Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

FaceApp can use your Personal details : It's terms and conditions are Disturbing | Don't use FaceApp If privacy matters to you.

FaceApp is allowed to use your name, username or any likeness provided in any media format it likes without compensation, meaning you will not be paid for it, or have any ability to take it down or complain about it. 
This is also because FaceApp uploads your photo to the cloud for processing, it doesn’t carry out on-device processing like many apps do. After doing so, it retains the image long after you’ve deleted the app and moved on to the next viral sensation. People using the app are not made aware of this. 
If you have time please read FaceApp terms and conditions. 

The FaceApp episode highlights how, after more than a year of high-profile privacy scandals in the tech industry, consumers still don't adequately scrutinise services before handing over their sensitive personal data.
At the same time, it's a reminder of how little we understand how companies collect our information and what rights they have to it.
Joshua Nozzi, the developer who first raised alarms about FaceApp, and other security researchers later knocked down the initial fear that FaceApp is covertly harvesting your entire smartphone camera roll.
Likewise, the fact that a company is based in Russia doesn't automatically mean it's a tool of the Russian government.
"Most images are deleted from our servers within 48 hours from the upload date," the company said in a lengthy statement provided to TechCrunch addressing the privacy concerns
According to TechCrunch, the app is able to access Photos on Apple’s iOS platform even if a user has set photo permissions to “never”. This isn’t a good sign either.  
Incidences like this demonstrate how much information people are giving away on the internet by using a “free” service. Sure it’s fun to see what your face will look like in 30 years’ time but by leaving little nuggets of information about yourself across the web, it all adds up to a digital footprint. 

Comments