tag:blogger.com,1999:blog-24887507466367715232024-03-19T03:20:36.159+00:00Vincent's Tech BlogVisit - Learn - ExploreAnonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.comBlogger126125tag:blogger.com,1999:blog-2488750746636771523.post-19293450630270160252016-12-03T23:02:00.002+00:002017-08-22T20:40:42.415+00:00Thank you for viewing!<h1>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_g8pdp8LedxBRSMEw6zZjazOk5mWi4teWgfhUj2_xbc5cVLwU3wGsTxTEqeC95h91seGdfEu9nttF9H27wnk0vuEiQQZtq1L8boC93M_jKU-PGOsDG6hjOWd2Nt6yCulYfV6y25_FpEw/s1600/facebook_cover.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_g8pdp8LedxBRSMEw6zZjazOk5mWi4teWgfhUj2_xbc5cVLwU3wGsTxTEqeC95h91seGdfEu9nttF9H27wnk0vuEiQQZtq1L8boC93M_jKU-PGOsDG6hjOWd2Nt6yCulYfV6y25_FpEw/s640/facebook_cover.png" width="640" /></a></div>
We have Moved!!! </h1>
<h3>
Go to <a href="http://vincenttechblog.com/">Our Offical Website</a></h3>
Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-37833929800555718142016-02-09T17:06:00.000+00:002016-02-09T17:06:31.709+00:00Here's the Facebook Hacking Tool that Can Really Hack Accounts.<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgllPilJ60z5BuPAGcnRXfhw5VOd8T-2q4b5yhcT-mS7opRs-zQjBquZ9uRUXQwg_vkKWLIMnoQORIXrAxLNToltKOdXVWNKLKl3O005zRMZXKxy_PI9iJyhtj_oAJztWAOkwANxDd4_h4/s1600/facebook+hack.JPG" imageanchor="1"><img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgllPilJ60z5BuPAGcnRXfhw5VOd8T-2q4b5yhcT-mS7opRs-zQjBquZ9uRUXQwg_vkKWLIMnoQORIXrAxLNToltKOdXVWNKLKl3O005zRMZXKxy_PI9iJyhtj_oAJztWAOkwANxDd4_h4/s1600/facebook+hack.JPG" width="640" /></a></div>
<br />
Yes, you heard me right.<br />
<br />
A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and not the one you desires to hack.<br />
<br />
How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account?<br />
<br />
<br />
<br />
<br />
These are the queries that most of the Internet users search on Google.<br />
<br />
But Beware! If you come across any Facebook hacking tool that promises you to help you hack your friends Facebook accounts, you may end up downloading a hacking tool that could hack you, instead of them.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYEsQaYdB8MjsflA7kMeFyZD4i8P7nJyj1O-2e6psXjtAxtk8M7sfKq51r1uOHOvievlqpK-mq-XtvDK6nWonD5lrplG1X0UwWX2dRgw5S4L7M-jrK-sfrg2uBQ8qqmE-n3ZAIqhNoIVs/s1600/facebook+hack2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="268" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYEsQaYdB8MjsflA7kMeFyZD4i8P7nJyj1O-2e6psXjtAxtk8M7sfKq51r1uOHOvievlqpK-mq-XtvDK6nWonD5lrplG1X0UwWX2dRgw5S4L7M-jrK-sfrg2uBQ8qqmE-n3ZAIqhNoIVs/s640/facebook+hack2.JPG" width="640" /></a></div>
<br />
Dubbed Remtasu, the tool is marketing itself as a Facebook hacking tool but actually is a Windows-based Trojan that has accelerated globally over the past year, and has now capability to disguise itself as an app for accessing people's Facebook account credentials.<br />
<br />
The tool contains a Keylogger that can capture all your keystrokes and store them in a file that is subsequently sent to the attacker's server.<br />
<br />
The malicious Facebook hacking tool is exploiting "the constant desire of a lot of users to take control of accounts from this well-known social network," according to a Monday blog post by IT security company ESET.<br />
<br />
<span style="font-size: large;"><b>How Remtasu Works:</b></span><br />
<br />
The malicious tool is delivered via direct download websites.<br />
<br />
Once a user visits one of these websites, the dangerous Win32/Remtasu.Y malware automatically gets downloaded and executed on victim's machine and hide itself among other files.<br />
<br />
Remtasu has capability to:<br />
<br />
<br />
<ul>
<li>Open and obtain information from the clipboard.</li>
<li>Capture keystrokes.</li>
<li>Store all the data in a file which is subsequently sent to an FTP server.</li>
</ul>
<br />
<br />
<b><span style="font-size: large;">The worst part is yet to come:</span></b><br />
<br />
The malware remains on the infected computer even when the victim reboots their system or attempts to find the malware threat in the list of active processes.<br />
<br />
<i>"In this case, the malware replicates itself, saving the copy in a folder that it also creates within the system32 folder," reads the post. "The new InstallDir folder remains hidden inside the system files, making it difficult for users to access."</i><br />
<br />
Most affected parts of the world include Colombia, Turkey, Thailand and elsewhere. In past, Remtasu was distributed through malicious files attached to phishing emails purporting to be from legitimate government or businesses organisations.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-26209441568813225192016-01-12T13:51:00.000+00:002016-01-12T13:51:06.987+00:00From Today Onwards, Don't You Even Dare to Use Microsoft Internet Explorer<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdEcVbhGjeF08HWPUzkTpjDT4CMifSrpYSphMZ8NxmGaO9aml7YTK1cYREgLBZgVrTj3fVMrZ-ZfDISmFUWoWpfxwCdPbMGi-67y0U_8IRJM1eISet7PBRWS6a4tID1qhnZ3wlsIlxqzs/s1600/ie.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdEcVbhGjeF08HWPUzkTpjDT4CMifSrpYSphMZ8NxmGaO9aml7YTK1cYREgLBZgVrTj3fVMrZ-ZfDISmFUWoWpfxwCdPbMGi-67y0U_8IRJM1eISet7PBRWS6a4tID1qhnZ3wlsIlxqzs/s640/ie.JPG" width="640" /></a></div>
<br />
<br />
Yes, from today, Microsoft is ending the support for versions 8, 9 and 10 of its home-built browser Internet Explorer, thereby encouraging Windows users to switch on to Internet Explorer version 11 or its newest Edge browser.<br />
<br />
Microsoft is going to release one last patch update for IE8, IE9 and IE10 today, but this time along with an "End of Life" notice, meaning Microsoft will no longer support the older versions.<br />
<br />
So, if you want to receive continuous updates for your web browser and avoid being exposed to potential security risks after 12 January, you are advised to upgrade your browser to Internet Explorer 11, or its new Edge browser.<br />
<br />
<span style="font-size: large;"><b>End of Life of Internet Explorer 8, 9 and 10 </b></span><br />
<blockquote class="tr_bq">
<br />"Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10," Microsoft <a href="https://www.microsoft.com/en-us/WindowsForBusiness/End-of-IE-support" target="_blank">says</a>.</blockquote>
<br />
This move could be part of Microsoft's bigger plan to move its users to the new Edge browser, which is currently available only on Windows 10 PCs.<br />
<br />
With the launch of Microsoft Edge last April, the company attempted to encourage Windows 10 users to switch to Edge if they are using its rival browser, such as Google Chrome or Mozilla Firefox, as the default web browser.<br />
<br />
Edge has been designed completely separate to Internet Explorer, and promises speed and usability, with support for Cortana -- Microsoft's virtual assistant.<br />
<span style="font-size: large;"><b><br /></b></span>
<span style="font-size: large;"><b>Around 340 Million Users Run Internet Explorer</b></span><br />
For higher adoption of Edge, Microsoft is finally ending support for Internet Explorer 8, 9 and 10. However, an estimated 340 Million Windows users are still running Internet Explorer, and nearly half of those are believed to be using one of the expired IE versions.<br />
<br />
Therefore, the older versions of the browser will receive <b><a href="https://support.microsoft.com/en-us/kb/3123303?sd=rss&spid=14019" target="_blank">KB3123303 </a></b>patch today that will feature "nag box" asking users to upgrade their browser.<br />
<br />
If you have "Automatic Updates" turned ON, you most likely upgraded to IE11 already. However, users with older IE browsers can turn "Automatic Updates" ON by clicking on "Check for Updates" in the "Windows Update" section of the Control Panel.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-81097001395590827922015-12-29T11:42:00.001+00:002015-12-29T11:42:41.474+00:00Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3weKQ2shc8HVzuxi4dq0SKnmcxfN7k1J4MPL1Q9xRabtm3WRRrGy0TTWx4iRCZ-FZ1Rp1kV1W3wsHFld6rWtfwFQH2E2buhr__-owPiqyIrwWeXbWoT2A7xpbTpJhuHXzojEsGpIdwug/s1600/hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3weKQ2shc8HVzuxi4dq0SKnmcxfN7k1J4MPL1Q9xRabtm3WRRrGy0TTWx4iRCZ-FZ1Rp1kV1W3wsHFld6rWtfwFQH2E2buhr__-owPiqyIrwWeXbWoT2A7xpbTpJhuHXzojEsGpIdwug/s640/hack.JPG" width="640" /></a></div>
<br />
A former employee of Russian search engine Yandex allegedly stole the source code and key algorithms for its search engine site and then attempted to sell them on the black market to fund his own startup.<br />
<br />
Russian publication Kommersant <b><a href="http://www.kommersant.ru/doc/2884110" target="_blank">reports </a></b>that <b>Dmitry Korobov</b> downloaded a type of software nicknamed "Arcadia" from Yandex's servers, which contained highly critical information, including the source code and some of the "key algorithms," of its search engine.<br />
<br />
Korobov then tried to sell the stolen codes to an electronics retailer called NIX, where a friend of his allegedly worked, and on the dark underground market in search of potential buyers.<br />
<br />
<b><span style="font-size: large;">But What's the Punchline?</span></b><br />
<br />
The funniest part is that Korobov requested only $25,000 and 250,000 rubles (a total of almost $29,000) for Yandex's source code and algorithms, which actually cost "Billions of Rubles," or somewhere near <b>$15 Million USD.</b><br />
<br />
However, Korobov was arrested by Russia's Federal Security Service (FSB) before any transaction could take place.<br />
<br />
If he had been succeeded, the code of Yandex's core service was floating freely over the Internet, resulting in serious consequences for the company.<br />
<br />
The report noted that Korobov's court hearing took place earlier this month, and he received a suspended sentence of 2 years in jail after being accused of illegal possession as well as the distribution of commercial secrets.<br />
<br />
The Arcadia software <i>"is a key part of [the] company, it was related directly to Yandex's search engine, which is the [primary] source of the company's income,"</i> a Yandex representative said in court.<br />
<br />
Yandex is the most popular search engine in Russia and is a big rival of Google. Its market share in November reached around 57 percent of all search queries within Russia, compared to Google's 35.2 percent.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-27607153028741422072015-12-29T07:52:00.000+00:002015-12-29T07:56:33.308+00:00I keep Over 200 Browser Tabs Open, and My Computer Runs Absolutely Fine. Here’s My Secret.<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhexmR-hrYy-ZRm5ndVhBvNrTjP4f9bEJnt7O2AHNUvKAkiMmpatOi2M_zl59vb3dyORx0wyeLfTaLMDUBGjceOLhuCID6bQ8o-m9YGnui3AnHAZXCnVOtx-8V8l8t60xS3lGn9-dgkqqs/s1600/save+your+browser+from+crashing.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="362" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhexmR-hrYy-ZRm5ndVhBvNrTjP4f9bEJnt7O2AHNUvKAkiMmpatOi2M_zl59vb3dyORx0wyeLfTaLMDUBGjceOLhuCID6bQ8o-m9YGnui3AnHAZXCnVOtx-8V8l8t60xS3lGn9-dgkqqs/s640/save+your+browser+from+crashing.JPG" width="640" /></a></div>
