Facebook reportedly preparing for US election chaos with tools intended for 'at-risk' nations



Facebook is planning for conceivable chaos around the November third US presidential election with inner tools it's used before in nations like Sri Lanka and Myanmar, The Wall Street Journal reported

The plans may incorporate easing back the spread of posts as they begin to circulate around the web, modifying the news source algorithm to change what content users see, and changing the standards for what sort of substance is dangerous and warrants evacuation. They're strategies Facebook has previously used in so-called "at-risk" nations managing mass ethnic unrest or political gore. 

The tools would just be used in case of election-related viciousness or other serious circumstances, according to the WSJ, however some workers at the company said they were worried that attempting to hinder viral substance could inadvertently conceal legitimate political discussions. 

Facebook's handling of rough hate discourse against Rohingya Muslims in Myanmar quite a long while back was broadly reprimanded. After a 2018 free assessment of the situation, the social media giant surrendered it wasn't "doing what's necessary to help keep our platform from being used to instigate division and induce offline viciousness. We concur that we can and ought to accomplish more." It swore to better plan for future risks. 

Facebook CEO Mark Zuckerberg said in a September blog post that the US presidential election "is not going to be business as usual." He said he was "worried that with our nation so divided and election results potentially taking days or weeks to be finalized, there could be an increased risk of civil unrest across the country." 

Platforms are preparing for pre-and post-election vulnerability in the US, after President Trump has repeatedly scrutinized mail-in voting, which many individuals are using this election cycle due to the coronavirus pandemic. He's also declined to state whether he would acknowledge the election results in the event that he loses. 

Facebook said last month that it would not acknowledge new political ads seven days before the US election (however those that had just been endorsed will keep running). It also included a "voter information center" at the top of Facebook and Instagram feeds, and plans to give live, official election results when accessible through an organization with Reuters. Facebook has said it will label any posts pronouncing premature victory, and will eliminate posts with misinformation about COVID-19 and voting. And it plans to ban all US political ads inconclusively after the November third election.
Share:

iPhone 8: UK release date, price and best features of Apple's new device







Apple has launched two new smartphones, the iPhone 8 and iPhone 8 Plus, at a major event in California, which also saw the release of the premium iPhone X handset.
The iPhone 8 and 8 Plus are upgrades to Apple's current iPhone 7 and 7 Plus range, updating some of the main features found on Apple's current products.
Initially, most pundits thought the iPhone 8 would be Apple's main new phone - however it instead released three smartphones as part of the 10th anniversary of the original iPhone.




Apple launch: iPhone 8 and iPhone 8 Plus release date 
Apple has launched a new iPhone 8 and iPhone 8 Plus  CREDIT: BLOOMBERG 
"Our intention has always to create something so magical, powerful, that the hardware virtually disappears," said Tim Cook at the launch.
He added it was a "new step forward for iPhone" that will "set the path for technology for the next decade". 
Introducing the iPhone 8, Apple executive Phil Schiller said the device "improves on everything we love about the iPhone". 
Here are all the details, specs and, importantly, prices that you need to know.

Design and appearance





iphone 8 
Tim Cook introduces the new iPhone 8 and 8 Plus CREDIT: BLOOMBERG 
The iPhone 8 and iPhone 8 Plus are similar in appearance to the current iPhone 7 and 7 Plus.
The smaller version has a 4.7-inch screen, while the larger phone has a 5.5-inch screen and a dual camera lens on the back.
The processor is the A11 Bionic, "the most powerful and smartest chip ever in a smartphone," Apple says. 




Phil Schiller at the launch 
Phil Schiller at the launch  CREDIT: BLOOMBERG 
There will be glass on the front and the back of the device, "reinforced by a laser welded steel and copper". It will be water and dust resistant sealed.
"The new iPhone will have the most durable glass ever in a smartphone," says Schiller. 
Both models will have a HD retina display and feature a 12MP camera. 

What colours will it come in?

The iPhone 8 will be available in silver, space grey and a new blush gold colour. 




The iPhone 8 comes in three colours
The iPhone 8 comes in three colours CREDIT: GETTY

When will the iPhone 8 and 8 Plus go on sale?

The iPhone 8 will go on sale on September 22.  You will be able to pre-order the new device from 15 September. iOS 11 will be available to download from 19 September. 

How much will they cost?







