Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Thursday, December 24, 2015

How to Track Lost Android Phone and Tablet

Track cellphone and tablet
Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number

Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B

Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager

Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site https://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet.

by Phr3ak

Wednesday, December 9, 2015

How To Chat With Friends On-line Without Being Tracked By The NSA

The latest scandals with Edward Snowden, news about Internet users were spied on by law enforcement agencies in a number of countries and the rumors regarding the fact that many large Internet companies leak confidential information on network users are a wake-up-call to the users who require reliable, private and state of the art security services. Any downloading software, as practice shows, can be equipped with the so-called “backdoors” for data interception. The phones also ping cell towers all the time as there's no other way for them to function. Pinging means those cell towers know the phone's location which, essentially,  makes it a tracking device.


All those events made us think of searching for an alternative and safe channel of communication with friends and business partners, anonymous web surfing and file sharing solutions.


So is there any way to stay anonymous during the age of the Internet?

An obvious answer to that would sound something like this: 'Throw your phone, laptop, desktop out of the window, pay for everything with cash and don't talk to strangers'. Of course, that approach (even though it's actually the safest option) wouldn't work for most users which leaves us with extreme to-be-or-not-to-be types of choices. This article explores ways of preserving both: your digital life and your privacy.

Choose your software carefully

You may find many recommendations on-line on how to tune your PC to protect yourself from viruses and phishing scams. They all may or may not achieve the same goal but the primary question is, “can you really trust the software that you are protecting you from viruses and can you be sure it's not a major tracking virus itself?”

There's a lot of info on the web about ‘how famous software companies report all the bug-fixes to the NSA'; which sounds like a scary thought.
This, of course does not mean there's 100% assurance that all systems do not give info away. It is a fact that alternative OS's do not have as many viruses as the most popular ones.  Therefore, if you're a security geek it is a good idea to consider shifting to a different OS. One great example is Qubes OS, a Linux distribution that runs its programs inside dedicated virtual machines reducing the amount of potential vulnerabilities.

 

Browser Wars

This time it's not about speed, it's about security. Having the concept of an OS tracking should make you avoid private web-browsing on native browsers such as Internet Explorer or Safari. The latest versions of all four major browsers including Microsoft Internet Explorer, Mozilla Firefox, Google Chrome and Apple Safari, were hacked at Pwn2Own Hacking Competition 2015. To save your private life online you can use alternative browsers, like the Midori Web browser, which, by the way, features the anonymous search engine 'DuckDuckGo' by default, Epic browser or open-source project Chromium. It's just so happens that Firefox started “safe internet” and still epitomizes it.

 

Use a VPN

Virtual Private Networks are getting more popular. The popularity of these services is justified by the level of anonymity they're able to provide. A VPN server encrypts all of your traffic. They will hide your IP address and location by giving you their own IP address. Surf securely without footprints and leave your online privacy untouched. You can choose to be a resident of South Africa, Argentina or Belize if so desire. If your VPN provider has decent encryption there's no way to track where you really are.
 
The conversion itself, however, can easily be logged by chat services, like Skype or Google Hangouts, so it is a good idea to review secure alternatives.

Chatting

Most chat services work by using a central server. This means that all of your text or audio words and sent files are stored on the server of the provider. If the NSA wants to gain access to this data, it will have no problem.

There are a great number of services offering secure and anonymous encrypted chat rooms.

Privatoria offers a bundle of web security and anonymity services including secure data transfer, anonymous e-mail, Proxy/VPN and of course secure chat.

The peculiarity of this service is the absence of a central server. Their chat technology is based on WebRTC; meaning there's a direct connection between browsers without transferring data or logging information on the servers unlike traditional chat solutions like Skype, Google Hangouts, etc... So, no one can access your different ways of communication.



You will be able to communicate with all of the advanced features like text messaging, voice and video calls, file transfer, etc...
  • Cryptochat is an app for Android users for secure chatting that allows end-to-end password-protected encryption.
  • CryptoCat offers group chat, file sharing and provides encryption for doing so. Extra features include Facebook integration and the ability to send photos.
  • Surespot is an open source mobile messaging app with 256 bit end-to-end encryption. It does not require registration and allows sending voice messages from multiple accounts on a single device.

The Choice is yours

Trying to sum it all up, we can firmly state that the world of technology is constantly evolving and that the government wants to control this process. There are no guarantees that you are not being tracked while reading this article or watching Youtube videos.

There are ways to preserve your privacy or at least give Uncle Sam a hard time when he tries to spy on you. To secure yourself you may want to try using a VPN, alternative OS's, secure chat solutions to transfer your encrypted messages or even set up your own private server machine with cloud storage, a chat server and other useful stuff.


~Phr3ak