Google is Quietly Recording Everything You Say

Thanks to a function of their search software, Google could have years worth of your conversations recorded, and you can hear it for yourself. Your cringe-worthy history can be heard and viewed along with a list of all your searches, at your personal Google history page.

The feature was built into Google’s search function as a means of delivering accurate search results. However, the sheer accuracy and amount of data Google stores is chilling.

The good news is that you can turn it off and delete it, and at the end of this article, we will show you how.

As the Independent reports:

The recordings can function as a kind of diary, reminding you of the various places and situations that you and your phone have been in. But it’s also a reminder of just how much information is collected about you, and how intimate that information can be.

You’ll see more if you’ve an Android phone, which can be activated at any time just by saying “OK, Google”. But you may well also have recordings on there whatever devices you’ve interacted with Google using.

However, even if you don’t have an Android phone and conduct Google searches on iDevices, Google is still listening.

When visiting your personal history page that the web giant keeps on you, it will show you everywhere Google has a record of you being on the internet.

Of course, Google claims that this information is never personally used against you and is done solely for the purpose of enlightening your experience on the web. However, imagine the ominous implications if this information was being used against you.

Google now processes over 40,000 search queries every second on average, which translates to over 3.5 billion searches per day and 1.2 trillion searches per year worldwide.

The data from these searches is then stored on each individual who conducts them. Using this data or steering results in a particular direction, the internet behemoth could effectively influence the entire world. Aside from influence, Google could predict the future based on trends.

Much of this search history is tied location data retrieved from the device being used to conduct the query. So, not only does the search engine have information on what your interests are, it has you specific interests based on where you are at any given moment.

Google’s motto of Don’t Be Evil now seems like less like a request for its users and more like a way of keeping themselves in check.

Now for the good news — you can turn all of this off.

You can start this eye-opening journey by heading to Google’s history page and looking at the long list of recordings. The company has a specific audio page as well as their record of where you’ve been on the internet.

If you’ve never disabled the feature, you will see a list of audio recordings, even some done outside of the Google app, as well as a transcript of the audio Google has converted to text.

What we recommend, after you further panic by listening to or scrolling through Google’s creepy recordings of your search history, is to delete them all and disable the functions.

The Independent explains just how to do this:

To delete particular files, you can click the check box on the left and then move back to the top of the page and select “delete”. To get rid of everything, you can press the “More” button, select “Delete options” and then “Advanced” and click through.

The easiest way to stop Google recording everything is to turn off the virtual assistant and never to use voice search. But that solution also gets at the central problem of much privacy and data use today – doing so cuts off one of the most useful things about having an Android phone or using Google search.

Now that you know this exists quit voluntarily handing over your data to unknown parties and share this article with your friends and family to show them how to stop it as well.

Source

 
4 Kudos
You are
awsome 🙂

How to detect Malicious code in nulled or Free WordPress Themes and Plugins.

Wordpress-unwanted-code

Apart from Official WordPress repository there are hundreds and thousands of websites which provides free WordPress themes and Plugins but the problem is you can not trust them always.

Yes, Most of them add a malicious code to themes and plugins which is not too easy for you to find out.

Before learning about the cure lets discuss about the cause.

Here  is why they add their custom codes

  • To get backlink from your blog unknowingly
  • To get access to your blog
  • To redirect your blog to spam links
  • To add their advertisements and banners.
  • or to simply get your website down

Not only free themes and plugins also the premium nulled plugins and themes that you have download from Warez and torrents may also infected by these malicious codes.

My Confessions

Did  you wonder what triggered me write this article ?

Yes, I too fell prey to these free plugins.Few days back, I was desperate to download a very famous nulled plugin from warez and after installing it in my blog I got to know that the plugin was infected and it redirects my blog to a spam blog.

I immediately disabled the plugin and checked for the code that caused the redirection in plugin files. After an hour I found the code and immediately removed it [ I don’t use that plugin now ]

This incident taught me very important thing.

Never trust nulled WordPress plugins and themes

However many of you might want to use those nulled or free plugins and themes for God’s Sake, If you are one of them then read the remaining article

Detecting Malicious codes

After downloading the plugin or theme,The first thing you should do is to check for virus,trojans and other worms that you may not like it.

Check for Virus and Trojans

Go to VirusTotal.com and upload the zip file to check for virus.

If your file is infected you will get a red signal and if not then you can move on to next step.

VirusTotal Scan result

VirusTotal Scan result

Check for unwanted codes in Plugins

Now lets check for unwanted codes in plugins using another WordPress plugin called Exploit Scanner,which can be securely downloaded from WordPress website.

After installing it go to Dashboard >> Tools >> Exploit Scanner and run the scan.It will take some time to complete the scan and the time depends on number of plugins you have installed.

After the scan you can see a list of codes that are suspected.You can use the browser search function to find the plugins that you installed from outside WordPress repository.