View image on TwitterView image on TwitterView image on Twitter

All the features of the new iPhone 8 and prices. Both phones offer 64 GB and 256 GB and available for preorder on Sep. 15
The iPhone 8 will cost £699 for the 64GB version, while the iPhone 8 Plus will start from £799 (64GB). 256GB versions will also be available. 

iPhone 8 and 8 Plus best features

Wireless charging





wireless charging 
The iPhone 8 will feature wireless charging  CREDIT: BLOOMBERG 
Like the iPhone X, the two new iPhone 8 and 8 Plus phones will come with wireless charging capabilities.
This means the phone can be charged by simply placing it on a power pad. It is the first time the technology has come to the iPhone range.
"This is a simple thing. We do it everyday. We use them every day and charge every night," said Schiller. 
"Words can't describe how much nicer it is to never plug in a cable again."

iOS 11

The new iPhones will come with Apple's new operating system iOS 11. iOS 11 includes hundreds of new features like a redesigned control centre, better multitasking, improvements to the camera, peer-to-peer Apple Pay and new safety features.

Dual camera

The iPhone 8 Plus will have a 12MP dual-lens camera, similar to the one featured on the iPhone 7 Plus released last year.
It features a larger and faster sensor, a new colour filter and deeper pixels.

Video

Apple claims the new camera delivers “the highest quality video capture ever in a smartphone” with better video stabilisation and 4K video up to 60fps.

Home button

While the demise of the home button and Touch ID on the iPhone X has been in the news, the iPhone 8 will maintain the button and Touch ID. It won't, however, have facial recognition.

Source: www.telegraph.co.uk
Share:

Bash Shell Commands You Really Need to Know

Just about every geek and nerd that wants to be a hacker always wants to skip straight to the good stuff, and it’s no wonder why. There’s a certain amount of mystery, intrigue, and awe in being able to used advanced tools (such as those found on Kali Linux like Metasploit) to hack into another computing system. Hackers have been around for decades now, and are frequently present in action and thriller films, such as The Matrix. And to be fair, we’ve gone through some detailed guides that show how to use these tools.
For instance, we’ve already covered NMAP, Metasploit, and other similar tools. But there’s one big problem. These tools work almost exclusively at the command line, or in Linux, the BASH shell. And even the highest quality guides are flawed – especially in the hands of a newb. You see, a single article can’t hope to cover every eventuality, caveat, an ‘gotchas.’
Computers are composed of individual parts made all around the world, and assimilated as a hodgepodge of different manufacturers’ parts. The amount and type of memory, wireless card, processor architecture, HDD or SDD, peripheral devices, and more vary greatly from system to system, and Kali (or for that matter, Linux) can’t hope to to run exactly the same on every different piece of hardware.
Even if you’re hacking guide is highly detailed, chances are that you’ll run into a surprising error that doesn’t fit in nicely with your guide’s 12 easy steps. And most guides can’t hope to account for every single error. Doing so would lie far outside the scope of the guide.
As such, it’s imperative that hackers and penetration testers who want to learn how to hack have a solid foundational knowledge of common BASH shell concepts. Look folks, though they may not be the most ‘sexy’ commands, there are some simple commands that you need to know like the back of your hand.
If you get caught on the job not knowing how to run these simple commands, you’re likely going to get laughed out of the office – and perhaps even be handed a pink slip. So, today we’re going to be talking about general purpose BASH commands that you really need to know before moving on to advanced hacking topics. Basically, you need to be comfortable in a command line environment, so let’s start with one of my favorites: network interface configuration commands.
The network interface commands are also exceptionally useful for troubleshooting connectivity problems. Also, note that with few exceptions, the following commands are mostly universal. That is, they can be utilized on almost all varieties of Linux, and some of them can even be used in an OSX environment since Mac OSX is a descendant of BSD.
For reference, we are going to be taking a closer look at how to make shell configurations regarding the following topics:
  • Network interfaces
  • Canceling commands
  • Default gateways and routes
  • Piping commands
  • Viewing and killing processes
  • File system navigation
Many of these topics will be useful to those wishing to test for Linux certifications such as the Comptia Linux+ or LPI certs. To put it bluntly, you should really know these basics before trying to run advanced packet capture and Metasploit demos. So, without further adieu, let’s start with the network interface commands.
Network Interfaces
Whether using an internal wireless card in your laptop, Ethernet, or an external USB wireless interface, you had better darn well know how to configure them. Just about all of the wireless hacking demos we’ve run involve configuring a wireless interface in some way, and you need to know how read their current configuration. So, let’s start with the basics. The following command pulls up current interface configuration data:
  • ifconfig
Those of you who have worked in the Windows command prompt can easily remember this command, because it only has a single character that varies from the Window’s ipconfig command. Go ahead and run it, and notice that all of the data is separated by interface.
bash-2
This command is incredibly useful because it will quickly display encapsulation type, MAC address, IP address, broadcast address, subnet mask, transmit and receive packet-count, total information sent over the interface, and other useful information. But it doesn’t show all the available data for that interface. For a more detailed report of interface data, simply run the following command:
  • ifconfig -a
In the command listed above, the -a parameter indicates ‘all.’ It will show incredibly detailed information that is useful to network engineers, and can help troubleshoot network interface problems. If your terminal window is getting too messy, you can simply enter the clear command to clear things up a bit. Also, you can run ifconfig followed by an interface’s name to only display parameters for that individual interface.
Furthermore, you’re going to need to know how to bring an interface online and offline (or up and down). Often times, after making a configuration change to an individual interface, it’s necessary to ‘bounce’ the interface by bringing it down, and then bringing it up again. You do need to have administrative privilges to run these commands. Also, note that if you’re running a live version of Linux – such as one installed on a bootable USB flash drive like Ubuntu Live – you’ll likely need to precede the commands with the sudo command.
  • ifconfig [interface_name] down
  • ifconfig [interface_name] up
So, for instance, if I wanted to reset my Ethernet interface, I would run the ifconfig eth0 downcommand. After waiting for a decent amount of time (30 seconds at least to be safe), I’d then run the ifconfig eth0 up. Note that the interface’s name includes a zero rather than the letter of the alphabet sandwiched between ‘N’ and ‘P.’ Your interface names may differ, too, so just run the ifconfig command to display the interfaces’ names.
And arguably, one of the largest reasons that Linux is so powerful is due to it’s command line. You can make configurations within seconds without having to go through long and contrived GUI windows to find the correct setting. It would be a good idea to know how to change IP address information on a per-interface basis as follows:
  • ifconfig eth0 10.1.1.2
  • ifconfig eth0 netmask 255.255.255.0
  • ifconfig eth0 broadcast 10.1.1.255
In order, these commands will set the IP address, subnet mask, and broadcast address of the specified interface – which is eth0 in this example. Next up, you’ll also want to know how to set an interface in promiscuous mode. This is an undoubtedly crucial tool for most kinds of wireless hacking, so let’s first define what this mode does.
Through various network mediums and address types (such as broadcast frames on wireless interfaces or broadcast data like ARP protocol data), an interface can be presented with frames that weren’t addressed to the receiving interface. The default action of the interface is to drop these packets, since it’s not the intended destination. However, many attacks leverage the information contained within the frames and packets.
By setting the interface in promiscuous mode, the interface will receive and process the frames that weren’t intended for it, and instead send them to the CPU for processing. Use the following command:
  • ifconfig eth0 promisc
This mode of operation is frequently used in a lot of different network tools, such as protocol analyzers and packet captures. If you want to shut off promiscuous mode on an interface, simply run the following command:
  • ifconfig eth0 -promisc
Canceling a Command
Sometimes, for whatever reason, you may find that a command has frozen, locked up, or is simply taking too long to complete. Linux novices typically find this incredibly frustrating, and don’t know how to cancel the command. Instead, they simply close out the terminal window and open a new one – but there’s a much simpler way. Simply issue the following command hotkey to cancel currently running command or one that is hanging:
  • ctrl + c
To test it out, run something like a ping command. For instance, ping Google’s DNS servers with the ping 8.8.8.8 command. You’ll notice that the shell will continue pinging the server on an endless loop. To stop the ping operation, just run the ctrl + c command and it should terminate.
Default Gateway and Routes
Every competent network engineer and penetration tester should have a firm grasp on routing technologies. It’s fairly atypical to setup custom routes for an individual computer, because that function is typically controlled by routers. Nevertheless, you should know how to view your Linux system’s routing table. And the command couldn’t be simpler, as follows:
  • route
The most practical purpose for this command is to check and verify your default route. In a home setting, the default route is going to almost always be your wireless router. But in corporate and professional network environments, there may be more complex configurations.
bash3
Piping Commands
One of the wonderful and powerful qualities of the BASH shell is that one command’s output can be used as input for another command. These features are unbelievably flexible, and allow for command formatting and complex configurations. However, we’re only going to be discussing the most rudimentary of piping techniques today.
You may have noticed that sometimes when entering a command, the entire shell window fills up with loads of text that all flit by in fractions of a second. If you want to read the output page by page, you can simply pipe it to the less command. The pipe symbol is located directly above the enter key on most keyboards, and looks like a solid vertical line. The syntax to pipe command output to lessfollows:
  • [command] | less
We’re going to be using this in the services and daemons section, but for now test it out on a simple command. For instance, issue the following command:
  • ifconfig -a | less
Doing so will display your network interface information one page at a time. Now you can use the arrow keys to move up and down the output, or hit the spacebar to move down an entire page. If you want to exit the output display, simply type the ‘q’ key to quit and be returned to the command prompt.
Viewing and Killing Currently Running Processes
There are a seemingly endless number of process running diligently in the background of your Linux system. It would be of great benefit to know how to view them and potentially kill them. Sometimes a process might malfunction, and even cause a memory leak. There are so many processes that, for the sake of this demonstration, we’re going to be piping the command output to less. Run the following command:
  • ps aux | less
Note that there are actually several ways to view currently running processes, too. Alternatively, you can use the jobs or top commands. They will show you related information, such as the owner, process ID, and other vital information about background processes.
bash3-ps-aux
However, once in a while, you may need to shut one of these processes down. It’s rare for a process to render a Linux system completely unusable. Nevertheless, runaway and zombie background processes aren’t uncommon in a Window’s environment. And you should also consider that Linux is susceptible to viruses more than ever before. So, being able to kill a process is crucial. Simply use the following command:
  • kill [process_id]
For example, if I wanted to kill my Firefox process because it crashed and wasn’t behaving properly, I would issue the command as follows:
  • kill 17648
It’s just a matter of looking up the process ID before running the kill command.
File System Navigation
Though understanding the entirety of the Linux file system lies far outside the scope of this guide, knowing how to navigate the file system from the command line is one of the most basic and fundamental skills. The first command you need to know relates to knowing which directory you reside in.
In Linux, this is known as your current working directory. And the command to display that information is known as the print working directory command, as follows:
  • pwd
By default, you’re likely in the home directory. To change directories, simply use the following command:
  • cd [directory]
For instance, if I wanted to change to the root directory (assuming I had root privileges), I would type ‘cd /’. Also, if you simply wanted to move up one level to the next highest directory, you can issue the ‘cd ../’ command. But knowing what files and folders are available for navigation requires you to run the list command. Doing so will show you all files and folders within your current working directory. The basic command is as follows:
  • ls
This command will simply display common files and folders, but it has several useful parameters to display more information. If you wished to view the read, write, and edit permissions for the current user or group, simply issue a long-listing command as follows:
  • ls -l
This command will also display when a file was created or last edited, though it won’t display hidden files. If you’re trying to make a configuration change to an application file, it will likely be hidden, so simply run the following command:
  • ls -a
Note that all of the hidden files and folders will be preceded with the ‘.’ character. There are actually a lot of different flags that can be used with the ls command, but this should suffice for basic file system navigation. Between the ls, cd, and pwd commands, you should be able to navigate throughout your HDD/SDD’s Linux file system by only using the terminal.
Final Thoughts
These don’t make up every foundational command that you should learn in order to be competent using the BASH shell. However, these are certainly some of the most important from a perspective of penetration testing and hacking. In particular, you should learn the ifconfig and route commands, and know them like the back of your hand.
If you’re new to the BASH shell, I’d learn these commands – and learn them well – before pursuing harder tutorials. But after using the shell for a while, perhaps as little as a week or two, they should become second nature to you. And having the ability to pull up all of this information on the fly is what makes Linux so powerful.
You won’t have to navigate through a tedious organization of text fields and GUI windows. Though Windows does have the CMD prompt, it isn’t anywhere near as powerful as the BASH shell. Once you factor in the ability to write and run scripts and use advanced tools like Metasploit, you’ll begin to understand what makes Kali Linux so formidable. Stay tuned for more tutorials as well, because we’ll run through tutorials to help demystify the most popular Kali command line tools that hackers and penetration testers use to break other computing systems.
Share:

DISCLAIMER

The information provided on hottechtips.blogspot.com is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” on hottechtips.blogspot.com should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk.