Saturday, 30 September 2017

clash of clans history and info

Gameplay

A replay of gameplay, where a player is attacking another player's village
Clash of Clans is an online multiplayer game in which players build a community (in the form of a clan), train troops, and attack other players to earn gold, elixir and Dark Elixir. There are four currencies or resources in the game.Gold and elixir can be used to build and reload defenses that protect the player from other players' attacks. Elixir and dark elixir are also used to train and upgrade troops and spells. Gems are the premium currency. Attacks are rated on a three star scale and have a maximum timed length of three minutes.
The game also features a pseudo-single player campaign in which the player can attack a series of fortified goblin villages and earn gold and elixir. The game has 2 'builders' by default, but the player can install more builders (maximum 5) by buying them at an increasing number of gems. Builders are important for upgrading any building. If all builders are busy upgrading a building, one has to either wait (if the player wants to upgrade a different building) for them to be free or complete another building's upgrade using gems

Buildings

To earn and store gold and elixir, players must build gold mines and gold storages and elixir collectors and elixir storages, respectively. Elixir is used to train new troops, carry out research in the laboratory to upgrade troops, to re-load X-Bows (available from Town Hall 9), and to build and upgrade certain buildings, mostly pertaining to buildings used in attacking another player's base. Gold is used to build defensive buildings and to upgrade the town hall, which allows access to more buildings and higher levels for existing buildings. At Town Hall 7, dark elixir becomes available; this type of elixir is used to train and upgrade dark elixir troops and heroes, create dark spells (available from Town Hall 8), and fuel the Inferno Tower, a defensive building that is available only at Town Hall 10. The Eagle Artillery, a defensive building only available at Town Hall 11, is fueled by elixir. Town Hall 11 also provides access to a new hero - The Grand Warden. It is the only hero born out of elixir. To earn and store dark elixir, players must build dark elixir drills and dark elixir storages.[7]
There are a number of buildings available to the player to defend their village, including cannons, mortars, bombs, teslas, traps, archer towers, wizard towers, inferno towers and eagle artilleries. Players can also build walls, which can be upgraded as a player's town hall level increases.[7][8]

Troops and spells

The game has two kinds of barracks (barracks and dark barracks) and two kinds of spell factories (spell factory and dark spell factory). The barracks create troops using elixir (Barbarian, Archer, Giant, Goblin, Wall Breaker, Balloon, Wizard, Healer, Dragon, P.E.K.K.A, Baby Dragon, and Miner) whereas dark barracks create troops using dark elixir. (Minion, Hog Rider, Valkyrie, Golem, Witch, Lava Hound, and Bowler)
The spell factories follow the same pattern - the normal spell factory creates spells using elixir (Lightning Spell, Heal Spell, Rage Spell, Jump Spell, Freeze Spell, and Clone Spell), and the dark spell factory using dark elixir (Poison Spell, Earthquake Spell, Haste Spell and Skeleton Spell). All troops and spells have different properties. As the player progresses, several new troops and spells are able to be unlocked.

Gems

Aside from the game's resources (gold, elixir and dark elixir), the game also uses gems as a currency. Gems may be used primarily to finish the time that certain processes take, such as the remaining time of a building's or a troop's upgrade, or to instantly train an army. Additionally, they can be used to "boost" certain buildings, such as resource productions, heroes, and barracks. Gems may be acquired through in-app purchases, or they may be awarded for reaching certain milestones, completing achievements, or from clearing obstacles, such as trees, mushrooms or gem boxes, which spawn randomly on a player's base. After the May 2017 update, players can get gems from the gem mine in the Builder's Base at a very slow rate.

Clans and Clan Wars

Clans are groups of players who join together to support each other, either materially (donating troops) or verbally (giving advice). Players can join clans once they rebuild the special Clan Castle building early on. A major component of the gameplay of Clash of Clans is clans facing off against one another in the "clan wars". Clan leaders and co-leaders can begin wars against other clans. Each clan is then given one "preparation day" and one "war day." When a player attacks a member of the opposing clan, they receive stars based upon the amount of destruction they cause to the opponent's community. Each player is limited to two attacks per war, and the team with the most stars at the end of the war day is declared victorious. If the two clans' number of stars are equal, then the victor is the one that has a greater percent of destruction. Players receive bonus war loot if he/she use their attacks in the war. This loot is different on different bases and is decided by Supercell; the top base has the most war bonus loot and the last base has the least amount of bonus loot. If the clan wins the war, the bonus loot is fully delivered to the player but during a loss one-third of the loot is delivered to the player. [14] In the May 2016 update, Friendly Challenges were introduced to allow clanmates to compete amongst other clanmates, however these challenges do not provide loot or trophies and do not affect a player's army.[15]

Builder's Base and PvP Battles

Screenshot taken during a player's attack at another player's village in the builder base
A new update to the game on May 22, 2017 released a new game mode, known as the "Builder Base". Players can sail to a new island and create a new village, with a different set of buildings. In this mode, two players attack each other's bases simultaneously. The one with the most damage or getting more star gets the gold, elixir, and trophies. You can only win loot from attacks three times in 22 hours, but can continue attacking for trophies afterwards. The player can spend gems for skip the period of time. The progress will be much faster in this base with the introduction of Clock Tower (temporarily speeds the process of upgrading and production) and Gem Mine (spawns gems at a very slow rate).

Development and release

Jonas Collaros, one of the coders in the Clash of Clans team, speaks about the game's design at an event.
Clash of Clans was developed by Supercell, the company behind other popular mobile games like Hay Day. The game was released for iOS platforms on August 2, 2012, and on Google Play for Android on October 7, 2013.

Marketing

The game is heavily promoted.In February 2015, Supercell released their Clash of Clans Super Bowl XLIX commercial, featuring Liam Neeson parodying his character from Taken. On February 2, Business Insider reported the ad as the 5th most watched Super Bowl ad, though on February 6, VentureBeat reported the ad was the most viewed of those that appeared on the Super Bowl.[21]YouTube users later voted the advertisement the second best Super Bowl ad, behind Nissan's "With Dad" ad.
On September 23, 2015, Taiwanese singers JJ Lin and Jimmy Lin released the game's theme song "全面开战" ("Start a war totally" in English), which was sung in Mandarin.[23]

Controversy

On December 10, 2015, Clash of Clans had a massive update which changed key components of the game. After this update, players could no longer receive free shields from a town hall destruction. This led to many casual players losing interest in the game, as it was difficult to progress without playing very often. After the release of Clash Royale, in January 2016, many players decided to start playing the game, which eventually lost many players in Clash of Clans.[24]

Critical reception


Clash of Clans has received generally positive reviews. The iOS version holds an aggregate score of 74 out of 100 on Metacritic, and 80% on GameRankings.
Gamezebo's Leif Johnson was impressed, scoring the game 4.5 out of 5. Although he felt the gameplay was heavily skewed to encourage the player to purchase gems, he praised the addition of a single-player campaign. He concluded that "Clash of Clans is a simple game, but that's more of a strength than a weakness. It's simple enough to provide quick, painless matches on an iPhone in an idle moment, and there are enough different units to choose from in the battle mode to make playing against other players endlessly rewarding. Best of all, the option to fight against NPC goblins gives Clash of Clans a small edge over similar strategy games that rely almost entirely on player-versus-player combat."
Pocket Gamer's Peter Willington was equally impressed, scoring the game 9 out of 10 and giving it a "Gold Award". Reviewing the game several months after it was released for iOS devices, Willington praised the game for requiring real strategy to play. He wrote that the gameplay was built on the progression of "requiring more and more sophisticated units, asking you to strategise and really think about which elements you should focus on building within your camp." He concluded that "Clash of Clans is a superb game, freemium or otherwise, with more nuance than most give it credit for. That's why it's passed the test of time since its launch and still has an active community devotedly constructing elaborate fortresses in the hope of becoming invincible."
148App's Rob Rich scored the game 3.5 out of 5, writing "It's great to play an online freemium game that doesn't shy away from the single-player experience but also offers up some honest-to-goodness direct interaction, which is a very rare combination these days. It probably won't warm the hearts of any haters out there, but it does give genre fans something with a bit more action and strategy than they might be used to." Tom's Guide enjoyed the player interaction.
Modojo's John Bedford was less impressed, scoring the game 3 out of 5. He was critical of freemium gaming in general, writing "The novelty hasn't just worn off this particular style of greedy gaming, it's shriveled up and condensed itself into an infinitely dense singularity of self-loathing." Of the game itself, he concluded, "This is a game that follows in the footsteps of no small number of titles that have made feverish demands on our wallets in exchange for just a slightly thicker slice of the gameplay. It's possible you have an unending appetite for these micromanagement titles, in which case we recommend getting heartily stuck into Supercell's latest game. While Clash of Clans brings something new to accompany its competent but unexceptional empire gameplay, for most of us it'll be a case of too little, too late."

Commercial reception

Clash of Clans became an App Store top 5 download between December 2012 and May 2013, and this success has been described as helping to usher in a new era in single player gaming on mobile devices. In 2013, Clash of Clans was the third-highest game in revenue generated on the App Store and number one on Google Play.
In February 2014 it was reported that the game was generating $654,000 in daily revenue for Supercell. In 2015, the game was the top grossing app on both the App Store and Google Play, with an estimated revenue of 1.5 million dollars per day.

ethical hacking -website hacking sql


this is only for educational porpose 
SQL injection is a set of SQL commands that are placed in a URL string or in data structures in order to retrieve a response that we want from the databases that are connected with the web applications. This type of attacks generally takes place on webpages developed using PHP or ASP.NET.
An SQL injection attack can be done with the following intentions −
  • To dump the whole database of a system,
  • To modify the content of the databases, or
  • To perform different queries that are not allowed by the application.
This type of attack works when the applications don’t validate the inputs properly, before passing them to an SQL statement. Injections are normally placed put in address bars, search fields, or data fields.
The easiest way to detect if a web application is vulnerable to an SQL injection attack is to use the " ‘ " character in a string and see if you get any error.

Example 1

Let’s try to understand this concept using a few examples. As shown in the following screenshot, we have used a " ‘ " character in the Name field.
Name Field
Now, click the Login button. It should produce the following response −
Login
It means that the “Name” field is vulnerable to SQL injection.

Example 2

We have this URL − http://10.10.10.101/mutillidae/index.php?page=site-footer-xssdiscussion.php
And we want to test the variable “page” but observe how we have injected a " ‘ " character in the string URL.
Variable Page
When we press Enter, it will produce the following result which is with errors.
Result With Errors

SQLMAP

SQLMAP is one of the best tools available to detect SQL injections. It can be downloaded from http://sqlmap.org/
It comes pre-compiled in the Kali distribution. You can locate it at − Applications → Database Assessment → Sqlmap.
After opening SQLMAP, we go to the page that we have the SQL injection and then get the header request. From the header, we run the following command in SQL −
./sqlmap.py --headers="User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:25.0) 
Gecko/20100101 Firefox/25.0" --cookie="security=low;
PHPSESSID=oikbs8qcic2omf5gnd09kihsm7" -u '
http://localhost/dvwa/vulnerabilities/sqli_blind/?id=1&Submit=Submit#' -
level=5 risk=3 -p id --suffix="-BR" -v3
The SQLMAP will test all the variables and the result will show that the parameter “id” is vulnerable, as shown in the following screenshot.
SQL Map

SQLNinja

SQLNinja is another SQL injection tool that is available in Kali distribution.
SQLninja

JSQL Injection

JSQL Injection is in Java and it makes automated SQL injections.
JSQL Injection

Quick Tips

To prevent your web application from SQL injection attacks, you should keep the following points in mind −
  • Unchecked user-input to database should not be allowed to pass through the application GUI.
  • Every variable that passes into the application should be sanitized and validated.
  • The user input which is passed into the database should be quoted.

Wednesday, 27 September 2017

Trojan attack- ethical hacking

Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users.
Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs.
Trojans have several malicious functions −
  • They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim.
  • Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called Trojan-Banker.
  • Trojans can use the victim computer to attack other systems using Denial of Services.
  • Trojans can encrypt all your files and the hacker may thereafter demand money to decrypt them. These are Ransomware Trojans.
  • They can use your phones to send SMS to third parties. These are called SMS Trojans.

Trojan Information

If you have found a virus and want to investigate further regarding its function, then we will recommend that you have a look at the following virus databases, which are offered generally by antivirus vendors.

Quick Tips

  • Install a good antivirus and keep it updated.
  • Don’t open email attachments coming from unknown sources.
  • Don’t accept invitation from unknown people in social media.
  • Don’t open URLs sent by unknown people or URLs that are in weird form.

Sunday, 24 September 2017

Time Travel



Follow me for more cool concepts
Time travel is the concept of movement between certain points in timeanalogous to movement between different points in spaceby an object or a person, typically using a hypothetical device known as a time machine, in the form of a vehicle or of a portal connecting distant points in spacetime, either to an earlier time or to a later time, without the need for the time-traveling body to experience the intervening period in the usual sense.
Time travel is a widely-recognized concept in philosophy and fiction. It was popularized by H. G. Wells' 1895 novel The Time Machine, which moved the concept of time travel into the public imagination. However, it is uncertain if time travel to the past is physically possible. Forward time travel, outside of the usual sense of the perception of time, is possible according to special relativity and general relativity, although making one body advance or delay more than a few milliseconds compared to another body is not feasible with current technology.[1] As for backwards time travel, it is possible to find solutions in general relativity that allow for it, but the solutions require conditions that may not be physically possible. Traveling to an arbitrary point in spacetime has a very limited support in theoretical physics, and usually only connected with quantum mechanics or wormholes, also known as Einstein-Rosen bridges.

Friday, 22 September 2017

learn ethical hacking

Like all good projects, ethical hacking too has a set of distinct phases. It helps hackers to make a structured ethical hacking attack.
Different security training manuals explain the process of ethical hacking in different ways, but for me as a Certified Ethical Hacker, the entire process can be categorized into the following six phases.
Ethical Hacking Process

Reconnaissance

Reconnaissance is the phase where the attacker gathers information about a target using active or passive means. The tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks.

Scanning

In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose, and NMAP.

Gaining Access

In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit.

Maintaining Access

It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future. Metasploit is the preferred tool in this process.

Clearing Tracks

This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.

Reporting

Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes.

Quick Tip

The processes are not standard. You can adopt a set of different processes and tools according to your techniques that you are comfortable with. The process is of least significance as long as you are able to get the desired results.

Skills Requried for Hacking

subscribe my youtube channel-https://www.youtube.com/channel/UCWlXMi0mD_6uPMFg92VKbIw
As an ethical hacker, you will need to understand various hacking techniques such as −
  • Password guessing and cracking
  • Session hijacking
  • Session spoofing
  • Network traffic sniffing
  • Denial of Service attacks
  • Exploiting buffer overflow vulnerabilities
  • SQL injection
In this chapter, we will discuss some of the skills that you would require to become an expert in Ethical Hacking.

Basic Skills

Computer Hacking is a Science as well as an Art. Like any other expertise, you need to put a lot of effort in order to acquire knowledge and become an expert hacker. Once you are on the track, you would need more effort to keep up-to-date with latest technologies, new vulnerabilities and exploitation techniques.
  • An ethical hacker must be a computer systems expert and needs to have very strong programming and computer networking skills.
  • An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result.
Additionally, an ethical hacker should be smart enough to understand the situation and other users’ mind-set in order to apply social engineering exploits. A good ethical hacker has great problem-solving skills too.

