent. Apple Pay is used by more than 2,500 banks in Europe along with over 250 challenger banks and fintech services.

    In the background, we also have continued speculation around Apple’s plans to introduce new payment services and to extend Apple Card availability outside the US. Associated with this, we also hear rumors the company may intend to launch an Apple-as-a-service plan.

    What might happen?

    Apple seems ready to fight tooth and claw to protect its strategy of making some features platform specific. Total control of its ecosystem has always been part of its approach, so this is philosophically in keeping with that strategy.

    All the same, the shades of tech regulation cast heavy shadows on the company at this time, and as in any conflict resolution will eventually be reached through a combination of negotiation and regulation.

    This could take years, but the arguments being made elsewhere concerning its ecosystem probably also apply here.

    I think the ultimate question will be how much Apple can charge third-party companies for access to profitable parts of its system without being seen as anti-competitive. And to what extent will regulatory activity dilute the user experience?

    During the course of events, I imagine Apple will attempt to say that those complaining about its business practices in mobile payments are attempting to capitalize on its work, given other attempts to create systems as popular as its own have already failed.

    That argument likely won’t win regulators over to its position, but may help the company justify a right to demand a slice of any future transactions made using its platforms on services provided by third parties. I doubt the latter will get a free ride.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Best Ways to Hire a Hacker for Mobile Phone Hack: Hackers for Hire

    [ad_1]

    SolidarityHacker is an ideal choice if you want to hack iPhone remotely. With the help of this integrity hacker, you can monitor the internet usage of the target user, track their locations, check their emails and communication apps, such as social media platforms. Apart from this, you can also hack and monitor the calls they receive. Let’s find out more.

    SolidarityHacker provide this service. It comes with three options to choose from: 160 days, 365 days and 90 days. If you want to use this service, you may want to compare the three options and stick to the one that can best meet your needs.

    International hacking service: As a parent, if you want to monitor your kids’ activities, you can try out this service. It allows you to monitor all of the major social media platforms. The good thing is that you can check call logs, location of the phone and the web search history.

    Today, technology has made it possible to hack into someone’s iPhone and check their text messages from a remote location. Although you can choose from a lot of applications available out there, we suggest that you go for a service that comes with both fundamental and advanced features. Plus, it should be reasonably priced. One such app is known as global hacking service.

    How can you hack a cell phone without having physical access to it?

    Unlike iPhone, android operating system is much easier for hackers to steal information from. Not so long ago, researchers came to know about “Cloak and Dagger”, which is a new threat to Android devices. This is a type of hacking technique that allows hackers to take over a mobile phone device discretely. The moment a hacker gets unauthorized access to an Android phone, they can steal almost all of the sensitive data like the pin code of the phone, messages, keystrokes, chats, OTP, pass codes, phone contacts and passwords used by the mobile phone owner.

    How can hackers use SS7 vulnerability to hack a phone?

    SolidarityHacker makes use of the SS7 technique. With the signaling system 7, hackers need only the mobile phone number of the target user in order to track their location, phone calls and text messages. This is a loophole in the international mobile phone infrastructure.

    What is SS7?

    Basically, it is a group of protocols that allows mobile phone networks to send and receive the information required to pass text messages and phone calls and make sure that the info is accurate. Apart from this, it allows mobile phone users to use their cell phones to make calls during their stay a in a foreign country.

    How do hacks use the SS7?

    After accessing the SS7 system, hackers can steal all the information that can be accessed by security services. For example, they can monitor, receive, listen to you and record phone calls. Besides, they can also track SMS messages, location of the phone and other sensitive data.

    Who can be affected by the vulnerability?

    Anyone with the mobile phone device could be vulnerable to the attack. Regardless of the network type, you can hire the services of a hacker to get access to a mobile phone with the help of the ss7 system.

    [ad_2]

    Source by Shalini M

  • Check AWS S3 Instances For Read/Write/Delete Access

    Check AWS S3 Instances For Read/Write/Delete Access

    [ad_1]
    Check AWS S3 Instances For Read/Write/Delete Access

    S3Sec tool was developed to quickly test a list of s3 buckets for public read, write and delete access for the purposes of penetration testing on bug bounty programs.

    Installation

    Clone the git repo onto your machine:

    git clone https://github.com/0xmoot/s3sec

    Usage

    Check a single S3 instance:

    echo “test-instance.s3.amazonaws.com” | python3 s3sec.py

    Or:

    echo “test-instance” | python3 s3sec.py

    Check a list of S3 instances:

    cat locations | python3 s3sec.py

    Setup AWS CLI & Credentials (optional)

    To get the most out of this tool you should install the AWS CLI and setup user credentials.

    With AWS CLI a series of deeper tests (including unsigned read, writing files and deleting files) is activated:

    Installing AWS CLI on Kali Linux

    To install AWS CLI you can simply install using below command:

    pip3 install awscli

    Getting AWS Credentials (Access Key ID and AWS Secret Access Key)

    • Sign up for Amazon’s AWS from their official website: https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&all-free-tier.sort-order=asc
    • Login into your AWS account and click on My Security Credentials.
    • Click on Access Keys (access key id and secret access key) to get your login credentials for AWS CLI.
    • Then click on Show Access Key option to get your Access Key ID and Secret Access Key or you can download it as well.

    Configuring AWS CLI on Kali Linux

    • Start a terminal and enter the below commands then enter the AWS Access Key ID and AWS Secret Access Key that was created in previous steps.

    aws configure

    Use the following default settings:

    AWS Access Key Id: <>
    AWS Secret Access Key: <>
    Default region name: ap-south-1
    Default output format: json

    10 Most-Recommended Books for Software Developers

    Android Vs IOS App Development in Singapore

    [ad_2]

  • 10 Most-Recommended Books for Software Developers

    10 Most-Recommended Books for Software Developers

    [ad_1]

    To be clear, reading these books will not make you a brilliant developer; you will need years of experience to achieve that, but you will gain insight into some guiding concepts that you may apply. Furthermore, by reading them, you will avoid committing certain common development mistakes.

    This list is not complete, as there are always some new and good books, but these ones made the most impact in the careers of many software developers and as there are mostly languages agnostic, they can be applied by using any programming language.

    A continuous learning mindset is a key quality of a software developer who wants to stay relevant and grow their market value. Codelivly has prepared a list of 10 most popular books on software engineering to help you with that.

    This list is a must for developers who want to be aware of the latest trends and open their minds.

    #1 Python Crash Course by Eric Matthes

    This is the second edition of the world’s best-selling Python book. Python Crash Course, Second Edition is an easy-to-understand introduction to the fundamentals of Python programming. Instead of providing a foundation in general programming principles, Python fundamentals, and issue solving, author Eric Matthes opts for a foundation in general programming concepts, Python fundamentals, and problem solving. The book’s second section includes three real-world projects that allow readers to put their knowledge to good use.

    Readers will learn how to create a simple video game, use data visualization techniques to make graphs and charts, and build and deploy an interactive web application. Python Crash Course, 2nd Edition teaches beginners the essentials of Python quickly so that they can build practical programs and develop powerful programming techniques.

    Python Crash Course by Eric Matthes
    Books for programmerPython Books
    Python Crash Course by Eric Matthes
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #2 Head First Design Patterns by Eric Freeman, Elisabeth Robson

    What will you learn from this book?

    You don’t want to recreate the wheel, so you turn to Design Patterns, which are the lessons learnt from others who have experienced similar software design challenges. With Design Patterns, you can take use of other people’s best practices and experience so you can focus on something more difficult. Something a little more enjoyable. This book explains the patterns that matter, when and why to use them, how to apply them to your own ideas, and the object-oriented design concepts that underpin them. Hundreds of thousands of developers have used Head First Design Patterns to improve their object-oriented design skills.

    What’s so special about this book?

    If you’ve ever read a Head First book, you’ll know what to expect: a visually rich format tailored to your brain’s needs. With Head First Design Patterns, 2E, you’ll learn design concepts and patterns in a method that won’t put you to sleep, so you can get out there and solve software design challenges and communicate with people on your team in the language of patterns.

