18 Intriguing Facts That Reveal Edward Snowden’s Journey From An NSA Agent To A Whistleblower.

18 Intriguing Facts That Reveal Edward Snowden’s Journey From An NSA Agent To A Whistleblower.

Do you remember the brouhaha created in 2013 over leaked classified information of the USA?

If you do, then you would surely remember the man behind the biggest intelligence leak, Edward Snowden. And if you don’t, here are the intriguing facts about the man who is a computer professional, privacy activist, former CIA employee, former National Security Agency (NSA) contractor.

The computer wizard Snowden started as a security guard at a covert NSA facility before moving on to CIA to work on IT security. The ex-CIA agent exposed vital information about the US government, especially the workings of US secret surveillance. He was charged with espionage.

But people have different views about Edward Snowden as some feel he is a patriot and call him a national hero, as he was concerned about people’s privacy. But many view him as a traitor who exposed national secrets of their country to the world.

Whatever the view, there’s no doubt that this computer geek has a vivid personality that is difficult to know through Edward Snowden’s Facebook or Twitter posts.

Which Companies Should Use Internet Leased Lines

Which Companies Should Use Internet Leased Lines

The link between the network of an internet service provider and its clients is made by a private high performance circuit, leased line by a regular carrier.

It is hired out on yearly basis; it usually transfers data or voice, or both.

These internet leased lines are usually required for broadband internet access and are used securely between two customer premises.

An internet leased line is always dynamic, which is well-situated than a dial-up connection. In the similar way, unlike broadband, a leased line is not shared; it provides dedicated and definite bandwidth to the user.

Internet leased lines are rather used by companies that need superb quality internet service, which is accessible 24/7; so as to run crucial programs and applications for companies that need fast and upstream speeds and the remote workers who are accessing office based applications and programs.

With an internet leased line, you can fully utilize the Internet bandwidth all the time, and you do not have to split it with 20 or 50 other companies, as you may do with an ADSL.

They can even tie up with the user company to a CSS network and the internet as well, so as to generate more effectiveness in the working staff.

Companies that use such lines are mainly multi-national and need connection to the internet at all times. Having leased lines connection is also logical for them, because with leased lines they can stay linked to their other counterparts across the country. Accessing data from one office to the other is easier this way.

The trend is changing fast, as medium-sized businesses or growing businesses are also using such lines for internet and data transfer.

In a study done in 2016, only 3% of the small businesses (a business that has up to 50 employees) used leased lines. In the similar study, the statistics showed that 30% of the medium-sized businesses had leased lines. In current studies, the statistics are mostly the same.

The graph for the medium-sized companies, which use leased lines, has not changed mostly due to economic reasons. The companies that have had economic growth are the ones that renew the contracts for the leased lines. Others are seen to opt for cheaper options.

The multi-nationals or big companies that are experiencing good business use internet leased lines. It helps them in staying connected to the world, and it is easier for them to transfer data from one office to the other, or just to access it.

For such large companies, leased lines are a low cost and problem free way to stay connected to the world. All their employees are connected through one line; otherwise, having a dial-up connection would have been problematic. The connection from the internet would suffer if a call had to be made. A lot of phone lines would be needed to give connection to all the employees.

Basically, even though leased lines are costly, in the long run, they are low cost and easier to use for both medium-sized growing businesses and large scale companies.

Linkcue is an online platform for searching Internet service providers in Mumbai and compare various internet plans in Mumbai. They are internet leased line connection providers for businesses and offices.

How to Keep Your Home WiFi Secure

How to Keep Your Home WiFi Secure

Frequently, when we think about protection we tend to think about passwords, unsafe websites and viruses attached to emails.

One thing that is often unobserved, however, is the protection of our wireless networks themselves.

Even though less trendy than the more publicised threats, nonetheless, protecting our routers is a critically important part of staying safe online – in fact, only few month before Virgin advised its customers to change their default router passwords following an Investigation

We might make up that an unprotected wireless network will result in nothing more than an increased chance that someone might help themselves to some of our bandwidth for free.

However, while this in itself can be rather irritating, the possible threats can in reality be far more severe.

In fact, if a deceitful third party is able to connect to your network they might interrupt all of your traffic – stealing your passwords, redirecting your requests to false sites and changing the contents of your data are just some of the things they might want to do.

And, in fact, even if they’re only using your network to get online they might be using that access to do all kinds of illegitimate things – all in your name.

So, it is critically important that your wireless router is kept as protected as possible.

Here are some tips for beefing up the security of your WiFi.

  1. Alter your router’s admin username and password*

Every router comes with a default, and typically familiar, username and password. So, for example, a particular firm’s routers might all have the username admin and the password password.

If these values remain unchanged, a hacker on your network would have pretty easy access to your router’s admin section.

Once in the admin section of the router, a hacker would basically be in control of your network – with the capability to change passwords or block and allow devices, for example.

So, if you haven’t done so already, go into your router’s settings and change the username and password to something only you know.

You can get into your router’s settings by typing its IP address into a web browser. The address will usually be something like .

  1. Alter your network name

The service set identifier (SSID) is the name you see when you connect to your network. It is usually based on the type of router you are using.

If you’ve not followed the advice in step 1, then the SSID can be like a red rag to a bull – knowing the type of router you’re using, without changing the default password, would be a little like giving a hacker the keys to your home.

Even if you have changed your username and password though, which you actually should, it can also be a good idea to change the SSID to something more personal (just don’t use your name) that masks the type of router you’re using.

