Popular Post

Archive for April 2016

ভূমিকম্প!!!

By : Maruf Al Berunee

ভূমিকম্প থেকে বাঁচার আসল রাস্তা বাদ দিয়ে আমরা খুঁজছি মেকি রাস্তা। ঈমান আমালের উন্নতি, গুনাহ ছেড়ে দেয়া, আল্লাহর অনুগত দাসে পরিণত হওয়া ইত্যাদি আসল কাজ বাদ দিয়ে আমরা গবেষণা করছি কীভাবে খাটের নিচে বসে থাকবো, কীভাবে ঘরবাড়ি বানালে বেঁচে থাকবো আরও কতো আকাশ কুসুম চিন্তায় মগ্ন আমরা। অথচ মহান আল্লাহর এই আযাব থেকে বাঁচার একমাত্র উপায় হল নিজের সমস্ত ইচ্ছাকে, সমস্ত কাজকর্মকে মহান আল্লাহর হুকুমের সামনে অবনত করে দেয়া।
"তারা কি লক্ষ্য করে না, প্রতি বছর তারা দু'একবার বিপর্যস্ত হচ্ছে? এরপরও তারা তাওবাহ
করে না, কিংবা উপদেশ গ্রহণ করে না।" [সূরা তাওবাহ : ১২৬]

"তোমাদের উপর যেসব বিপদ-আপদ পতিত হয়, তা তোমাদের কর্মেরই ফল এবং তিনি তোমাদের অনেক গোনাহ ক্ষমা করে দেন।" [সূরা আশ শুরাঃ ৩০]

“স্থলে ও জলে মানুষের কৃতকর্মের দরুন বিপর্যয় ছড়িয়ে পড়েছে। আল্লাহ তাদেরকে তাদের কর্মের শাস্তি আস্বাদন করাতে চান,যাতে তারা ফিরে আসে। (আর রুমঃ ৪১)

"বড় শাস্তির পূর্বে আমি অবশ্যই তাদেরকে ছোট শাস্তির স্বাদ আস্বাদন করাব, যাতে তারা ফিরে আসে।" [সুরা সাজদা:২১]

তারপরও কি আমরা তাওবা করে আল্লাহর পথে ফিরে আসবো না? আর কতো অবাধ্য হবো?

Predicting The Future Since 1994: The Illuminati Card Game

By : Maruf Al Berunee
It’s either a freaky coincidence or a warning. In 1994 Steve Jackson Games (SJG) produced a card game that eerily seems to have had an insight of things to come. The Illuminati Card Game illustrated incredible depictions of events we have come to know. From the 9/11 attacks, tsunami’s and other disasters, an energy crisis, epidemics, Jihad, Wall Street, and more, these cards have had an uncanny habit of predicting events which occurred decades later.
See what you think.






 The disturbing trend of these 1994 Illuminati Card Game threatens to predict a dystopian future for its players…












155009393_illuminati-card-game-in-trading-card-games 155009393_illuminati-card-game-in-trading-card-games
Tag : ,

This Android Vulnerability Can Result In Your Data Being Hacked

By : Maruf Al Berunee



Due to a serious coding mistake in the kernel stage script at Qualcomm, makers of the Snapdragon chipset, hackers can easily get root access and take complete control of your phone. As soon as the attacker(s) gets the administrator level functionality, the hackers are capable of doing nearly anything. For instance, once they have complete access to your smartphone, they are able to take screenshots, make a call, switch on your smartphone without your authorization, and access your personal information such as account profile details, online messages, text messages and debit card figures.
Qualcomm, the major ball player in the field of processor development, claims that their programs on a Snapdragon processor have the ability to power more than a million smart hardware devices, which includes numerous Internet of Things (IoTs). Therefore, this coding mistake is a subject of serious priority, especially once you consider the large number of people it will affect.
However, at the same time, the tech giant Google, and particularly the Android supplier, has rolled out upgrades following this problem of remote root accessibility. By employing this exclusively developed software update, the programmer will not be in a position to acquire core accessibility to the hardware.

Image Source: Trend Labs – A screenshot showing the vulnerability in action.
Google has already supplied patches for a few phones out there; however, the main concern is getting this security feature to other smartphones running Android (phones that are running older versions of Android). Since Android is used in almost every phone nowadays, the OTA—or, to be more precise, the process of giving this update over-the-air—is going to look something like this:-
  • Qualcomm will fix this issue and push out a program to Google.
  • Google is going to get in touch with all the various suppliers of hardware production like Sony, LG, Samsung, Huawei, HTC, etc.
  • Once the meetings with the hardware producers are over, the Android supplier is going to give the security patch to all the suppliers.
  • And after that, those patches will be further modified by the companies, and thus, an OTA update is going to be available on every device that runs Android and has a Snapdragon 800 series processor placed on their motherboard.
However, as simple as these steps look, they are truly time consuming.

Image Source: Trend Labs – A second screenshot of the vulnerability showing access to the device’s memory.
Wish Wu, a mobile threat response engineer at Trend Micro says: “We have discovered a vulnerability in the integrated Android Debugger that can be used to expose the contents of the device’s memory in devices running Ice Cream Sandwich to Lollipop.” So, this is a really bad situation – not just for smartphones running on Android & Snapdragon, but also for the Internet of Things.
Almost all of Google’s flagship phones are among the devices that are affected (Nexus 5X, Nexus 6P, Nexus 6, Nexus 5, Nexus 4, Nexus 7, Nexus 9, and Nexus 10). In addition, every single smart unit making use of the Qualcomm Snapdragon 800 sequence processors—such as the 800, 805 and 810—and devices that are running a – 3.10 – type kernel, are also affected. Wu says that this problem is not just on phones that are running the latest version of Android, but they can also be found in smart devices that are running KitKat.
You want to support Anonymous Independent & Investigative News? Please, follow us on Twitter: 

This Article (This Android Vulnerability Can Result In Your Data Being Hacked) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to the author and AnonHQ.com.

Have A Gmail Account? Here’s Why You Need To Close It Immediately!

By : Maruf Al Berunee


Chances are if you are an American living inside the United States that the NSA has created a personal file on you, this is nothing new. In fact the NSA has already admitted that of the roughly 321 million Americans living inside the United States that the agency has an official file on 300 million of us. For those of you whom are mathematically challenged that means there is is a 93% likelihood that the United States government has spied on and recorded you. One of the main tools the United States government uses to spy on its own citizens is hacking. You may think to yourself, but isn’t hacking illegal? Technically yes you are right, but in response to that the government will simply respond “Patriot Act“. Under the Patriot Act, the Constitution and laws which govern every United States citizens literally do not apply to the United States government. You may have heard of a license to kill, well one of the privileges government agencies get to play around with as a result of the Patriot Act is a license to hack; and hack they do. At the end of last week Google announced that over 1 million Gmail accounts were hacked by US government officials and that this behavior has been occurring for years. You might think these federally sanctioned hacks were aimed at criminals or suspected terrorists but you would be surprised, according to a direct statement from Google these hacks were also targeted against“activists, journalists and policy makers." So once again, chances are if you said anything at all about the United States in public or online, and had a Gmail account, you were hacked by the United States Government.
“Since 2012, we’ve warned Gmail users when we suspect they’ve been targeted by state-sponsored attackers. The users that receive these warnings are often activists, journalists, and policy-makers taking bold stands around the world.”

These warnings are much more significant than you realize. Later in the same blog post Google goes on to specify that “these warnings are rare – fewer than 0.1 percent of users ever receive them.” Just stop and think about this for a moment. Google itself admits it allowed the government to hack accounts but that they did try to warn SOME people about it…… The number of people Google warned was only one tenth of one percent of all accounts which had been hacked. Furthermore this “0.1%” of people warned still totaled more than 1 million accounts!