    Head First Design Patterns by Eric Freeman
    Head First Design Patterns by Eric Freeman
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #3 Fluent Python by Luciano Ramalho

    Python’s simplicity lets you become productive quickly, but often this means you aren’t using everything it has to offer. With the updated edition of this hands-on guide, you’ll learn how to write effective, modern Python 3 code by leveraging its best ideas.

    Don’t waste time trying to make Python fit patterns from other languages. Discover and use idiomatic Python 3 capabilities that go beyond your previous knowledge. Author Luciano Ramalho walks you through Python’s key language features and modules, showing you how to make your code shorter, faster, and easier to read.

    Featuring major updates throughout the book, Fluent Python, second edition, covers:

    • Special methods: The key to the consistent behavior of Python objects
    • Data structures: Sequences, dicts, sets, Unicode, and data classes
    • Functions as objects: First-class functions, related design patterns, and type hints in function declarations
    • Object-oriented idioms: Composition, inheritance, mixins, interfaces, operator overloading, static typing and protocols
    • Control flow: Context managers, generators, coroutines, async/await, and thread/process pools
    • Metaprogramming: Properties, attribute descriptors, class decorators, and new class metaprogramming hooks that are simpler than metaclasses.
    Fluent Python by Luciano Ramalho
    Fluent Python by Luciano Ramalho
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #4 Learning Go by Jon Bodner

    Go is quickly becoming the language of choice for developing online services. While there are several tutorials available to teach Go’s syntax to developers with prior programming knowledge, they are insufficient. Developers wind up reproducing patterns that don’t make sense in a Go context since they don’t explain Go’s idioms. This practical guide gives you the background you need to write idiomatic and simple Go.

    No matter your level of experience, you’ll learn how to think like a Go developer. Author Jon Bodner introduces the design patterns experienced Go developers have adopted and explores the rationale for using them. You’ll also get a preview of Go’s upcoming generics support and how it fits into the language.

    • Learn how to write idiomatic code in Go and design a Go project
    • Discover how Go’s features allow the language to run efficiently
    • Know which Go features you should use sparingly or not at all
    • Understand the reasons for the design decisions in Go
    • Set up a Go development environment for a solo developer or team
    • Learn how and when to use reflection, unsafe, and cgo
    Learning Go by Jon Bodner
    Learning Go by Jon Bodner
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #5 Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin

    Even poor code can get the job done. However, if code isn’t well-written, it can knock a development team to its knees. Poorly written code wastes countless hours and major resources every year. It doesn’t have to be that way, though.

    What kind of work will you be doing? You’ll be reading code—lots of code. And you will be challenged to think about what’s right about that code, and what’s wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft.

    Readers will come away from this book understanding

    • How to tell the difference between good and bad code
    • How to write good code and how to transform bad code into good code
    • How to create good names, good functions, good objects, and good classes
    • How to format code for maximum readability
    • How to implement complete error handling without obscuring code logic
    • How to unit test and practice test-driven development

    This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code.

    Recommend Books 📚

    Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin
    Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin
    Recommend Books 📚
    Recommend Books 📚 Show Less

    #6 Software Engineering at Google by Titus Winters, Tom Manshreck, Hyrum Wright

    Today, software engineers need to know not only how to program effectively but also how to develop proper engineering practices to make their codebase sustainable and healthy. This book emphasizes this difference between programming and software engineering.

    How can software engineers manage a living codebase that evolves over time and responds to changing requirements and demands? Software engineers Titus Winters and Hyrum Wright, as well as technical journalist Tom Manshreck, give a candid and incisive look at how some of the world’s finest practitioners develop and maintain software, based on their experience at Google. This book examines Google’s distinct engineering culture, procedures, and tools, as well as how these elements contribute to an engineering organization’s effectiveness.