Exploit Scanner

Exploit Scanner

[mybox]Note : This plugin will also scan themes but you might to be interested to try the tip that I am about to give next.[/mybox]

Check for Theme authenticity

Adding a backlink in a free theme is very common technique but you can easily find those exploited themes by the plugin called Theme Authenticity Checker (TAC).

Install the plugin and go to Dashboard >> Appearance >> TAC

You can see the list of themes installed with their authenticity result.It will give a warning if any encrypted links are found in a theme.

Theme Authenticity Checker

Theme Authenticity Checker

Security is in your hands

Its very rare to get hacked unless,We make mistake.So,security is in your hand : Either Act wisely or get fooled easily.

 
3 Kudos
You are
awsome 🙂

Twitch ’s latest insane adventure: Installing Linux

Twitch’s latest insane adventure: Installing Linux

Twitch playing Pokémon was easy mode. Tomorrow, Twitch viewers will be invited to do something altogether more challenging: install Arch Linux. Using the same Twitch chat-driven concept as the collaborative Pokémon playthrough, anyone will be able to enter commands and control the installation process.

Normally, installing Linux is quicker and easier than winning Pokémon. The install processes have been made broadly idiot-proof, especially if you’re installing into a safe virtual machine environment and so don’t even run the risk of clobbering a disk accidentally. But if Twitch chat has accomplished anything, it’s breeding a better idiot, one that is mindlessly bloody-minded, and so we fully anticipate that there will be trolling. Trolling Pokémon revolved principally around getting stuck repeatedly in menus and releasing captured Pokémon—annoying to those trying to complete the game but little that would force players to start from scratch.

Linux, in contrast, opens the door to a whole world of exotic trolling opportunities. There are old classics such as rm -rf / to wipe the disk, or dd if=/dev/zero of=/dev/hda to really wipe the disk. There’s the casual annoyance of kill -9 1, or comedy options such as the bash fork bomb of :(){ :|:& };:. We wouldn’t be surprised to see the machine casually trapped in a reboot loop or have its hardware removed to leave it incapable of I/O.

And who knows, even more exotic options are also possible; security attacks to break into the virtual machine host, recruiting of the machine into botnets, or denial of service attacks. Also possible: a ton of copy-pasta and Kappa spam. Twitch wouldn’t really be Twitch without it.

The project kicks off on Saturday October 31 at 4pm Eastern.

 
3 Kudos
You are
awsome 🙂

The 11 Phases of a Web Developer’s Career (As Illustrated by Memes)

The career of a web developer is an interesting one with many slopes. Considering a learning curve this steep, you can fully expect to live through periods of frustration, enlightenment, self-righteousness, and every mindset in between. In this article, we’ll have some fun, by reviewing each of these phases through the lens of a meme!

Complete Noob

We all have warm feelings for the early days of our careers; the period when you have absolutely no clue what you’re doing. Like a fish out of water, each new line of code is a mystery. Doctype? Huh? What the heck does a <div> do? The first phase is an intimidating, scary, but exciting one. How many dang languages are there?

(more…)

 
10 Kudos
You are
awsome 🙂

Cross Site Request Forgery (CSRF) [HOW-TO]

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the victim’s already authenticated browser. Targets include web applications like social media, in-browser email clients, online banking and web interfaces for network devices.

(more…)

 
10 Kudos
You are
awsome 🙂

My Traffic Value Review

Name: My Traffic ValueMy Traffic Value
Website: www.MyTrafficValue.com
Price: Free to Join
Owner: Joel William Cook
Who it is for: Newbie – Expert
Rating: star,full,favourite,bookmarkstar,full,favourite,bookmarkstar,full,favourite,bookmarkstar,full,favourite,bookmarkstar,half,favourite,bookmark

Introduction To My Traffic Value

In this My Traffic Value Review I’m going to show you how the site works and I’m going to explain all the important information.

My Traffic Value (MTV) is a crowdfunding Platform made by Joel William Cook in 2011. Joel William Cook is an expert marketer also founder of Paid Verts who created a stable system which is working for 3 years and growing day by day.

(more…)

 
9 Kudos
You are
awsome 🙂

How To Earn Bitcoin Playing Fun Games (No Deposit Needed)

Earn bitcoin playing games

There are a million and two different ways out there to earn bitcoin, from picking up a few Satoshi for filling out captchas on faucet websites, to working a full time job that pays in btc. But all of those things are boring. What you really want is a way to earn yourself some lovely bitcoin whilst doing something which is actually good fun to do. Like playing video games. It may come as a surprise to you to find out just how many different websites and apps there are which include ways for you to earn bitcoin – or earn an internal currency that can be cashed out in bitcoin – whilst playing a fun game. Everything you will find listed on this page is free to play – no deposit needed. I have also taken care to make sure that all of the games are fun to play and, preferably, require some element of skill rather than just straight up luck. As always I welcome suggestions in the comments if you know of anything I’ve missed off these lists, just as long as you don’t spam and only recommend quality.

(more…)

 
15 Kudos
You are
awsome 🙂