<br />
I don't know about your part, but I make heavy use of tabs. I currently have 200+ tabs open in my Google Chrome Web browser. And sometimes the number is even more.<br />
<br />
For me it's a daily thing, as I regularly open new tabs because of my habit of reading lots of stuff online, including cyber security updates, hacking news, knowledgeable articles of various categories, new recipes to cook something delicious and, of course, funny viral videos.<br />
<br />
<b><span style="font-size: large;">Browsers — Everything for us, But Biggest Memory Eaters!</span></b><br />
<b><br /></b>
<b>I think you’ll agree with me when I say:</b><br />
<br />
It’s really hard to manage so many tabs on Chrome — and Firefox too. But worse still is the obstruction in the performance of your computer, as the tabs continue to run background processes and feed on your system’s memory.<br />
<br />
It gets difficult to sort through them, everything slows down, and sometimes it crashes the browser itself.<br />
<br />
<span style="font-size: large;"><b>Doesn’t it?</b></span><br />
<br />
But, I really don’t face any issue while surfing on 200+ tabs at one time with 4GB RAM computer and, it turns out, you can dramatically have a smoother web surfing experience too, without slowing down your computer too much.<br />
<br />
<b><span style="font-size: large;">Here’s my Secret:</span></b><br />
<br />
Today I have something that will make you feel like you have a powerful computer:<br />
<br />
<b><a href="https://chrome.google.com/webstore/detail/the-great-suspender/klbibkeccnjlkjkiokjodocebajanakg?hl=en" target="_blank">The Great Suspender</a> </b>— A lightweight Chrome extension to let you manage when tabs should be put "to sleep" or suspended — anywhere from 20 seconds to 3 days.<br />
<br />
So now you can keep your Gmail, Facebook, and several other tabs open in the background without any fear of slowing down your computer system, and access those tabs again at any point you would like to.<br />
<br />
I’m sure there are other extensions as well, but this one has worked fantastic for me and dramatically improved my Chrome and my overall surfing experience.<br />
<br />
Automatically Suspend Tabs with The Great Suspender to avoid Browser Slow down or Crash:<br />
<br />
The Great Suspender extension effectively allows you to automatically suspend specific tabs that aren’t in use after a set number of minutes. But worry not, as you can restore any particular tab by clicking anywhere on the page when required.<br />
<br />
Thus, if you have a lot of tabs open in your web browser at one time and you want all of them to keep open, you can automatically avoid them eating up your computer's memory and battery life by suspending them, but also keeping them readily available when required.<br />
<br />
The Great Suspender gives you the option to suspend specific tabs manually as well while keeping them available in your tab bar.<br />
<br />
Meanwhile, you can also add any site (such as Gmail, Facebook and so on) to a "whitelist," which will prevent certain pages from suspension no matter what.<br />
<br />
There are some suboptimal alternatives, including the popular <b><a href="https://chrome.google.com/webstore/detail/onetab/chphlpgkkbolifaimnlloiipkdnihall" target="_blank">OneTab</a></b>, which sucks all your open tabs into a list displayed in a single tab, but I prefer The Great Suspender as it keeps tabs visible and accessible even when they aren't active.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-54264778370777466382015-12-28T17:41:00.001+00:002015-12-28T17:41:28.227+00:00Want WhatsApp Free Video Calling? This Leaked Screenshot Reveals Upcoming Feature<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7c-SFKa7G1schGgiuI3CoiPrcvBmLC7tuPYtXK0ZPOcjcXH2ATnkqnMTorGm0KD2KAVVNb8hETVVoVycAgUsp0Rhqfg0Dz6j3vYYKrZg3JUl8RuakX2enHfgYsueFLC7BjfC3Br-dFT8/s1600/whatsapp-cideo-call.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7c-SFKa7G1schGgiuI3CoiPrcvBmLC7tuPYtXK0ZPOcjcXH2ATnkqnMTorGm0KD2KAVVNb8hETVVoVycAgUsp0Rhqfg0Dz6j3vYYKrZg3JUl8RuakX2enHfgYsueFLC7BjfC3Br-dFT8/s640/whatsapp-cideo-call.JPG" width="640" /></a></div>
<br />
Raise your hands if you want <b>Free Video Calling feature in WhatsApp.</b><br />
<b><br /></b>
I am in, and I think most of you people.<br />
<br />
And the good news is that it looks like WhatsApp's much-awaited Free Video Calling feature is on its way, according to the recently leaked screenshots.<br />
<br />
<span style="font-size: large;"><b>Free Video Calling Feature in WhatsApp</b></span><br />
<span style="font-size: large;"><b><br /></b></span>
German technology blog <i>Macerkopf.de</i> has <b><a href="http://www.macerkopf.de/wp-content/uploads/2015/12/whatsapp_videochat_leak.jpg?b2faba" target="_blank">posted </a></b>what it claims are screenshots from an unreleased version of the popular messaging client WhatsApp for iOS.<br />
<br />
The screenshots are from an unreleased version of the software (<i>version<b> 2.12.16.2</b></i>), which is currently being tested internally, but at present it is not clear whether or not those screenshots are legitimate.<br />
<br />
But, if the leaked screenshots are real, and WhatsApp adds the Free Video Calling feature, then the company could take an enormous bite out of some of its top rival.<br />
<br />
WhatsApp Video Calling feature will allow you to make video calls to your friends and family anywhere in the world for free as long as you have a Wi-Fi network or an effective data plan on your registered number.<br />
Here are the allegedly leaked images of video calling feature in action:<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjblE7BwN4QX-po8Vb1mwhjgmXhtYG1mvHPNemoZ6F4iIryjOgtLMYFTPZ-aw7jLJbT8jafruqn4SxFTQue7x57dnpaA0P9SmIDPCnPF7cbyxUFZq80a5ojZ4bsv-ECuqvm-7UhPOBliy8/s1600/whatsapp-cideo-call1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="346" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjblE7BwN4QX-po8Vb1mwhjgmXhtYG1mvHPNemoZ6F4iIryjOgtLMYFTPZ-aw7jLJbT8jafruqn4SxFTQue7x57dnpaA0P9SmIDPCnPF7cbyxUFZq80a5ojZ4bsv-ECuqvm-7UhPOBliy8/s640/whatsapp-cideo-call1.JPG" width="640" /></a><br />
<br />
WhatsApp has added several new features to its messaging service in order to enhance the user experience. Just this year, WhatsApp finally added f<b>ree voice call feature</b>, and with the launch of video support, the messaging app will more firmly lock users into its ecosystem.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-32283042586222562572015-12-28T17:32:00.002+00:002015-12-28T17:32:44.140+00:00Hyatt Hotel Says Payment Systems Hacked with Credit-Card Stealing Malware<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDkVWSLbyCe1wK6SxNVrBtFAYIFksi4NKaUl2b3m0Hr9mahzyU4c8UtR613wZPE2DAzQj-wvEpA1ME9bM2XA4SWXLT98z8z2JIHjIjsiYfMyx1KS9iSN8RAQVy4y7CPdymHvP4ieew6Vk/s1600/hotel-hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDkVWSLbyCe1wK6SxNVrBtFAYIFksi4NKaUl2b3m0Hr9mahzyU4c8UtR613wZPE2DAzQj-wvEpA1ME9bM2XA4SWXLT98z8z2JIHjIjsiYfMyx1KS9iSN8RAQVy4y7CPdymHvP4ieew6Vk/s640/hotel-hack.JPG" width="640" /></a></div>
Hyatt Hotels Corporation is notifying its customers that credit card numbers and other sensitive information may have been stolen after it found malware on the computers that process customer payments.<br />
<br />
<blockquote class="tr_bq">
"We recently identified malware on computers that operate the payment processing systems for Hyatt-managed locations," the company announced on Wednesday. "As soon as we discovered the activity, we launched an investigation and engaged leading third-party cyber security experts."</blockquote>
<span style="font-size: large;"><b>What type of information?</b></span><br />
<br />
The company didn't confirm whether the attackers succeeded in stealing payment card numbers, neither it say how long its network was infected or how many hotel chains were affected in the malware attack.<br />
But as the payment processing system was infected with credit-card-stealing malware, there is a possibility that hackers may have stolen credit card numbers and other sensitive information.<br />
<br />
<span style="font-size: large;"><b>What happened?</b></span><br />
<br />
Hyatt spokeswoman Stephanie Sheppard said the company discovered malware on 30 November but did not justify why the company waited over three weeks to report the incident.<br />
<br />
<b><span style="font-size: large;">How many victims?</span></b><br />
The company didn’t confirm how many clients could have been affected in the malware attack. However, the world’s leading hospitality corporation, headquartered in Chicago, owns a portfolio of 627 properties in 52 countries.<br />
<br />
<span style="font-size: large;"><b>What was the response?</b></span><br />
Hyatt said it had launched an investigation and hired leading third-party cyber security experts to help investigate the malware threat, as well as taken necessary steps to increase security on its computer systems.<br />
<br />
<span style="font-size: large;"><b>What Hyatt customers should do?</b></span><br />
Meanwhile, the company has also advised all its customers to review their payment card statements carefully and to report any unauthorized bank transactions.<br />
<br />
Moreover, the company reassured its customers that "customers can feel confident using payment cards at Hyatt hotels worldwide."<br />
<br />
Hyatt became the latest hotel chain to report a potential customer data breach this year, following the data breach in other hotel chains, including Hilton, Starwood, Mandarin Oriental, White Lodging and the Trump Collection that acknowledged finding malware in their payment systems.<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-13792519351092118792015-12-28T17:16:00.000+00:002015-12-28T17:16:00.962+00:00How to Crash Your Friends' WhatsApp Just By Sending Crazy Smileys <div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSlAgr5MIPpDKuHZQleFxAVf0lDqd1-a8trrbYznDciPuPRuyH-1wf56Xn7JXVpPjl6lu6T5g0C_BiHqd1kFi0pZZrQ6Yuqi1WTfKUR-_NMWa21kHlx4GMz9mTwbrfgqOQMwwUThrqGLE/s1600/whatsapp-hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSlAgr5MIPpDKuHZQleFxAVf0lDqd1-a8trrbYznDciPuPRuyH-1wf56Xn7JXVpPjl6lu6T5g0C_BiHqd1kFi0pZZrQ6Yuqi1WTfKUR-_NMWa21kHlx4GMz9mTwbrfgqOQMwwUThrqGLE/s640/whatsapp-hack.JPG" width="640" /></a></div>
<br />
<i>What would require crashing the wildly popular WhatsApp messaging application?</i><br />
<i><br /></i>
<b>Nearly 4000 Smileys.</b><br />
<br />
Yes, you can crash your friends' <b>WhatsApp</b>, both WhatsApp Web and mobile application, by sending them not any specially crafted messages, but just Smileys.<br />
<b><br /></b>