    You’ll explore three fundamental principles that software organizations should keep in mind when designing, architecting, writing, and maintaining code:

    • How time affects the sustainability of software and how to make your code resilient over time
    • How scale affects the viability of software practices within an engineering organization
    • What trade-offs a typical engineer needs to make when evaluating design and development decisions
    Software Engineering at Google by Titus Winters, Tom Manshreck
    Software Engineering at Google by Titus Winters, Tom Manshreck
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #7 Effective Java by Joshua Bloch

    Since the previous version of Effective Java was published shortly after the release of Java 6, the language has changed substantially. This Jolt Award-winning classic has been completely rewritten to take use of the most recent language and library capabilities. The availability of numerous paradigms in current Java raises the need for particular best-practices guidance, which this book provides.

    As in previous editions, each chapter of Effective Java, Third Edition, consists of several “items,” each presented in the form of a short, stand-alone essay that provides specific advice, insight into Java platform subtleties, and updated code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why.

    The book covers:

    • Functional interfaces, lambda expressions, method references, and streams
    • Default and static methods in interfaces
    • Type inference, including the diamond operator for generic types
    • The @SafeVarargs annotation
    • The try-with-resources statement
    • New library features such as the Optional interface, java.time, and the convenience factory methods for collections
    Effective Java by Joshua Bloch
    Effective Java by Joshua Bloch
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #8 The Pragmatic Programmer: your journey to mastery by David Thomas, Andrew Hunt

    The Pragmatic Programmer is one of those rare technical books that you’ll read over and over again. Whether you’re a beginners to the profession or a seasoned pro, you’ll always walk away with new perspectives.

    Topics range from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse. Read this book, and you’ll learn how to:

    • Fight software rot
    • Learn continuously
    • Avoid the trap of duplicating knowledge
    • Write flexible, dynamic, and adaptable code
    • Harness the power of basic tools
    • Avoid programming by coincidence
    • Learn real requirements
    • Solve the underlying problems of concurrent code
    • Guard against security vulnerabilities
    • Build teams of Pragmatic Programmers
    • Take responsibility for your work and career
    • Test ruthlessly and effectively, including property-based testing
    • Implement the Pragmatic Starter Kit
    • Delight your users
    The Pragmatic Programmer: your journey to mastery by David Thomas
    The Pragmatic Programmer: your journey to mastery by David Thomas
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #9 C# 9.0 in a Nutshell by Joseph Albahari

    This best-selling guide contains all the answers to your questions concerning C# 9.0 and.NET 5. C# is a language with extraordinary flexibility and depth, but there’s still a lot to learn thanks to its ongoing development. This totally revised edition, in the style of O’Reilly’s Nutshell guides, is simply the best one-volume reference to the C# language available today.

    Organized around concepts and use cases, C# 9.0 in a Nutshell provides intermediate and advanced programmers with a concise map of C# and .NET that also plumbs significant depths.

    • Get up to speed on C#, from syntax and variables to advanced topics such as pointers, records, closures, and patterns
    • Dig deep into LINQ with three chapters dedicated to the topic
    • Explore concurrency and asynchrony, advanced threading, and parallel programming
    • Work with .NET features, including regular expressions, networking, spans, reflection, and cryptography
    C# 9.0 in a Nutshell by Joseph Albahari
    Books for programmer
    C# 9.0 in a Nutshell by Joseph Albahari
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    #10 40 Algorithms Every Programmer Should Know by Imran Ahmad

    Algorithms have long been crucial to both the science and practice of computers. Aside from classical computers, the ability to employ algorithms to address real-world problems is a vital skill for any developer or programmer. This book will not only teach you how to choose and use algorithms to solve real-world issues, but also how to comprehend how they function.

    What you will learn:

    • Explore existing data structures and algorithms found in Python libraries
    • Implement graph algorithms for fraud detection using network analysis
    • Work with machine learning algorithms to cluster similar tweets and process Twitter data in real time
    • Predict the weather using supervised learning algorithms
    • Use neural networks for object detection
    • Create a recommendation engine that suggests relevant movies to subscribers
    • Implement foolproof security using symmetric and asymmetric encryption on Google Cloud Platform (GCP)

    Who this book is for:

    This book is meant for programmers and developers who want to learn how to utilize algorithms to solve problems and write efficient code. This book will help you master the most commonly used algorithms in a straightforward and lucid manner, whether you’re a novice or an experienced programmer interested in exploring cutting-edge algorithms in data science, machine learning, and cryptography. Although Python programming experience is required, data science knowledge is beneficial but not required.