Like all of these tips, you can carry this out in your router’s admin section.

  1. Verify your wireless key settings

First, it is important to confirm in your router’s settings what type of encryption your router is using. Older forms of encryption like WEP and WPA are vulnerable to attack and so, if you have the option, take care to choose WPA2 encryption. It might be set to that already, but it is surely worth checking.

Next, make sure that you change the password (network key) to something strong containing a combination of letters, numbers and symbols.

A good method of ensuring a very strong yet memorable password is to think of a memorable phrase, and use that to construct the password.

For example, you might think of the phrase ‘Although I am internet service provider in Mumbai, I now live and work in Mumbai’. That’s easy enough to remember (especially if it’s true), and by using it to construct a strong yet memorable password you might come up with something like: aIaISPiM,In1awiM!

A mixture of strong encryption and a strong password can help to make sure that only the people you would like are able to connect to your network.

  1. Other things you might want to think about

Updating your router’s firmware to the latest version can help to repair any security vulnerabilities that have been recognized. Notifications of firmware update availability, along with detailed installation instructions can usually be found on the manufacturer’s website.

MAC address (the permanent identifier assigned to any piece of hardware) filtering can be used to only allow certain devices to connect to your network.

Again, detailed instructions can be found on the manufacturer’s website and online. This is not a perfect system, however. By ‘spoofing’ MAC addresses, knowledgeable hackers can fool your network into accepting connections from their devices.

If you only connect to your network via an Ethernet connection, you might want to disable WiFi on your router in general.

In this case, only devices physically connected to the router could connect to your network. This is indeed extremely problematic if you have wireless devices (which most of us do).

Facebook partnership with UNICEF & World Food Programme

Facebook announced a new partnership with UNICEF, the International Federation of Red Cross and Red Crescent Societies, and the World Food Programme to share real-time data to help respond after natural disasters.

When there\’s a flood, earthquake, fire or other natural disaster, response organizations need accurate information quickly about where people are in order to save lives. The problem is that when traditional communication channels like phone lines are down, it can take too much time to figure out where people need help.
As more people connect on Facebook,  share insights to help organizations understand who\’s in danger, who\’s safe, and where to send resources. This is part of creating safe communities, and we will keep doing more initiatives like this to help.

Internet Hacking: systems hijacked by the WannaCry ransomware

While Windows users are currently in fear of getting their systems hijacked by the WannaCry ransomware outbreak, Apple users are sitting relaxed, thinking that malware attacks are something that happens to Windows users, and not Apple.
But you are mistaken – Apple products are also not immune to the hack attacks and malware infections, as an ebook can hack your Mac, iPhone, and iPad.
Apple on Monday pushed out software updates for iOS, macOS, Safari, tvOS, iCloud, iTunes, and watchOS to fix a total of 67 unique security vulnerabilities, many of which allows attackers to perform remote code execution on an affected system.

The cyber attack saw a harmful computer programme spread to about 150 countries, including the UK, Spain, Russia, the US and China.
22-year-old called Marcus – a UK security researcher who has his own company – helped to limit the damage.
He’s being called an “accidental hero” after registering a domain name to track the spread of the virus, which actually ended up stopping it from spreading.

Technology experts say the threat of another global cyber attack continues Tuesday morning, and they say there’s evidence North Korean hackers could be behind the massive malware assault that paralyzed computer systems world-wide last week.

While technology experts were able to contain this weekend’s attack, they warn the threat is not over.

“We are worried about the smart guys realizing what worked and what didn’t, and something else coming our way that might be a little better engineered,”

The hacking tools were first developed by the National Security Agency but were stolen and leaked, and now they may have been used by a North Korean hacking group.

“In this case, there is a fragment of the technology that was associated with Lazarus,” Gregory Clark, CEO of cybersecurity firm Symantec, told CBS News.

“The Lazurus Group” is a hacker collective with ties to North Korea, and experts at Symantec and other companies say they found a portion of the group’s previous malware coding inside the “WannaCry” hacking program used in last week’s cyberattacks.

The discovery was made by a Google security researcher, Neel Mehta, who pointed it out in a cryptic tweet on Monday the parallel between an early version of the WannaCry tool used last week and code used by Lazurus in several years ago.

growing and rising industry of pakistan

Information technology in Pakistan is a growing and rising industry that has a lot of potential. Matters relating to the IT industry are overseen and regulated by the Ministry of Information and Broadcasting of the Government of Pakistan. we need to launch Freelancer to Entrepreneur Development Programs, these program will strengthen the skills and knowledge of freelancers of online outsourcing and develop them as entrepreneurs to work on larger projects which will add larger contributions to our economy..

Young People And New Technology

How do most young people spend much of their free time? On their computers or their mobiles. They’re essential communication and information tools for them. They’ve grown up with computers in schools, and often had mobiles since their early teens or before, so they’re almost extensions of their bodies and lives.
So each new advance is just a small step forward for them, something that seems logical. Instead of going out to buy a CD, it’s far easier simply to download the tracks you want and nothing more. The Internet means convenience. They can transfer those tracks to an iPod or portable media player. Not just music, but video, too, to carry their entertainment with them. It makes perfect sense to them, just as a video-sharing site does, or using a video game console. They master these things effortlessly, as if they’ve been programmed how to know what to do – and growing up with technology, they have, in a way.

But what they love above else, perhaps surprisingly, are their phones. They upgrade to the newest handsets, eager for new technology, and use it, using them for instant messaging, social networking, as music libraries, for the Internet on the go, even to watch TV in some cases.