<b>Indrajeet Bhuyan</b>, an independent researcher, has reported The Hacker News a new bug in WhatsApp that could allow anyone to remotely crash most popular messaging app just by sending nearly 4000 emojis to the target user, thereby affecting up to 1 Billion users.<br />
<br />
Bhuyan is the same researcher who reported a very popular WhatsApp crash bug last year that required 2000 words <i>(2kb in size)</i> message in the special character set to remotely crash Whatsapp messenger app.<br />
<br />
After this discovery, the company patched the bug by setting up the limits of characters in WhatsApp text messages, but unfortunately, it failed to set up limits for smileys send via WhatsApp.<br />
<br />
<blockquote class="tr_bq">
"In WhatsApp Web, Whatsapp allows 65500-6600 characters, but after typing about 4200-4400 smiley browser starts to slow down," Bhuyan wrote in his blog post. "But since the limit is not yet reached so WhatsApp allows to go on inserting...when it receives it overflows the buffer and it crashes."</blockquote>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGpi8klNzKftLInQmKj-iOVn2oKBV5Fg2aupd_wrWR-JNRZUKnqrQJlWkIFrhJIZABiZpyt-glWMm4Y_ZA8MbL0XZgR44n2PSqPKqQmaQXrJq3oY-l8Q5xo2MteMUNEBaMU0sMvXBBbDM/s1600/whatsapp-hack1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGpi8klNzKftLInQmKj-iOVn2oKBV5Fg2aupd_wrWR-JNRZUKnqrQJlWkIFrhJIZABiZpyt-glWMm4Y_ZA8MbL0XZgR44n2PSqPKqQmaQXrJq3oY-l8Q5xo2MteMUNEBaMU0sMvXBBbDM/s640/whatsapp-hack1.JPG" width="640" /></a><br />
<br />
The recent bug tested on Android devices by multiple brands and successfully crashed:<br />
<br />
<ul>
<li><b>WhatsApp for Android </b>devices including Marshmallow, Lollipop and Kitkat</li>
<li><b>WhatsApp Web</b> for Chrome, Opera and Firefox web browsers. </li>
</ul>
<br />
It is sure that the latest version of WhatsApp is affected by this bug.<br />
<br />
<b><span style="font-size: large;">Video Demonstration </span></b><br />
You can also watch the Proof-of-Concept (PoC) video that shows the attack in work.<br />
<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="400" src="https://www.youtube.com/embed/hEMD5y3WGt4" width="600"></iframe>
<br />
<b><span style="font-size: large;"><br /></span></b>
<b><span style="font-size: large;">How to Protect Yourself </span></b><br />
<b><span style="font-size: large;"><br /></span></b>
Bhuyan told The Hacker News that he had reported the WhatsApp crash bug to Facebook. However, before the company patches the issue, there is a simple way out.<br />
<br />
If you become a victim of such message on WhatsApp, just open your messenger and delete the whole conversation with the sender.<br />
<br />
However, remember, if you have kept some records of your chat with that particular friend, you’ll end up losing them all.<br />
<br />
At the beginning of this year, Bhuyan also reported<b> two separate bugs</b> — <b>WhatsApp Photo Privacy bug </b>and <b>WhatsApp Web Photo Sync Bug</b> — in the WhatsApp web client that in some way exposes its users’ privacy.<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-13050325598091872512015-12-28T15:56:00.001+00:002015-12-28T15:56:19.149+00:00Meet The Hacker-Friendly Search Engine that Lists Every Internet-Connected Device<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb_CNVUUUULl1vZFhh-B5HBJVS5aVQWVWLPuOwpT_YDKnG6NrO_uAgo4KjA3aLjvWBiyWq5i9eelL09-AWv_evQUru5m747rtRi8WXQ4PLz3iDLFzJROcsZgyuXbFRCR9pvo0cCiCGCTQ/s1600/censys.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb_CNVUUUULl1vZFhh-B5HBJVS5aVQWVWLPuOwpT_YDKnG6NrO_uAgo4KjA3aLjvWBiyWq5i9eelL09-AWv_evQUru5m747rtRi8WXQ4PLz3iDLFzJROcsZgyuXbFRCR9pvo0cCiCGCTQ/s640/censys.JPG" width="640" /></a></div>
<br />
Meet an all-new Hacker’s Search Engine similar to Shodan – <b>Censys</b>.<br />
<br />
At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of Things (IoT) devices have been re-using the same set of hard-coded cryptographic keys, leaving around 3 millions of IoT devices open to mass hijacking.<br />
<br />
<b>But how did the researchers get this number?</b><br />
<br />
Researchers uncovered these devices with the help of <b><a href="https://www.censys.io/" target="_blank">Censys </a></b>– a new search engine that daily scans the whole Internet for all the vulnerable devices.<br />
<br />
<b><span style="font-size: large;">Censys Maintains Complete Database of Everything on The Internet</span></b><br />
<br />
Censys is similar to hacker's search engine Shodan, which is designed specifically to locate any devices that have been carelessly plugged into the Internet without much attempt at preventing unauthorized access.<br />
However, Censys employs a more advanced method to find vulnerabilities in the devices and make the Internet a safer place.<br />
<br />
Censys is a free search engine that was originally released in October by researchers from the University of Michigan and is powered by the world's biggest search engine Google.<br />
<br />
Censys is part of an open source project that aims at maintaining a "complete database of everything on the Internet," helping researchers and companies unearth Online security mishaps and vulnerabilities in products and services.<br />
<br />
<b><span style="font-size: large;">How Does Censys Work?</span></b><br />
<br />
Censys collects information on hosts and websites via daily scans of the IPv4 address space – the internet protocol version 4 that routes the majority of the Internet traffic today.<br />
<br />
In order to do so, the new search engine uses two companion tools:<br />
<br />
<ul>
<li><b>ZMap </b>– an open-source network scanner</li>
<li><b>ZGrab </b>– an application layer scanner</li>
</ul>
<br />
<br />
Censys then maintains a database of how hosts and websites are configured, allowing researchers to query the data through a search interface, report builder, and SQL engine.<br />
<br />
<b><a href="https://zmap.io/" target="_blank">ZMap </a></b>scans over 4 Billion IP addresses on the Internet and collects new data every day. It also helps determine whether the machines on the internet have security vulnerabilities that should be fixed before being exploited by the hackers.<br />
<br />
<blockquote class="tr_bq">
<i>"We have found everything from ATMs and bank safes to industrial control systems for power plants. It's kind of scary," </i>said Zakir Durumeric, the researcher leading the Censys project at the University of Michigan.</blockquote>
Obvious flaws in addition to issues caused by IT administrator failures can also be found.<br />
Here's the <b><a href="http://www.technologyreview.com/news/544191/a-search-engine-for-the-internets-dirty-secrets/" target="_blank">MIT Technology Review</a></b> on Censys, titled "<i>A Search Engine for the Internet’s Dirty Secrets."</i><br />
More details on the Censys architecture and functionalities are available in the team's <b><a href="https://jhalderm.com/pub/papers/censys-ccs15.pdf" target="_blank">research paper.</a></b><br />
If you would like to give Censys a try, you can follow the <b><a href="https://www.censys.io/tutorial" target="_blank">step-by-step</a></b> tutorial offered by the developers.<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-43831136186848164052015-12-28T15:35:00.002+00:002015-12-28T15:35:40.562+00:00The New Li-Fi is 100 times Faster than Wi-Fi Technology: Real-World Tests Prove Here<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6t7I38VPEH9HnJkUCQu7XI9pPHqiQ8VkwhYHCM9vh7NuXXswuLD6jLmxFsryXayQdO1npYLsfbCGm7DTPQoSMn2xY6eZ0Qzj69UpyMIVj529pawYZDjYcCSNA4XjqLk_WSNOoI_ie4Ts/s1600/lifi.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6t7I38VPEH9HnJkUCQu7XI9pPHqiQ8VkwhYHCM9vh7NuXXswuLD6jLmxFsryXayQdO1npYLsfbCGm7DTPQoSMn2xY6eZ0Qzj69UpyMIVj529pawYZDjYcCSNA4XjqLk_WSNOoI_ie4Ts/s640/lifi.JPG" width="640" /></a></div>
<br />
Yes, it's time to shift from Wi-Fi to <b>Li-Fi </b>— an alternative technology that is <b>100 times faster than the average speeds of Wi-Fi.</b><br />
<b><br /></b>
Scientists have just field-tested the new wireless technology called <b>Li-Fi</b> for the first time and achieved marvelous wireless speeds that are 100 times faster than current WiFi speeds.<br />
<br />
<span style="font-size: large;"><b>What is Li-Fi Technology?</b></span><br />
Li-Fi is a new wireless technology that transmits high-speed data using light (i.e. <b>Visible Light Communication </b>or VLC) rather than radio bands.<br />
<br />
In short, Li-Fi is a Super-Fast alternative to Wi-Fi.<br />
<br />
Earlier this year, scientists achieved mind-blowing speeds of <b>224 gigabits per second</b> (Gbps) in the lab using Li-Fi. It's believed that this technology has the potential to change everything about the way we use the Internet today.<br />
<br />
And Yes, it will.<br />
<br />
<span style="font-size: large;"><b>Test Results: Li-Fi is 100 times Faster than Wi-Fi</b></span><br />
<br />
An Estonian startup company called <b>Velmenni</b> took the technology out of the laboratories and into the real-world offices, and industrial environments in Tallinn for the first time and, believe me, it's really, really fast.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuQbUGu07DEvEMJkJFyhmKx-k0PD0ZiX2B9LDuSKvBjErOAG2o8gjsdEyKvpg0L5U1gqNWNuCHTxpKNrxK8ZDHOcfQF2ulGT7XHaKYCytCTS1qZB14eL7OxgoNQt_Ujv7QefKYDXFLBqs/s1600/lifi1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuQbUGu07DEvEMJkJFyhmKx-k0PD0ZiX2B9LDuSKvBjErOAG2o8gjsdEyKvpg0L5U1gqNWNuCHTxpKNrxK8ZDHOcfQF2ulGT7XHaKYCytCTS1qZB14eL7OxgoNQt_Ujv7QefKYDXFLBqs/s640/lifi1.JPG" width="640" /></a><br />
<br />
The company was able to transmit data at 1GB per second, which is almost 100 times faster than the Wi-Fi speeds.<br />
<blockquote class="tr_bq">
<i>"We are doing a few pilot projects in different industries where we can utilize the VLC technology,"</i> Velmenni's CEO <b>Deepak Solanki</b> <b><a href="http://www.ibtimes.co.uk/lifi-internet-first-real-world-usage-boasts-speed-100-times-faster-wifi-1530021" target="_blank">told</a></b> IBTimes UK.</blockquote>
<i>"Currently we have designed a smart lighting solution for an industrial environment where the data communication is done through the light. We're also doing a pilot project with a private client where we're setting up a Li-Fi network to access the Internet in [our] office space."</i><br />
Unlike Wi-Fi network signals, Li-Fi is based on light and can't penetrate through walls, which makes it more secure from external sniffing. Meanwhile, it also means there is less interference from other devices.<br />
<br />
<span style="font-size: large;"><b>Who Invented Li-Fi?</b></span><br />
<br />
The Li-Fi technology was originated in 2011 by German physicist<b> Harald Haas</b>, who outlined the idea of using light bulbs as wireless routers during a TED Talk. He demonstrated that with a flickering light from an LED, one could transmit more data than a cellular tower.<br />
<br />
<br />
<iframe allowfullscreen="" frameborder="0" height="400" src="https://www.youtube.com/embed/NaoSp4NpkGg" width="600"></iframe>
You can watch the full video of Haas talk about the Li-Fi technology in 2011 given above.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-51608764766409265222015-12-28T14:38:00.002+00:002015-12-28T14:39:56.244+00:00Bitcoin Core Developers Quit Bitcoin Project to Launch a New Digital Currency Called...<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ7uszC7yNl1Q_giHsGn7IEzFAqzrUCyb3rZcGXeRB_FRIn6wl-AXZXCTr0NeZgQagd1p69azjdf5oRPhU6OSLzASzvwAg69JkEA-wZdpWGemLTc_aRKA6GUzOIejiCR4vOGfzv1F8RDs/s1600/bitcoin.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ7uszC7yNl1Q_giHsGn7IEzFAqzrUCyb3rZcGXeRB_FRIn6wl-AXZXCTr0NeZgQagd1p69azjdf5oRPhU6OSLzASzvwAg69JkEA-wZdpWGemLTc_aRKA6GUzOIejiCR4vOGfzv1F8RDs/s640/bitcoin.JPG" width="640" /></a></div>
<br />
Some of Bitcoin’s Core developers have left the Bitcoin project and started building their separate cryptocurrency called <b>DECRED</b>.<br />
<br />
Decred aims to prevent the issues <b>Bitcoin </b>is currently facing regarding project governance and development funding.<br />
CEO of <i>'Company 0',</i> <b>Mr. Jacob Yocom-Piatt, </b>who has funded Bitcoin development since early 2013, said the actual development of the Bitcoin cryptocurrency is funded by external entities that forms a conflict of interests between the groups and the project's core developers.<br />
<br />
According to Bitcoin's developers, these group puts limitations on input in Bitcoin's governance, selecting options that are favorable to their own interests only, and generally ignoring the developers' and project's best interests.<br />
<blockquote class="tr_bq">
"The Bitcoin software is controlled by a small group of people who decide exclusively what can and cannot be changed," Jacob says in a <b><a href="http://www.prnewswire.com/news-releases/bitcoin-developers-to-start-new-digital-currency-300193500.html" target="_blank">press release.</a></b><br />
"This is in part due to a lack of mechanisms and pathways for funding development work directly from the community, and, as a result, Bitcoin development is funded by external entities that create conflicts of interest between the developers and the representative power of the community that uses Bitcoin."</blockquote>
<br />
So, in order to address this issue, some of the Bitcoin developers have joined hands with the makers of the widely used <b>BTCsuite </b>and are now building their own new digital currency called <b>DECRED</b>.<br />
<br />
<span style="font-size: large;"><b>What is DECRED?</b></span><br />
<br />
Decred, managed and funded by Company 0 LLC, is an open and progressive cryptocurrency that will adopt a more decentralized community-based governance integrated into its blockchain.<br />
The team has the advantage to make Decred a really great product as they already have experience with Bitcoin.<br />
<br />
Some Highlights of DECRED<br />
<br />
Decred intends to include a long list of features such as:<br />
<ul>
<li>Implementation of consensus system based on proof-of-work and proof-of-stake system</li>
<li>Decred development is self-funded and open with block subsidy</li>
<li>Decred uses Blake-256 hashing algorithm</li>
<li>Decred may be compatible with Bitcoin</li>
<li>Decred community members will be involved in making bottom-up non-financial decision making easier</li>
<li>It will use secp256k1 signature scheme or Ed25519/secp256k1-Schnorr for better integration into existing software and make good use of the features offered by Schnorr signatures respectively</li>
<li>Decred uses Go as a codebase for development</li>
</ul>
<br />
Decred has an Airdrop scheduled for next month (20 days and a few hours from now) where they’ll be giving out 4 percent of the total Decred supply to all participants.<br />
<br />
Interested developers can take part in the Airdrop by filling in their details on <b><a href="https://www.decred.org/" target="_blank">Decred website</a></b>.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-71199960014107329802015-12-28T12:57:00.001+00:002015-12-28T12:57:43.468+00:00130 Celebrities' Email Accounts Hacked; Hacker Stole Movie Scripts and Sex Tapes<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjowflFn1q2E6bPwhuQw9RWROU41UtjjqpaUtWYaA2dHxkLvCqLSUyHIxGq6z20EQ2BoLoef9Q8lfjx4Xz5LKLkkxPA5ZeDFi9gTJLUMzwzb2mE9RXvaR7vklsZA_kk1iN2QZUnj0cYnI8/s1600/130+celeb+hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="335" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjowflFn1q2E6bPwhuQw9RWROU41UtjjqpaUtWYaA2dHxkLvCqLSUyHIxGq6z20EQ2BoLoef9Q8lfjx4Xz5LKLkkxPA5ZeDFi9gTJLUMzwzb2mE9RXvaR7vklsZA_kk1iN2QZUnj0cYnI8/s640/130+celeb+hack.JPG" width="640" /></a></div>
<br />
<b>Breaking News:</b> A 23-year-old Bahamian man has been arrested and charged with hacking into the email accounts of 130 celebrities and stealing the unreleased movie and TV scripts, sex tapes, explicit images and even the upcoming album of a <i>famous A-List Celebrity.</i><br />
<i><br /></i>
The hacker named <b>Alonzo Knowles </b>contacted a famous radio host to sell the stolen scripts for the first six episodes of a hit television drama currently being filmed.<br />
<br />
The unnamed host informed about it to the Homeland Security that cooked up a sting operation and had the radio host put the hacker in touch with an undercover investigator posing as an interested buyer.<br />
<br />
<span style="font-size: large;"><b>The LOSE</b></span><br />
<br />
<ul>
<li>Among the items he offered to sell were:</li>
<li>Scripts for three comedy films</li>
<li>A hip-hop biopic</li>
<li>Another television show</li>
<li>Social Security numbers for actors and professional athletes</li>
<li>Emails and phone numbers of at least 130 celebrities</li>
<li>Sex tapes of celebrities</li>
</ul>
<br />
The hacker was arrested on Monday in Manhattan, a day after arriving from the Bahamas to sell the agent 15 movie and TV shows scripts and the Social Security Numbers (SSNs) of a movie actress and two athletes for <b>$80,000</b>.<br />
<br />
Besides this, Knowles also showed the agent a sex tape, saying the sex tape is just a "sample of things [he] can get," rather he had "more stuff along these [items] and can get more" if the undercover agent was interested.<br />
<br />
How Did the Hacker Access Celebs Email Accounts?<br />
<br />
The incident was neither linked to the stolen celebrity <b>photos leaked</b> late last year nor <b>Sony Pictures hack,</b> as the court document <b><a href="http://www.nytimes.com/interactive/2015/12/22/nyregion/document-criminal-complaint-against-alonzo-knowles.html" target="_blank">posted</a> </b>by NYT indicated that Knowles allegedly hacked into email accounts of celebrities by sending them a virus that allowed him to access their sensitive data.<br />
Apart from gaining access to data via a virus, Knowles also sent fake automated text messages to the celebrities, making it look like their account had been hacked and asking for their passwords to secure their account.<br />
<br />
Unfortunately, some of the celebrities replied with their passwords.<br />
<br />
A federal criminal complaint noted his victims included movie and TV actors, a famous singer-songwriter, a casting director, and a hip-hop artist, but he did not identify the identity of celebrities, movies or TV shows involved.<br />
<br />
Knowles was held without bail after an appearance Tuesday in Manhattan federal court on criminal <b>copyright infringement</b> and<b> identity theft</b> charges, which both have a maximum jail sentence of five years.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-37413849121495460472015-12-21T21:55:00.001+00:002015-12-21T21:55:34.268+00:00Reminder! If You Haven't yet, Turn Off Windows 10 Keylogger Now<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-8FltV5c3AvvOQr9vDk4ot46pEent_lBcyzoUk7kLXtFhwxVgcIU4bMDz4XrLFURisg4JN4ikuIUmAElRw3zpMHYhn1x7dLGQ-xXAbh1jk9clQgQC54NWoQsIhOrfk9oC5siH-wT0nHc/s1600/keylogger.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-8FltV5c3AvvOQr9vDk4ot46pEent_lBcyzoUk7kLXtFhwxVgcIU4bMDz4XrLFURisg4JN4ikuIUmAElRw3zpMHYhn1x7dLGQ-xXAbh1jk9clQgQC54NWoQsIhOrfk9oC5siH-wT0nHc/s640/keylogger.JPG" width="640" /></a></div>
<br />
Do you know? Microsoft has the power to track every single word you type or say to its digital assistant Cortana while using its newest operating system, <b>Windows 10.</b><br />
<b><br /></b>
Last fall, there was a report about a 'keylogger' that Microsoft openly put into its <b>Windows 10</b> Technical Preview saying the company 'may collect voice information' as well as 'typed characters.'<br />
<br />
It was thought that the company would include the keylogger only within the Technical Preview of Windows 10, just for testing purpose. But, the thought was Wrong!<br />
<br />
The keylogger made its ways to Windows 10 public release offered by Microsoft for free due to which Windows 10 gained millions of adoption in just a few days after its first roll out back in July – but the free upgrade is not always free.<br />
<br />
<br />
Yes, besides various privacy issues, there is a software component that tracks your inputs using your keyboard, voice, screen, mouse, and stylus, however, it is a bit more complicated than you thought.<br />
<br />
<b><span style="font-size: large;">Windows 10's Keylogger is More than Just a Keylogger</span></b><br />
<br />
The component is not actually a keylogger in terms of malware.<br />
<br />
It is more than that, as Microsoft openly says…<br />
<br />
<blockquote class="tr_bq">
"When you interact with your Windows device by speaking, [handwriting], or typing, Microsoft collects speech, inking, and typing information – including information about your Calendar and People [contacts]…"</blockquote>
<br />
If that makes you feel creepy then need not to worry, because the good news is — You can Turn Off this Keylogger.<br />
<br />
<b><span style="font-size: large;">Here's How You can Turn Off the Keylogger</span></b><br />
<br />
<br />
<ul>
<li>Click on the Start Menu, then open Settings.</li>
<li>Click on Privacy settings, which you'll find in the very last row of the menu.</li>
<li>Once you are in the Privacy menu, click on General</li>
<li>Under 'Send Microsoft info about how I write to help use improve typing and writing in the future' – Turn it to Off.</li>
<li>Now move ahead to the 'Speech, Inking and Typing' menu and click Stop getting to know me. This will help you turn off the speech tracking through dictation or Cortana.</li>
</ul>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_PVFEbljbtgSPost1Zfy0MNUVCPQTZr0bw6wl1gPaFpTCOmB-ONghercpYEJjTJYZ9xQFPX1sn5Kyw8pyTFTvHV4wI49THng2TM8RIpwWTYdB5eAx-8ZE0A_OBsQEtjLt2s3RF0-2V0c/s1600/keylogger1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_PVFEbljbtgSPost1Zfy0MNUVCPQTZr0bw6wl1gPaFpTCOmB-ONghercpYEJjTJYZ9xQFPX1sn5Kyw8pyTFTvHV4wI49THng2TM8RIpwWTYdB5eAx-8ZE0A_OBsQEtjLt2s3RF0-2V0c/s640/keylogger1.JPG" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh21971APaJX0tXvL9p-QGYoQ7Ft4fjElpkv3z2uDWxx4G7hvqVbMvXaVrmc48XnczxwPSXXt3L0uuluk34nTenGsSy0fyM1gu7NTj38wkUiLIbJ8qE1xhOXIf6yC6hVwK4jxU56y6KPec/s1600/keylogger2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh21971APaJX0tXvL9p-QGYoQ7Ft4fjElpkv3z2uDWxx4G7hvqVbMvXaVrmc48XnczxwPSXXt3L0uuluk34nTenGsSy0fyM1gu7NTj38wkUiLIbJ8qE1xhOXIf6yC6hVwK4jxU56y6KPec/s640/keylogger2.JPG" width="640" /></a></div>
<br />
<br />
Due to several privacy issues built into Windows 10, Microsoft has gained a bad reputation.<br />
Over a week ago, the company also introduced Windows 10 data collecting and user behavior tracking features to Windows 7 and Windows 8 as well, which might be a major privacy concern for many users.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-60348859120391932002015-12-21T21:44:00.002+00:002015-12-21T21:55:52.877+00:00How to Activate GodMode in Windows 10<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKhmNscI1hOLHQlv3Ui_4Kqw7YVABy36AYpidZu9Fk-cOJi0m8JZ_pr-bb1l0uWSdsw8s3DBu4us2Oc9t95bjgPC-9JEV4MZHaeTzRm53KZ-jZPMlIXEloVvmcl7cCIdiuGGT2WM_-KG4/s1600/godmode.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKhmNscI1hOLHQlv3Ui_4Kqw7YVABy36AYpidZu9Fk-cOJi0m8JZ_pr-bb1l0uWSdsw8s3DBu4us2Oc9t95bjgPC-9JEV4MZHaeTzRm53KZ-jZPMlIXEloVvmcl7cCIdiuGGT2WM_-KG4/s640/godmode.JPG" width="640" /></a></div>
<br />
Microsoft's Windows 10, the latest version of Windows Operating System, has been creating waves since it rolled out, and reached to 110 million devices within just 2 months.<br />
<br />
If you are a long-time Windows user, you may remember a trick called, <i><b>'God Mode'.</b></i><br />
<br />
God Mode is an inbuilt, but hidden feature of Windows that provides additional customization options for the operating system.<br />
<br />
With Windows 10, all the Settings of the operating system are kept under Settings App, and categorized between System, Devices, Network & Internet, Personalization, Update & Security, Privacy and more.<br />
<br />
Enabling God Mode, also known as 'Windows Master Control Panel Shortcut', in Windows 10 essentially unlocks a backdoor of the OS to access 260+ additional settings from a single folder.<br />
<br />
<span style="font-size: large;"><b>How to Enable God Mode in Windows 10?</b></span><br />
<br />
Follow the steps given below to enable the God Mode in your Windows 10:<br />
<br />
<ol>
<li>Create a new folder on your Windows desktop (New > Folder) and save it with the name: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}</li>
<li>The folder’s icon will change to an icon as of a Control Panel. Double-click on the new icon to see your universal settings panel.</li>
<li>You can name the folder other than "GodMode"; before the Period (.).</li>
<li>Now, click the folder, open it and get god-like access to more than 260 functions and tools.</li>
</ol>
<br />
Some functions are unique to Windows 10 while others are similar to the previous versions of Windows.<br />
<br />
<span style="font-size: large;"><b>How to Use God Mode?</b></span><br />
<br />
You can drag and drop any of the commands to your desktop in order to create a shortcut for the command, but it will be pinned to the Start screen.<br />
<br />
The average user probably wouldn't use this feature.<br />
<br />
If you have already switched this feature ON, share your experience with us by hitting the comments below.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-28942313598743830692015-12-21T21:37:00.000+00:002015-12-21T21:37:02.508+00:00Meet The Device That Can Wirelessly Charge Your All Devices at Once From 15 Feet<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7TgvyuQtX2tw5MihDZd-2ZLJTM1EasFnJ4pWDnT_xs_Kjh835JiAl_CA6gSNm3WVLDrcavTjnMWYxyR4o-Y39PcFMiBBlWuvlyFScaZHPeTJXXr0B3cRn8r8Wyzn3dqdxOQ7sjwbJzBA/s1600/charge.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7TgvyuQtX2tw5MihDZd-2ZLJTM1EasFnJ4pWDnT_xs_Kjh835JiAl_CA6gSNm3WVLDrcavTjnMWYxyR4o-Y39PcFMiBBlWuvlyFScaZHPeTJXXr0B3cRn8r8Wyzn3dqdxOQ7sjwbJzBA/s640/charge.JPG" width="640" /></a></div>
<br />
Wireless charging isn't a new concept at all, but to charge your devices you are still required to place your phone on the top of charging pad. Quite annoying sometimes when slightly misaligned of a device caused your phone not to charge.<br />
<br />
Now, imagine you never have to plug in your smartphones again, or technology that charges multiple devices at one time. This is what Energous Corporation is all set to offer you.<br />
<br />
<span style="font-size: large;"><b>WattUp — Wirelessly Charging Technology</b></span><br />
<br />
The technology company Energous Corporation is about to launch WattUp — a wireless charger that will change the way people charge their electronic devices at homes, in the offices, in the car and beyond.<br />
<br />
<blockquote class="tr_bq">
"With WattUp, you no longer need to worry about looking for a charge: once you are in a WattUp wire-free charging zone, the battery life of all your devices will simply be managed, seamlessly and intelligently, so you can devote your time and energy to what really matters," the <b><a href="http://www.energous.com/" target="_blank">Energous </a></b>website reads.</blockquote>
<br />
WattUp is capable to charge your smartphones and other battery-enabled devices on the go using the same radio waves abundantly flowing all around us as a Wi-Fi router.<br />
<br />
<b><span style="font-size: large;">How WattUp works?</span></b><br />
<br />
Previously demonstrated at CES 2015, WattUp works by using a mix of <i><b>Radio Frequency</b></i> (RF), <b><i>Bluetooth </i></b>and a lot of patent-pending technologies.<br />
<br />
WattUp transmitter communicates with and locates compatible devices using a Bluetooth module. Once they are connected to a device, they beam out RF signals that are then converted into DC power by a small chip embedded in the device.<br />
<br />
Devices that require charging should be <i><b>within the range of up to 5m (15 feet) </b></i>of <b><i>Wi-Fi signals</i></b>, just like you use wireless hotspot in your offices or at homes.<br />
<br />
In case if the power signal from your living room router is stronger than the power signal in your bedroom and you are going in the kitchen, your device will make the switch.<br />
<br />
<b><span style="font-size: large;">When would I expect WattUP?</span></b><br />
<br />
These WattUp transmitters can eventually be built directly into household appliances like a wireless speaker, Televisions or any other device that uses power continuously, but for now you need to put your smartphone into a WattUp-enabled battery pack.<br />
The company says that WattUp battery packs could be ready for the consumer market possibly by the end of 2015 or at the beginning of the next year.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-47293215086614976382015-12-18T14:07:00.001+00:002015-12-28T12:59:15.235+00:00Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs0PUIjlEjaAXf9kolg30CPgPi2ONB9NJ5qGuoqdaPk4gxut6YC29KA0TsqET7nmtBwk989h2Q21DvymhBEOIQu5ogoQ0_kHP-qBmrhK4xXiqOqa5XMit5QO1s4BqTkhjs7xiPE-wSmV4/s1600/insta.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs0PUIjlEjaAXf9kolg30CPgPi2ONB9NJ5qGuoqdaPk4gxut6YC29KA0TsqET7nmtBwk989h2Q21DvymhBEOIQu5ogoQ0_kHP-qBmrhK4xXiqOqa5XMit5QO1s4BqTkhjs7xiPE-wSmV4/s640/insta.JPG" width="640" /></a></div>
<br />
Ever wonder how to hack Instagram or how to hack a facebook account? Well, someone just did it!<br />
<br />
But, remember, even responsibly reporting a security vulnerability could end up in taking legal actions against you.<br />
<br />
An independent security researcher claims he was threatened by Facebook after he responsibly revealed a series of security vulnerabilities and configuration flaws that allowed him to successfully <b><i>gained access to sensitive data stored on Instagram servers,</i></b> including:<br />
<ul>
<li>Source Code of Instagram website</li>
<li>SSL Certificates and Private Keys for Instagram</li>
<li>Keys used to sign authentication cookies</li>
<li>Personal details of Instagram Users and Employees</li>
<li>Email server credentials</li>
<li>Keys for over a half-dozen critical other functions</li>
</ul>
However, instead of paying him a reward, Facebook has threatened to sue the researcher of intentionally withholding flaws and information from its team.<br />
<br />
<b>Wesley Weinberg,</b> a senior security researcher at Synack, participated in Facebook's bug bounty program and started analyzing Instagram systems after one of his friends hinted him to a potentially vulnerable server located at sensu.instagram.com<br />
The researcher found an RCE (<b>Remote Code Execution</b>) bug in the way it processed users’ session cookies that are generally used to remember users' log-in details.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu-bZl_-l0Dhw0XdtDYGoXfjGmwgbcI0aRwGLF79BJ1FyPa4fsBs_uP653lKBz8SJnwDJfyL1dzWHf6yCt0bO4SwnOjJ48SzMhu8z0oMt-neBeIby2KbgIhCHoLpIqwj3_850U9-OakxE/s1600/insta1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu-bZl_-l0Dhw0XdtDYGoXfjGmwgbcI0aRwGLF79BJ1FyPa4fsBs_uP653lKBz8SJnwDJfyL1dzWHf6yCt0bO4SwnOjJ48SzMhu8z0oMt-neBeIby2KbgIhCHoLpIqwj3_850U9-OakxE/s640/insta1.JPG" width="640" /></a><br />
<br />
Remote code execution bug was possible due to two weaknesses:<br />
<ol>
<li>The Sensu-Admin web app running on the server contained a hard-coded Ruby secret token</li>
<li>The host running a version of Ruby (3.x) that was susceptible to code execution via the Ruby session cookie</li>
</ol>
Exploiting the vulnerability, Weinberg was able to force the server to vomit up a database containing login details, including credentials, of Instagram and Facebook employees.<br />
<br />
Although the passwords were encrypted with ‘bcrypt’, Weinberg was able to crack a dozen of passwords that had been very weak (like changeme, instagram, password) in just a few minutes.<br />
<br />
<b><span style="font-size: large;">Exposed EVERYTHING including Your Selfies</span></b><br />
<br />
Weinberg did not stop here. He took a close look at other configuration files he found on the server and discovered that one of the files contained some keys for Amazon Web Services accounts, the cloud computing service used to host Instagram's Sensu setup.<br />
<br />
These keys listed 82 Amazon S3 buckets (storage units), but these buckets were unique. He found nothing sensitive in the latest file in that bucket, but when he looked at the older version of the file, he found another key pair that let him read the contents of all 82 buckets.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzcFm-hEdrvXjAqUIpwGN8vbPZPad58_NOtwKmWzgF0mN6n7CiA9hpSrgSGe6K_riLi0fns91J7Pdo3nw1-7qc_wV0KDCydtV1ckoT8ZvuA7qrSHNV7RBy0qR1Ek23KY9zmIIB5o1e_4c/s1600/insta2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="336" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzcFm-hEdrvXjAqUIpwGN8vbPZPad58_NOtwKmWzgF0mN6n7CiA9hpSrgSGe6K_riLi0fns91J7Pdo3nw1-7qc_wV0KDCydtV1ckoT8ZvuA7qrSHNV7RBy0qR1Ek23KY9zmIIB5o1e_4c/s640/insta2.JPG" width="640" /></a><br />
<br />
Weinberg had inadvertently stumbled upon almost EVERYTHING including:<br />
<ul>
<li>Instagram's source code</li>
<li>SSL certificates and private keys (including for instagram.com and *.instagram.com)</li>
<li>API keys that are used for interacting with other services</li>
<li>Images uploaded by Instagram users</li>
<li>Static content from the instagram.com website</li>
<li>Email server credentials</li>
<li>iOS/Android app signing keys</li>
<li>Other sensitive data</li>
</ul>
<blockquote class="tr_bq">
<br />
"To say that I had gained access to basically all of Instagram's secret key material would probably be a fair statement," Weinberg wrote in his blog. "With the keys I obtained, I could now easily impersonate Instagram, or any valid user or staff member. While out of scope, I would have easily been able to gain full access to any user’s account, [personal] pictures and data."</blockquote>
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEWPzyrdatreSBn3dsN4b9147_Q1Jqx0w-IfGqV3nDMZ4P_N-GFY7X5R9Cph7jhya3LaLBENDC-p2P770g_Pl233o_GCLLCDGOJwZSTfQUl7MZ89aDIXxNv-KgMnWfI6BEdfW8jZKJPas/s1600/insta3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="326" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEWPzyrdatreSBn3dsN4b9147_Q1Jqx0w-IfGqV3nDMZ4P_N-GFY7X5R9Cph7jhya3LaLBENDC-p2P770g_Pl233o_GCLLCDGOJwZSTfQUl7MZ89aDIXxNv-KgMnWfI6BEdfW8jZKJPas/s640/insta3.JPG" width="640" /></a><br />
<br />
<span style="font-size: large;"><b>Responsible Disclosure, but Facebook Threatens Lawsuit</b></span><br />
<br />
Weinberg reported his findings to Facebook's security team, but the social media giant was concerned he had accessed private data of its users and employees while uncovering the issues.<br />
<br />
Instead of receiving a reward from Facebook for his hard work, Weinberg was unqualified for the bug bounty program by Facebook.<br />
<br />
In early December, Weinberg claims his boss Synack CEO, Jay Kaplan, received a scary call from Facebook security chief <b>Alex Stamos</b> regarding the weaknesses Weinberg discovered in Instagram that left Instagram and Facebook users wide open to a devastating attack.<br />
<br />
Stamos <i>"stated that he did not want to have to get Facebook's legal team involved, but that he was not sure if this was something he needed to go to law enforcement over,</i>" Weinberg wrote in his <b><a href="http://www.exfiltrated.com/research-Instagram-RCE.php" target="_blank">blog </a></b>in a section entitled<b> 'Threats and Intimidation.'</b><br />
<b><br /></b>
In response, Stamos issued a <b><a href="https://www.facebook.com/notes/alex-stamos/bug-bounty-ethics/10153799951452929" target="_blank">statement</a></b>, saying he "did not threaten legal action against Synack or [Weinberg] nor did [he] ask for [Weinberg] to be fired."<br />
<br />
Stamos said he only told Kaplan to "keep this out of the hands of the lawyers on both sides."<br />
<blockquote class="tr_bq">
<i>"Condoning researchers going well above and beyond what is necessary to find and fix critical issues would create a precedent that could be used by those aiming to violate the privacy of our users, and such behavior by legitimate security researchers puts the future of paid bug bounties at risk,"</i> Stamos added.</blockquote>
<br />
<b><span style="font-size: large;">Facebook Responds</span></b><br />
<br />
After the original publication by the researcher, Facebook issued its response, saying the claims are false and that Weinberg was never told not to publish his findings, rather only asked not to disclose the non-public information he accessed.<br />
<br />
The social media giant confirmed the existence of the remote code execution bug in the sensu.instagram.com domain and promised a bug bounty of $2,500 as a reward to Weinberg and his friend who initially hinted that the server was openly accessible.<br />
<br />
However, the other vulnerabilities that allowed Weinberg to gain access to sensitive data were not qualified, with Facebook saying he violated user privacy while accessing the data.<br />
<br />
<span style="font-size: large;"><b>Here's the full statement by Facebook:</b></span><br />
<blockquote class="tr_bq">
We are strong advocates of the security researcher community and have built positive relationships with thousands of people through our bug bounty program. These interactions must include trust, however, and that includes reporting the details of bugs that are found and not using them to access private information in an unauthorized manner. In this case, the researcher intentionally withheld bugs and information from our team and went far beyond the guidelines of our program to pull private, non-user data from internal systems.</blockquote>
<blockquote class="tr_bq">
We paid him for his initial bug report based on the quality, even though he was not the first to report it, but we didn't pay for the subsequent information that he had withheld. At no point did we say he could not publish his findings — we asked that he refrain from disclosing the non-public information he accessed in violation of our program guidelines. We remain firmly committed to paying for high quality research and helping the community learn from researchers' hard work.</blockquote>
Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-88273437155534413652015-12-17T19:16:00.000+00:002015-12-28T12:59:27.506+00:0019-Year-Old Teen Steals $150,000 by Hacking into Airline's Website (See How)<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzk87iox5CYzBUIz3t51GuJUW03mxFQO9hp61LCKqW9D9TmxwWb1w45KItBX22YJXSfYJzoXD2sU44h2eLcxmnQOXNSjG0iK2lUWLSKmxNznudTtrt5yYwPKvfYPIqX1uJ6JY0FYxDeQw/s1600/airline+hack.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="337" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzk87iox5CYzBUIz3t51GuJUW03mxFQO9hp61LCKqW9D9TmxwWb1w45KItBX22YJXSfYJzoXD2sU44h2eLcxmnQOXNSjG0iK2lUWLSKmxNznudTtrt5yYwPKvfYPIqX1uJ6JY0FYxDeQw/s640/airline+hack.JPG" width="640" /></a></div>
<br />
What do you do to earn up to $150,000?<br />
<br />
Somebody just hacks into airlines and sells fake tickets.<br />
<br />
That's exactly what a 19-year-old teenager did and made approximately 1.1 Million Yuan (£110,000 or $150,000) by hacking into the official website of an airline and using the stolen booking information to defraud hundreds of passengers.<br />
The teenager, identified as <b>Zhang</b> from Heilongjiang, north-east China, hacked into a Chinese airline website and illegally downloaded 1.6 Million passengers bookings details, including:<br />
<br />
Flight details<br />
Names<br />
ID card numbers<br />
Email addresses<br />
Mobile phone numbers<br />
<br />
Zhang then used this information to successfully defraud hundreds of customers by convincing them that there was some issue with their booking flights, and they had to pay extra fees, according to People's Daily Online.<br />
Moreover, the hack caused the airline to lose almost 80,000 Yuan (<b>$12,365 USD</b>) as a result of customers requesting refunds.<br />
<br />
The incident took place from 31 July to 20 August this year, and the suspect was arrested by the police on November in Dalian, north China.<br />
<br />
A police officer said the hack was not highly sophisticated and was a result of a loophole in the airline's computer system. However, the name of the airline is not yet disclosed.<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-63751189582136081382015-12-17T16:37:00.000+00:002015-12-28T12:59:38.893+00:00You can Hack into a Linux Computer just by pressing 'Backspace' 28 times<iframe allowfullscreen="" class="giphy-embed" frameborder="0" height="300" src="//giphy.com/embed/3o8dp0Rzj6T1nBCteE" width="650"></iframe><br />
<br />
So what would anyone need to bypass password protection on your computer?<br />
<br />
It just needs to <b>hit the backspace key 28 times,</b> for at least the computer running Linux operating system.<br />
<br />
Wait, what?<br />
<br />
A pair of security researchers from the University of Valencia have uncovered a bizarre bug in several distributions of Linux that could allow anyone to bypass any kind of authentication during boot-up just by pressing backspace key 28 times.<br />
<br />
This time, the issue is neither in a kernel nor in an operating system itself, but rather the vulnerability actually resides in <b>Grub2</b>, the popular <i><b>Grand Unified Bootloader</b></i>, which is used by most Linux systems to boot the operating system when the PC starts.<br />
<br />
The source of the vulnerability is nothing but an integer underflow fault that was introduced with single commit in Grub version 1.98 (December 2009) –<i> b391bdb2f2c5ccf29da66cecdbfb7566656a704d – affecting the grub_password_get()</i> function.<br />
<br />
<span style="font-size: large;"><b>Here's How to Exploit the Linux Vulnerability</b></span><br />
<br />
If your computer system is vulnerable to this bug:<br />
<br />
Just hit the backspace key 28 times at the Grub username prompt during power-up. This will open a <b><i>"Grub rescue shell"</i></b> under Grub2 versions 1.98 to version 2.02.<br />
<br />
This rescue shell allows unauthenticated access to a computer and the ability to load another environment.<br />
<br />
From this shell, an attacker could gain access to all the data on your computer, and can misuse it to steal or delete all the data, or install persistent malware or rootkit, according to researchers <b>Ismael Ripoll</b> and <b>Hector Marco</b>, who <b><a href="http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html#exploit" target="_blank">published</a> </b>their research on Tuesday.<br />
<br />
<b><span style="font-size: large;">Here's How to Protect Linux System</span></b><br />
<br />
The Grub vulnerability affects Linux systems from December 2009 to the present date, though older Linux systems may also be affected.<br />
<br />
The good news is the researchers have made an emergency patch to fix the Grub2 vulnerability. So if you are a Linux user and worried your system might be vulnerable, you can apply this emergency patch, <b><a href="http://hmarco.org/bugs/patches/0001-Fix-CVE-2015-8370-Grub2-user-pass-vulnerability.patch" target="_blank">available here.</a></b><br />
<br />
Meanwhile, many major distributions, including <b><a href="https://lists.ubuntu.com/archives/ubuntu-security-announce/2015-December/003218.html" target="_blank">Ubuntu</a></b>, <b><a href="https://rhn.redhat.com/errata/RHSA-2015-2623.html" target="_blank">Red Hat</a></b>, and <b><a href="https://security-tracker.debian.org/tracker/CVE-2015-8370" target="_blank">Debian </a></b>have also released emergency patches to fix the issue.<br />
Linux is often thought to be a super secure operating system compare to others, and this Grub vulnerability could be a good reminder that it's high time to take physical security just as seriously as network security.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz8F8EngpbQ-74h344q9IsNh0UvL-8i7CqQoMyMknSO1iIV9GeKrZbFs1QuVMav0HGVQU3RG8WchtF0RNrPUHlXEOHtw6bsJg9HSNJI56IAyq8eEHasGakeGNW0yGhNRp6G2Uep9T984c/s1600/hack-linux-grub-password.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="321" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz8F8EngpbQ-74h344q9IsNh0UvL-8i7CqQoMyMknSO1iIV9GeKrZbFs1QuVMav0HGVQU3RG8WchtF0RNrPUHlXEOHtw6bsJg9HSNJI56IAyq8eEHasGakeGNW0yGhNRp6G2Uep9T984c/s640/hack-linux-grub-password.gif" width="640" /></a></div>
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-68216775057310072582015-12-16T19:28:00.000+00:002015-12-16T19:28:19.598+00:00N3XT — Advanced CHIP that Could Make Your Computer 1000 Times Faster<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjyFsiN2rN2poI7YPbZ09yvGK32let6Q_hvi2W26NILqTAuLB8cvhk19obUY3TLDWu41igNgreyDh6FC2i50Y5mYqVptL-3oSm7wZckXwEVCPmxNVibZeupJopHKD5uvMEjJgzQ8iCtSg/s1600/make-computer-fast.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjyFsiN2rN2poI7YPbZ09yvGK32let6Q_hvi2W26NILqTAuLB8cvhk19obUY3TLDWu41igNgreyDh6FC2i50Y5mYqVptL-3oSm7wZckXwEVCPmxNVibZeupJopHKD5uvMEjJgzQ8iCtSg/s640/make-computer-fast.png" width="640" /></a></div>
<br />
Researchers have come up with an all new way to revolutionize the standard computer chip that comes inbuilt in all our electronics.<br />
<br />
Researchers from <i>Carnegie Mellon, Stanford, and the University of California, Berkeley</i> among others, have invented a new material that could replace the 'silicon' in conventional chips – built in all electronic devices – making the device's processing <b>speed 1,000 times faster.</b><br />
<br />
This means that the new chip made with nano-material could solve complex problems in a fraction of the time our computers take.<br />
<br />
The brand new chip, dubbed <b>Nano-Engineered Computing Systems Technology (N3XT),</b> takes the landscape from a resource-heavy single-storey layout to an efficient 'Skyscraper' approach, claims a Rebooting Computing special issue of the IEEE Computer journal.<br />
<br />
<b><span style="font-size: large;">Silicon Chip – A Resource-Heavy Single-Storey Layout</span></b><br />
<br />
The standard silicon chips currently used in all electronic devices have one major issue:<br />
<br />
The silicon chips are arranged like standalone houses in the suburbs.<br />
<br />
This means these chips are single-storeys in which each "house" in the neighbourhood are connected with wires that carry digital data.<br />
<br />
The drawback of silicon chips is that the data in these chips travels longer distances and wastes energy, often causing digital traffic jams while processing.<br />
<br />
<b><span style="font-size: large;">N3XT Chip – Skyscraper Approach is 1000 Times Faster </span></b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjicTdBrJcMltnxP6E2WFOwVoRrqRXCW9Ck-0poMyzLWUmKDSFPyRErTFoD8jJwQ-2qM-nTP8yYp0va7r_gbRr18rYtGMnwKKpsaq0NEzHBhmkII6IYGo4rNZJdwa6uehu_wocryvZpJQc/s1600/fastest-computer-chip.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjicTdBrJcMltnxP6E2WFOwVoRrqRXCW9Ck-0poMyzLWUmKDSFPyRErTFoD8jJwQ-2qM-nTP8yYp0va7r_gbRr18rYtGMnwKKpsaq0NEzHBhmkII6IYGo4rNZJdwa6uehu_wocryvZpJQc/s640/fastest-computer-chip.png" width="640" /></a></div>
<br />
N3XT chips that are made from carbon nanotube transistors are tiny cylindrical molecules of carbon that efficiently conduct heat and electricity.<br />
<br />
The N3XT model splits processors and memory into, say, different 'floors' in a skyscraper.<br />
<br />
All those floors are then connected by millions of tiny electronic elevators, called '<b>vias</b>,' that are used to transport data between chips.<br />
<br />
The big advantage of Skyscraper approach – data moves much faster, and more efficiently over shorter distances (vertically) than across a larger area (horizontally) like in current silicon chips.<br />
<br />
<blockquote class="tr_bq">
"When you combine higher speed with lower energy use, N3XT systems outperform conventional approaches by a factor of a thousand," said H. -S. Philip Wong, the Professor, who authored the paper.</blockquote>
<br />
<b><span style="font-size: large;">Another Advantage of N3XT Over Silicon Chip</span></b><br />
<br />
Another advantage of Skyscraper chips over Silicon chips is that:<br />
<br />
Silicon chip cannot be piled on top of each other like in N3XT chip, because, during fabrication silicon chip gets extremely hot (<i>almost 1,000 degrees centigrade</i>) that ends up damaging the layers below.<br />
<br />
Whereas the N3XT chip can be fabricated at much lower temperatures than silicon chip, so it can easily be layered without damaging the stacks below.<br />
<br />
It sounds like an entirely different approach to computer memory and, of course, this kind of computing knowledge is new to me. But, it's interesting to know that the approach could bring a macro-level revolution in chip architecture that took place more than a century ago.<br />
<br />
You can just check out the <b><a href="http://news.stanford.edu/pr/2015/pr-n3xt-computing-structure-120915.html" target="_blank">original report</a></b> at Stanford News for more details and let me know what's your take on it.<br />
<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-51044617438690992432015-10-09T12:30:00.001+00:002015-10-09T12:30:17.115+00:00First Look: How Facebook's Reaction Buttons Will Look And Act Like (Watch)<div class="separator tr_bq" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7tuhkookO4WFu2eMxPywS3DWSkxUZkVAdWq9Hac-Zd9CMBfKkLzaTOk-iAz9j59CWk5t0I75SSzDpLcA8iM-MoVBProQe1HYqgInHFcgVfgvfXdfSdu5pNNw_Hs89gld1tvbq5Msndmk/s1600/facebook-reactions.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="359" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7tuhkookO4WFu2eMxPywS3DWSkxUZkVAdWq9Hac-Zd9CMBfKkLzaTOk-iAz9j59CWk5t0I75SSzDpLcA8iM-MoVBProQe1HYqgInHFcgVfgvfXdfSdu5pNNw_Hs89gld1tvbq5Msndmk/s640/facebook-reactions.jpg" width="640" /></a></div>
<br />
Facebook finally brings in set of buttons in place of the much awaited dislike button, Yesterday we saw the <b><a href="http://vtbworld.blogspot.com/2015/10/facebook-dislike-button-arrives-but.html" target="_blank">news</a> </b>here on VTB.<br />
Today i bring you a short video of how the reaction buttons will be applied. The Video was originally shared by <b>Mark </b>himself. Watch the video and read his statement below;<br />
<br />
<div id="fb-root">
</div>
<script>(function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.3"; fjs.parentNode.insertBefore(js, fjs);}(document, 'script', 'facebook-jssdk'));</script><br />
<div class="fb-video" data-allowfullscreen="1" data-href="/zuck/videos/vb.4/10102412343501081/?type=3">
<div class="fb-xfbml-parse-ignore">
<blockquote cite="https://www.facebook.com/zuck/videos/10102412343501081/">
<a href="https://www.facebook.com/zuck/videos/10102412343501081/"></a><br />
Today we're launching a test of Reactions -- a more expressive Like button. The Like button has been a part of Facebook for a long time. Billions of Likes are made every day, and Liking things is a simple way to express yourself.For many years though, people have asked us to add a "dislike" button. Not every moment is a good moment, and sometimes you just want a way to express empathy. These are important moments where you need the power to share more than ever, and a Like might not be the best way to express yourself.At a recent Townhall Q&A, I shared with our community that we've spent a lot of time thinking about the best way to give you better options for expressing yourself, while keeping the experience simple and respectful. Today we're starting to test this.Reactions gives you new ways to express love, awe, humor and sadness. It's not a dislike button, but it does give you the power to easily express sorrow and empathy -- in addition to delight and warmth. You’ll be able to express these reactions by long pressing or hovering over the Like button. We’re starting to test Reactions in Ireland and Spain and will learn from this before we bring the experience to everyone. We hope you like this – or can better express how you’re feeling!<br />
Posted by <a href="https://www.facebook.com/zuck">Mark Zuckerberg</a> on Thursday, October 8, 2015</blockquote>
</div>
</div>
<br />
<blockquote>
Today we're launching a test of Reactions -- a more expressive Like button.<br />The Like button has been a part of Facebook for a long time. Billions of Likes are made every day, and Liking things is a simple way to express yourself.<br />For many years though, people have asked us to add a "dislike" button. Not every moment is a good moment, and sometimes you just want a way to express empathy. These are important moments where you need the power to share more than ever, and a Like might not be the best way to express yourself.<br />At a recent Townhall Q&A, I shared with our community that we've spent a lot of time thinking about the best way to give you better options for expressing yourself, while keeping the experience simple and respectful. Today we're starting to test this.<br />Reactions gives you new ways to express love, awe, humor and sadness. It's not a dislike button, but it does give you the power to easily express sorrow and empathy -- in addition to delight and warmth. You’ll be able to express these reactions by long pressing or hovering over the Like button.<br />We’re starting to test Reactions in Ireland and Spain and will learn from this before we bring the experience to everyone. We hope you like this – or can better express how you’re feeling!</blockquote>
What do think about the new development?<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-11547134970720869432015-10-08T14:26:00.000+00:002015-10-08T14:26:15.286+00:00Facebook Dislike button arrives — but there's a twist<br />
<b><span style="font-size: large;">The Facebook Dislike button arrives, but in the form of reaction emoji</span></b><br />
<b><span style="font-size: large;"><br /></span></b>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicBaQsw2oxjji_hdWO4dKNCORTiQNNL_7TSm6HuXkr_kRvBYAOwqBgJVbsQtdSPJjJtMxZlpyKZz8xLcDXRM-4ldMTDcTVSKrXmo9Ik5zU9mHWrUdzPnGed6vGOih-uB7TZGU4b5pHMIM/s1600/FBDislike1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicBaQsw2oxjji_hdWO4dKNCORTiQNNL_7TSm6HuXkr_kRvBYAOwqBgJVbsQtdSPJjJtMxZlpyKZz8xLcDXRM-4ldMTDcTVSKrXmo9Ik5zU9mHWrUdzPnGed6vGOih-uB7TZGU4b5pHMIM/s640/FBDislike1.jpg" width="640" /></a><br />
<b>Facebook has 1.5 billion monthly active users.</b><br />
Facebook has finally unveiled its solution to people’s calls for a “dislike” button — in the form of six new emoji, each representing their own feeling.<br />
<br />
Mark Zuckerberg hinted last month that his site was looking to expand the Like button, making a way for people to communicate that they were upset by news. And the site is now rolling out its solution in the form of emoji that represent “Love”, “Haha”, “Yay”, “Wow”, “Sad” and “Angry”.<br />
<br />