    40 Algorithms Every Programmer Should Know by Imran Ahmad
    Books for programmer
    40 Algorithms Every Programmer Should Know by Imran Ahmad
    Get Amazing Products Daily
    Get Amazing Products Daily Show Less

    Happy Learning

    [ad_2]

  • Otter.ai argues remote meetings can be more productive than in-person

    Otter.ai argues remote meetings can be more productive than in-person

    [ad_1]

    Otter.ai has been updated for iOS, introducing new tools that move it forward from being a transcription solution toward becoming a work productivity hub. Sam Liang, Otter.ai co-founder and CEO, told me a little about the company’s plans.

    Otter wants to make distanced working meaningful

    We know the pandemic accelerated adoption of remote and hybrid working practices. While this was a visible direction before COVID-19, the need to maintain distance meant even the most refusenik bosses had to support Work from Home (WFH), at least for a while.

    It is, of course, true to say that some of these hard-won freedoms have been eroded in some workplaces of late, but remote and hybrid work has seen wider acceptance than ever before. Even Apple, albeit reluctantly, seems to have accepted that staff don’t need to be in the office every day of the week.

    A recent Topia study claims 94% of employees think they should be able to work from anywhere, so long as they get their work done. With 34% of workers prepared to resign this year if they don’t get the flexibility they need, it’s only a matter of time before employers truly embrace these new workflows. It turns out that most businesses are run by humans, and they need to be heard.

    Perhaps inevitably, remote work prompted a huge shift toward virtual and hybrid meetings. Otter claims over 500 million people attend such meetings daily. The company has seen a 400% increase in the number of meeting minutes it’ transcribed year-on-year — from 3 billion minutes to 12 billion in the last 12 months.

    Even while changing the way we work represents a cultural shift that makes some business leaders uncomfortable, it also enables real advantages to smart companies willing to engage with the trend.

    Where we are going

    Liang explains:

    “Before the pandemic, the traditional norms of how meetings were conducted and how businesses were run did not always leverage the skills of everyone and didn’t encourage collaboration,” he said.

    “We lived in an extroverted world where meetings were dominated by people who could hear and process information, not worry about distractions, and liked to speak up. This type of communication not only was exclusive and lacking accessibility for many professionals, it prevented a lot of valuable productivity and collaboration.”

    Remote work changed this dynamic. It created a slightly more equal environment in which introverts gained a better chance to be heard. And tools like Otter are yielding additional benefits, such as in accessibility. Hard-of-hearing employees can join a meeting and use Otter’s real time transcription to follow the conversation in real time. 

    “In this new hybrid work world, more companies are enabling new modalities, meetings, use cases — inherently pushing new tools into the world that empower businesses to leverage all of their talent more and encourage collaboration,” the Otter CEO told me.

    The impact? Many improvements in work/life balance that give employees the flexibility they need to do their job both in and out the office, asynchronously, when and where they need to be — with the addition of boosted productivity to ice that cake.

    That’s the context, so what’s new in Otter.ai?

    Otter.ai’s new tools

    The new Otter.ai introduces a series of useful tools to help augment communication using technology – and delivers tools that may optimize those meetings for you.

    The Home Feed & Calendar feature, for instance, acts as a central repository of information about your meetings, making it easy to access conversations, highlights of conversations, and any tagged action items.

    If you connect your calendar, you’ll also see any upcoming scheduled meetings and can invite Otter Assistant to join in, capture, and share meeting notes. You can also ask the assistant to attend and capture a meeting on your behalf if you can’t make it.

    Meeting Gems is another useful tool. These can be generated directly from your meeting by highlighting snippets within the notes. You can use them during the meeting to quickly flag action items or decisions, and then assign, comment, or query those items.

    [Also read: In the new workplace, all we want is a chance to Flow and grow]

    Why this matters

    I think most people can remember when in-person meetings became something like vast workplace icebergs looming into your schedule. You’d know that no matter how busy you happened to be, for the entire period of that meeting you’d get nothing done. You’d sit in a meeting room with your teams to listen to the most dominant voices (and the rare and often-ignored quiet ones) and if you were lucky, someone might remember to take notes.

    Poorly managed meetings become a colossal waste of time. This kind of meeting etiquette has been forced to change with the advent of the pandemic. Not only did workers quickly find that taking notes was incredibly important for there to be any chance to make meetings effective, but collaboration software providers soon saw the need to integrate with other solutions to make meeting time productive. Zoom Marketplace (where Otter is also available) is an illustration of how that company recognized this.

    Liang said Otter’s primary mission is to make communication productive. Given the root of the solution is AI, he explained: “One way of doing that is turning voice conversations into automated actionable insights,” he said.

    To get some sense of the approach Liang’s company is taking, he pointed to Automatic Outlines, another new tool currently in beta with business users. It’s a simple but incredibly useful solution to automatically create a meeting summary, “so you and your colleagues can easily access a summary of what was discussed.”

    The final score?

    No one ever really needs to leave a meeting without notes again – and you don’t even need to be at a meeting to gain insight into what happened.

    In my opinion, the steady confluence of all these technologies means remote meetings will soon become more effective than in-person interactions, because the technology has evolved to augment in-meeting communication with tools to support the realization of the intent.

    How much it costs

    Not all the new features are available to every user. Otter offers four pricing tiers, the Basic free service, Pro ($8.33 per month), Business ($20 per month) and an Enterprise tier, which is negotiated with large clients. Of the new features, Basic users can access Meeting Gems.

    Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

    Copyright © 2022 IDG Communications, Inc.



    [ad_2]

  • Android Vs IOS App Development in Singapore

    [ad_1]

    It is not surprising that Singapore businesses opt for a mobile-first strategy as APAC reported over 50% smartphone penetration in the country last year. It claimed that the average smartphone user in Singapore had around 40 apps installed at a time on their smartphone. Most of these apps belong to the social media category as 64% of the population is active on social media according to We Are Social in 2016. The other major attraction is gaming as App Annie showed the top ranked at the Apple store being Minecraft, Clash Royale, Monopoly, Mobilestrike and of course the latest sensation, Uber.

    Since the dawn of the mobile app era, users have been pulled in two main directions: Android or iOS. Windows is still a popular operating system but it’s obviously not in the running for the top spot anymore. There are several other operating systems, which are employed by small segments of mobile app users. However, they do not occupy key positions in the mobile app market.

    Position of Apple in Singapore

    Apple has a lot of credibility among peers and consumers alike. It has a much focused marketing strategy that shows clearly in iOS apps. Apple is in a class all its own and all the competition out there knows that. It has a strong presence all over Asia, especially Singapore, as the city is a thriving technology hub. Many of them are based here and working as freelancers for companies in the West that outsource. App users are accustomed to the best and gravitate towards iOS devices for that reason. The Next Web revealed that the country had the most iOS devices per population these past few years.

    Google as seen in Singapore

    Android is a different story altogether. The marketing strategy of Google differs greatly from that of Apple. These tech giants appear to be moving their brands in completely opposite directions. They don’t have the same goals and as I will explain, their target audience is not exactly the same. Most Asian economies are third world countries so a majority of smartphone users turn to Android.

    There are some key factors which determine the current situation of Android and iOS apps in Singapore.

    Monetization of apps

    App development is a business so like any other, it runs on money. If you visit an app store, you will notice that the top downloads are all free. Everyone loves free stuff and Singapore users are no different. The age of the smartphone has raised user expectations considerably. With UX in the spotlight, app developers in Singapore have stepped up their game. Obviously, much investment goes into building an app so businesses are reluctant to launch it as free. Some excellent monetization strategies have been introduced such as in-app marketing. A lot of businesses currently offer free apps with premium plans that have paid advanced features.