Courses & Certifications

This tutorial provides the basic guidelines to become a successful Ethical Hacker. If you want to excel in this field, then you might choose to pursue the following courses and certifications −
  • Obtain a bachelor’s degree in Computer Science or A+ Certificate to gain an understanding of the most common hardware and software technologies.
  • Get into a programmer’s role for a few years and then switch to get a tech support position.
  • Proceed to get network certifications like Network+ or CCNA and then security certifications like Security+, CISSP, or TICSA.
  • It is recommended that you get some work experience as a Network Engineer and System Administrator to understand networks and systems inside out.
  • Keep going through various books, tutorials and papers to understand various computer security aspects and take them as a challenge to secure your network and computer systems as network security engineer.
  • Study courses which cover creating Trojan horses, backdoors, viruses, and worms, denial of service (DoS) attacks, SQL injection, buffer overflow, session hijacking, and system hacking.
  • Master the art of penetration testing, footprinting and reconnaissance, and social engineering.
  • Finally go for a Certified Ethical Hacker (CEH) Certification.
GIAC (Global Information Assurance Certification) and Offensive Security Certified Professional (OSCP) are additional IT security certifications which will add a lot of value to your profile.

Final Note

You need to stay as a White Hat Hacker which means you need to work within given boundaries. Never intrude or attack any computer or network without a required permission from the authorities.
As a final note, it is highly recommended that you refrain from engaging yourself in black hat hacking which may spoil your entire career.

Bio-Technology

What is Biotechnology?

At its simplest, biotechnology is technology based on biology - biotechnology harnesses cellular and biomolecular processes to develop technologies and products that help improve our lives and the health of our planet. We have used the biological processes of microorganisms for more than 6,000 years to make useful food products, such as bread and cheese, and to preserve dairy products.
My youtube channel-https://www.youtube.com/channel/UCWlXMi0mD_6uPMFg92VKbIw
Modern biotechnology provides breakthrough products and technologies to combat debilitating and rare diseases, reduce our environmental footprint, feed the hungry, use less and cleaner energy, and have safer, cleaner and more efficient industrial manufacturing processes.
Currently, there are more than 250 biotechnology health care products and vaccines available to patients, many for previously untreatable diseases. More than 13.3 million farmers around the world use agricultural biotechnology to increase yields, prevent damage from insects and pests and reduce farming's impact on the environment. And more than 50 biorefineries are being built across North America to test and refine technologies to produce biofuels and chemicals from renewable biomass, which can help reduce greenhouse gas emissions.
Recent advances in biotechnology are helping us prepare for and meet society’s most pressing challenges. Here's how:


HEAL THE WORLD

Biotech is helping to heal the world by harnessing nature's own toolbox and using our own genetic makeup to heal and guide lines of research by:
  • Reducing rates of infectious disease;
  • Saving millions of children's lives;
  • Changing the odds of serious, life-threatening conditions affecting millions around the world;
  • Tailoring treatments to individuals to minimize health risks and side effects;
  • Creating more precise tools for disease detection; and
  • Combating serious illnesses and everyday threats confronting the developing world.

FUEL THE WORLD

Biotech uses biological processes such as fermentation and harnesses biocatalysts such as enzymes, yeast, and other microbes to become microscopic manufacturing plants. Biotech is helping to fuel the world by:
  • Streamlining the steps in chemical manufacturing processes by 80% or more;
  • Lowering the temperature for cleaning clothes and potentially saving $4.1 billion annually;
  • Improving manufacturing process efficiency to save 50% or more on operating costs;
  • Reducing use of and reliance on petrochemicals;
  • Using biofuels to cut greenhouse gas emissions by 52% or more;
  • Decreasing water usage and waste generation; and
  • Tapping into the full potential of traditional biomass waste products.

FEED THE WORLD

Biotech improves crop insect resistance, enhances crop herbicide tolerance and facilitates the use of more environmentally sustainable farming practices. Biotech is helping to feed the world by:
  • Generating higher crop yields with fewer inputs;
  • Lowering volumes of agricultural chemicals required by crops-limiting the run-off of these products into the environment;
  • Using biotech crops that need fewer applications of pesticides and that allow farmers to reduce tilling farmland;
  • Developing crops with enhanced nutrition profiles that solve vitamin and nutrient deficiencies;
  • Producing foods free of allergens and toxins such as mycotoxin; and
  • Improving food and crop oil content to help improve cardiovascular health

18 tips and tricks for Android 9 Pie

18 tips and tricks for Android 9 Pie Android 9 Pie was released in 2018, however, multiple Android smartphones are just now getting th...