It does not take a mathematical genius to understand how those statistics are frighteningly insane! There is no stopping the United States government and the NSA. For the love of God if you own a Gmail account you need to close it ASAP, don’t even finishes reading this article and do it right now…….. Well maybe finish reading this article because we have a list of email subscribers you need to switch to for your own safety.
Ghostmail. This service allows you to sign up to an encrypted email service. The server is located out of Switzerland and offers free end to end encryption on all emails. The service also has a built in “self destruct mode” which when turned on will automatically delete any message after it has been read; Mission Impossible stye. At no point in signing up for this service are you asked to confirm anything or give away any personal information. Sign Up Here: www.ghostmail.com
ProtonMail. Another service which offers free end to end encryption who’s services are located in Switzerland outside of US laws and jurisdiction. Like Ghostmail, at no point in time are you asked for any personal information. If you are a fan of the Television hit “Mr. Robot” this is Elliot’s email of choice. Sign Up Here: https://protonmail.com/
Tutanota. This is another free encrypted email service that has become quite popular in recent times. It was announced just the other week that Tutanota just surpassed 1 million accounts, becoming the largest online encrypted email service on the internet. Tutanota makes their encryption code open source so security experts can confirm the level of security they will be receiving. Sign up Here:https://tutanota.com/

This article (Have a Gmail Account? Here Is Why You Need To Close It Immediately) is free and open source. You have permission to republish this article using a creative commons license with attribution to the author and AnonHQ. Join the conversation at www.anonboards.com

What Is Your Personal Information Worth On The Deep Web?

By : Maruf Al Berunee
Whereas the majority of people perceive the deep web as being a cloudy criminal world in which people can effortlessly purchase and sell everything from prescription medication, hacked and verified counterfeit travel documentation – even diplomatic passports – and sophisticated weaponry – even nuclear weapons – many have also found that it is a preferred location for hackers to buy and sell compromised information. The fact that our personal and financial information is being sold to individuals online, is utterly terrifying. Lately, McAfee Labs circulated a document termed as The Hidden Data Economy. As the title suggests, the document provides the reader with a couple of intriguing observations of the financial burdens that govern compromised records within the deep web. It is adequate to say that each and every thing that is conceivable to the human brain, can be obtained if you are willing to pay the right amount for it. As an example, the document highlights the price of many online bank details. In the paragraph below, you will find details about the information that is obtainable online. The projected cost of a stolen credit or top up card can vary from 0.01 Bitcoins (BTC) to 0.07 BTC ($5 to $30) – this is the price for the credit or debit cards in the United States. If you want the card details of a bank account in the United Kingdom, then the price can start from 0.05 BTC to 0.08 BTC ($20 to $35). If you want the card details of an Australian bank account, then the price can vary from 0.05 BTC to 0.09 BTC ($20 to $40). The price for Canadian card details can be purchased at the same rate as the Australian ones. Card details from European countries can start from 0.06 BTC to 0.09 ($24 to $37). If you want an account that has a verified login credential and a balance of around $2,000, then you should have 0.48 BTC ($200) at-the-ready. If you want a bank account, the account’s login credentials and a sneaky money transfer service then those complete packages are worth 1.20 BTC to 14.45 BTC (which is priced at $450 to more than $6000). In simple words, if you want to make it look genuine, you should be willing to pay. It is also worth mentioning that the deep web has turned into a big market – a lot larger than the surface web – in which people can even buy login details for different types of online streaming programs, such as Netflix, prime cable TV channels, and other paid sports streaming content. “Are online video streaming users the only victims? Hardly. The sad reality is that access to just about every conceivable online service is available,” states the document. “We found another online video streaming service account selling for $0.55. With single accounts to digital services selling for less than a dollar, criminals must move a lot of online accounts to make their efforts worthwhile.” Sadly, the availability of compromised data is, without a doubt, the most frightening element of the deep web. Source: Business Insider

Copyright © Technology Is For Us, We Are Not For Technology!!! - - Designed by Maruf Al Berunee -