    This tactic is true for most Android apps at Google Play Store but iOS apps do not follow the same road. Apple users tend to be loyal and do not mind paying for high quality apps. They are accustomed to paid apps. Many iOS apps have multiple price packages depending on the level of features you wish to use. The trend towards free apps with premium plans is on the rise as App Annie displays the paid ones are mostly games like Minecraft on iOS.

    Economy & budget

    When you have a brand like Apple, you know you are getting your money’s worth. As iOS devices are well loved, app developers tend to give priority to this operating system. Of course, another factor comes in play here. Apps are all about providing superb UX and usability so the app developer will need to look at user preferences. If your target audience consists mostly of the upper crust, you can blindly decide to go for a native iOS app. It is no secret that Apple devices and software is quite expensive as compared to that of Android. Those who can afford them invariably go for iPhone, iPads and other Apple devices.

    Most of the Asian population cannot afford to buy and maintain iPhones so Android is the next best choice for them. It is not a loss because Google has so much variety in devices and constantly upgrades its operating systems. There is something for everyone as you can find both affordable smartphones and luxury ones among Android devices. If a business is trying to reach a wider audience then Android apps can really boost their earnings.

    App development plan

    You will discover native, hybrid and cross-platform apps but native ones are high preferred as they give flawless UX. Native app developers are in high demand in Singapore and are paid quite well too. Android app development becomes relatively complex if you need to build it for multiple versions. It also takes longer this way. Although iOS apps do not present the same issues, they are more expensive to develop.

    [ad_2]

    Source by Sid Malik

  • Think the video call mute button keeps you safe? Think again

    Think the video call mute button keeps you safe? Think again

    [ad_1]

    Have you recently been on a video confefence call, hit the “mute” button and then offered up some nasty comments about a client or a colleague — or even the boss?

    Or maybe while in a conference room with colleagues — muted — and pointed out that some proposed action would violate the terms of a secret acquisition in its final stages?

    If you were comfortable that the mute button was actively protecting your secret, you shouldn’t have been.

    Thanks to some impressive experimentation and research from a group of academics at the University of Wisconsin-Madison and Loyola University Chicago, utterances made while the app is in mute are still captured and saved into RAM.

    On one level, this is something we all already knew. When a user is muted and says something, most videoconferencing apps will display a note alerting the user that they’re talking while muted. How could it say that if it weren’t listening while the mute button is on? 

    Just as Apple’s Siri or Amazon’s Alexa are always listening for a command word, so, too, are those “muted” applications. 

    The real question is whether those captured utterances are at meaningful risk for being accessed by an attacker or an insider. First, anything saved in volatile memory is lost — theoretically — the instant the machine restarts or shuts down. Therefore, we are looking at the exposure after the utterance is made and before that machine restarts. Depending on the user’s behavior, that timeframe might be a few hours, a couple of days — possibly multiple weeks. 

    Generally, stealing data from volatile memory is difficult, but not impossible. As the report authors said in a group interview, if a bad guy gets into volatile memory, the user and the enterprise have a lot bigger concerns than some saved utterances during a mute. Still, it could happen.

    The mute issue is solely based on the app and how it handles such data.

    One of the lead authors of the report is Kassem Fawaz, an assistant professor in the Electrical and Computer Engineering Department at the University of Wisconsin-Madison who is also affiliated with Wisconsin’s Computer Sciences Department. 

    “The main implications have to do with the inherent trust users are placing in these videoconferencing apps,” Fawaz said. “We did not find evidence of audio leaving the user’s devices. The only exception was telemetry data leaving from Cisco Webex, which has been fixed since our disclosure to Ciscom. However, even when the user presses the mute button, the app still has access to the audio stream and the user is trusting that the app is well-behaved. The other implication is that the mute functionality — similar to turning off the camera — should not be left to the app, but should be either OS-controlled or hardware-controlled.”

    Fawaz’s point about the camera is that the team found that a camera “off” button truly halted any video from being captured in any way. Not so much with audio. Sometimes, the browser can make a difference.

    “On Chrome, mute means mute,” Fawaz said. “We can’t say about Safari or Firefox.”

    The university’s report was mostly about trust in the app makers. If the vendors are acting honorably and respecting privacy, cybersecurity, and security compliance issues, then the risk is minimal. If they are not acting that way, users and enterprises could be in trouble.

    The report didn’t draw conclusions on how the app makers were behaving, but merely stressed that each one can go in its own direction.

    That said, the rules of secrecy and even the rules of being a nice person should apply here. With the imminent-acquisition scenario, if you’re not allowed to discuss certain details, don’t say them in front of a microphone with outsiders regardless of what the mute toggle displays. As for being nice, how about not saying nasty comments about your colleagues or clients at all? 

    The cardinal rule of email and security/compliance is, “Before you type an email/message, envision yourself testifying to it in open court. If that makes you uncomfortable, don’t type it.” It’s not a far leap to extend that rule to speaking something in front of a microphone. 

    For example, I use an Apple Watch. Several times during a typical day, it will say loudly “I didn’t understand that” or “Here’s what I found on that topic.” Although it is highly annoying and frustrating, it’s an effective reminder that I need to take that watch off before saying anything that I don’t want the world to know.

    You need to keep in mind the same thing when using a mobile device or a desktop device — especially while using a videoconferencing app.

    Copyright © 2022 IDG Communications, Inc.

    [ad_2]

  • Top 5 Books for Mastering Custom Android Application Development

    [ad_1]

    Android-based smartphones are flooding the market. While the iPhone continues to dominate the US market, Android smartphones and tablets from different manufacturers like Samsung, Asus, Sony, and HTC are selling like proverbial hot cakes all over the world. At a time like this, the demand for custom Android apps development is extremely high.

    Developers and programmers who possess the ability to create custom apps for Android on the basis of client requirements can make a lot of money. Seasoned developers can learn Android development and create apps through the help of tutorials and books. While a basic understanding of programming is essential for people who are planning to develop apps on their own, you don’t have to be an expert at mobile development to teach yourself how to build apps for Android mobile devices.

    The following are five of the best books that will help you hone your skills and teach you how to create custom apps for one of the most popular mobile platforms of our time.

    1. Android Application Development All-in-One

    Written by Donn Felker and a part of the “Dummies” series, this book is ideal for people who have never tried their hands at developing mobile apps. As the title suggests, the book covers all the different aspects related to developing apps for Android. It begins with the basics: how to download the Android SDK and how to use Eclipse to create apps. By the end, it gives detailed instructions on how to submit the apps, how to price them and how to market them.

    2. Beginning Android Tablet Application Development

    It is not just Android-based smartphones that are succeeding – Android tablets are doing quite well too. Developing apps for mobiles is quite different from development apps for tablets. This book, authored by Wei-Meng Lee teaches you how to use Android 3.0 Honeycomb and later versions of the operating system to build apps that work perfectly with different Android tablet devices.

    3. Sams Teach Yourself Android Application Development in 24 Hours

    Authored by Lauren Darcy and Shane Conder, this is the ideal book for seasoned developers who want to master app development for Android quickly and efficiently. The book is broken down into 24 sections; developers can tackle each section in about an hour. It covers all the common aspects of programming Android apps, including designing, developing and marketing Android apps using different versions of the operating system.

    4. Professional Android 4 Application Development

    Part of the Wrox Professional Guide series, this book, written by Reto Meier, helps you create cutting-edge applications using Android 4 version. Whether you are a newbie plunging in the world of mobile development, or are an experienced developer, looking to unravel the mysteries of the latest versions of Android, this is the book you need.

    5. App Inventor for Android: Build Your Own Apps – No Experience Required!

    If you know nothing about mobile development or Android, but want to benefit from the popularity of Android by creating innovative apps, this is the book for you. Written by Jason Tyler, this is an immensely accessible book that even developers with limited experience can comprehend. Not only does it teach the basics of app programming, but it also walks you through the development and integration of several handy Android OS features.

    To wrap it up

    After learning these skills, developers can either work for a mobile development company, or they can create apps on a freelance basis. You can also make a lot of money by developing apps on the basis of your own concepts. The best part is that when you sell the apps on Android, you get to keep 80% of all the sales revenue your app generates!

    [ad_2]

    Source by Sebastian Atwell