Zuckerberg said for a long time that the feature wouldn’t be integrated in the “Dislike” button that many people had asked for, and that users wanted so much that it has spawned its own scams. Since that could be used for bullying and might make users feel bad, the site was exploring ways for people to communicate that they were upset without being explicitly negative.<br />
<br />
Facebook’s way of doing that seems to be a series of expressive “Reactions”, rather than exactly replicating the Like button. That button is still available, but the new buttons sit alongside the regular thumbs up as extra options.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ85alQQCzZUdlT3OZPPUbKYeCdYp72x1sJHvytgNnrkQtroohMgUjUziFcIGHC1VRrfa8JcPZHJK3r1MXjtVPXgSL3qo1YXAHApf181Qsv4o6SOImZFY4bxrarMVPCP4AaLWEznd-lHs/s1600/fbreactions.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="186" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ85alQQCzZUdlT3OZPPUbKYeCdYp72x1sJHvytgNnrkQtroohMgUjUziFcIGHC1VRrfa8JcPZHJK3r1MXjtVPXgSL3qo1YXAHApf181Qsv4o6SOImZFY4bxrarMVPCP4AaLWEznd-lHs/s640/fbreactions.png" width="640" /></a></div>
<br />
As with the Like button, the reactions will appear on any post in the news feed on mobile or desktop. The number of reactions that any post has received will sit underneath the post and users will be able to see who reacted and how.<br />
<br />
The site will start rolling out the feature in Spain and Ireland, as a test. The countries have been chosen because they’re relatively closed groups and including Spain will allow the site to try out how the emoji work for non-English users, according to Techcrunch.<br />
<br />
Source: The Independent.Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-34678155393521654402015-10-06T15:22:00.001+00:002015-10-06T15:22:09.279+00:00Microsoft Unveils The Lumia 950 And Lumia 950 XL, Two New Powerful Windows Phones<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-X65LYlRaAEkAPCAv5hgxqAdrs_yWadedSwoZHpHJ46-Nt_N3xQlZToOWv4EV1DDuGuF-ZiY3tRZfSMyesvOu1hKVRc03EzT58G6BmsDZJkz4TKRQojhixJ-ffRZedr8xUfJiBrYDo5k/s1600/microsoft+new+phone.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="359" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-X65LYlRaAEkAPCAv5hgxqAdrs_yWadedSwoZHpHJ46-Nt_N3xQlZToOWv4EV1DDuGuF-ZiY3tRZfSMyesvOu1hKVRc03EzT58G6BmsDZJkz4TKRQojhixJ-ffRZedr8xUfJiBrYDo5k/s640/microsoft+new+phone.png" width="640" /></a></div>
<br />
Microsoft unveiled the best phones no one buys at a press conference in New York. As expected, the company showcased two new flagship devices, the Lumia 950 and the Lumia 950 XL. As the names suggest, the XL variant is a phablet. These devices come with great specs.<br />
<br />
“We want to put Windows in your pocket,” Panos Panay said on stage. “If you haven’t thought about these phones, wake up!”<br />
<br />
The Lumia 950 come with octacore and hexacore processors and liquid cooling technology. The smaller version has a 5.2-inch display, while the bigger cousin features a 5.7-inch display. These are OLED displays with a pixel density of 564 ppi and 518 ppi respectively.<br />
<br />
Both devices run a 20-megapixel camera with a natural flash. It also comes with the fifth-generation optical image stabilization technology and a dedicated camera button. It can also shoot 4K videos.<br />
<br />
All devices come with 32GB of internal storage and a microSD card slot. It has a new USB Type-C connector. Finally, you can charge it to 50 percent in just 30 minutes.<br />
<br />
The two devices will ship in November for $549 and $649. The XL version is $100 more expensive.<br />
<br />
Panay finally hinted at the power of this device. Why would you need liquid cooling for just a phone? Because it’s more than a phone. You can actually plug your Lumia 950 to a dock and use it with your display, mouse and keyboard. It runs a nearly full version of Windows 10.<br />
<br />
Called Continuum, the dock has an HDMI, DisplayPort and three USB ports. It looks like a good old USB hub, it’s very tiny and easy to put in your bag. The tile interface in the Start menu copies your phone’s start menu so that you get the exact same apps on your computer and on your phone. Universal apps, such as Mail and Word are scaled up version of the mobile apps.<br />
<br />
The demo was very smooth. You can switch between tasks using the regular task switcher. And the best part is that you can still use your phone when your phone is docked. To be clear, this isn’t Windows per se as it runs on an ARM processor, but it is Microsoft’s vision of the future of computing.<br />
<br />
Source: <a href="http://techcrunch.com/2015/10/06/microsoft-unveils-the-lumia-950-and-lumia-950-xl-two-new-powerful-windows-phones/?sr_share=facebook" target="_blank">Techcrunch</a>Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-66697013433069957212015-10-06T15:10:00.000+00:002015-10-06T15:30:18.813+00:00Patreon Hacked, Gigabytes Of Data And Code Leaked<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSsCxXBfSXGxI-1uXJNq0qr9tcKQx8FSnBUso_7ZB0KNF1Z-o93Sc8W2KBI4vHHRqL8C8Kp0-45khgEGGzzeMK2rAI3MU2ZPQM5TMCYHckjttiDlTuEDA3bLEIhBxrCPpEgC_a1I1hfpg/s1600/patreoncribs.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="359" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSsCxXBfSXGxI-1uXJNq0qr9tcKQx8FSnBUso_7ZB0KNF1Z-o93Sc8W2KBI4vHHRqL8C8Kp0-45khgEGGzzeMK2rAI3MU2ZPQM5TMCYHckjttiDlTuEDA3bLEIhBxrCPpEgC_a1I1hfpg/s640/patreoncribs.jpg" width="640" /></a></div>
<br />
Maker-funding site Patreon was hacked last week resulting in the dump of gigabytes of code and user data. User passwords were encrypted using bcrypt which suggests they are mostly safe but some users have found their data in the trove.<br />
<br />
Founder Jack Conte wrote:<br />
<blockquote class="tr_bq">
There was unauthorized access to registered names, email addresses, posts, and some shipping addresses. Additionally, some billing addresses that were added prior to 2014 were also accessed. We do not store full credit card numbers on our servers and no credit card numbers were compromised. Although accessed, all passwords, social security numbers and tax form information remain safely encrypted with a 2048-bit RSA key. No specific action is required of our users, but as a precaution I recommend that all users update their passwords on Patreon.</blockquote>
The data seems to have come from a debug version of the site that was visible to the Internet. The debug version included a “snapshot” of the production database. “We protect our users’ passwords with a hashing scheme called ‘bcrypt’ and randomly salt each individual password. Bcrypt is non-reversible, so passwords cannot be ‘decrypted.’ We do not store plaintext passwords anywhere,” wrote Conte.<br />
<br />
Conte recommends changing your Patreon password and the password to any other site using a similar passphrase. He said no credit card information was leaked.<br />
<br />
Source: <a href="http://techcrunch.com/2015/10/05/patreon-hacked-gigabytes-of-data-and-code-leaked/" target="_blank">TechCrunch</a>Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-22247055131923792002015-10-06T14:36:00.000+00:002015-10-06T14:36:27.195+00:00Google’s Project Link brings broadband supply to Ghana<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPVZJQfkQnsGvilDAgghYM05Tq_5wUEM6fieIMrI6Os6i7U_6kD0K8euSyzH9OwQfiwpPmulE9KgImXRw-YUuq34NvSbdu5SfJw8LTuS4zvAsXWjUUWDTUuR2fapSXn6J7fGepmnT-YXc/s1600/Independence_Square_Accra_Ghana-750x400.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="341" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPVZJQfkQnsGvilDAgghYM05Tq_5wUEM6fieIMrI6Os6i7U_6kD0K8euSyzH9OwQfiwpPmulE9KgImXRw-YUuq34NvSbdu5SfJw8LTuS4zvAsXWjUUWDTUuR2fapSXn6J7fGepmnT-YXc/s640/Independence_Square_Accra_Ghana-750x400.jpg" width="640" /></a></div>
<br />
A couple of business leaders and celebrities like Mark Zuckerberg, Bono, Bill Gates, Richard Branson, amongst others, signed a declaration challenging world leaders to make the internet available to the whole world by 2020.<br />
<br />
As ambitious as this may seem, it’s still within reach. Google is working on Project Loon – a fleet of high-altitude balloons designed to bring the Internet to remote areas. Facebook has started building flying Wi-Fi hotspots supplied by solar-powered drones and OneWeb – backed by Richard Branson, plans to launch hundreds of low-orbit satellites.<br />
<br />
Yesterday, Google announced the introduction of its Project Link initiative to Ghana. The initiative which already provides broadband Internet to Kampala, the capital of Uganda, will provide fiber optic network in two cities in Ghana – Accra and Kumasi creating access to the millions of people living in these cities.<br />
<br />
Google Ghana country manager Estelle Akofio-Sowah commented saying “The goal is to bring abundant Internet access to the people who need it most,”<br />
<br />
Google broke ground on the new 1,000-kilometer fiber network in June and is on track to offer the service to its first customers by the end of 2016, according to Akofio-Sowah.Project Link sells broadband capacity to other Internet service providers and mobile carriers. It’s different from Google Fibre which sells broadband capacity to consumers in some American cities. Project Link provides internet services to developing nations via old fashioned underground pipes full of cables. This method is considered to be a more cost effective method as opposed to the use of satellites and drones.<br />
<br />
In recent years, companies like Seacom and <a href="http://techpoint.ng/2015/09/16/main-one-mdx-i-lagos-tour/" target="_blank">Main One</a> have helped improve Africa’s broadband capacity through the use of undersea cables.<br />
<br />
But a different problem lies in bringing that capacity from the coast into African cities and that’s the issue that Project Link is trying to solve. Google isn’t the only one who has identified this problem. Liquid Telecom, a Mauritius-based company, is working on supplying broad band to countries like Zambia. Hopefully, Google’s attempt to bridge this gap will also attract more investments to Africa.<br />
<br />
There wasn’t much buzz about the first Project Link network was announced in late 2013 and brought more broadband to Uganda. Ghana is believed to be a better connected country,<br />
<br />
Before joining Google, the managing director of Ghanaian Internet service provider – Busy Internet – Akofio-Sowah, says that Internet capacity hasn’t really reached the public yet and that Internet access in the country is still too unreliable and inexpensive for most. “There are people who want to use the Internet, build apps, run their businesses online,” she says. “But they simply can’t.”<br />
<br />
Project Link’s provision of more broadband to central cities in Ghana will make Internet connections cheaper and more reliable in those cities. However, there might be room for Project Loon which would be useful for bringing Internet access to more remote parts of the country through flying balloons.<br />
<br />
Source: <a href="http://techpoint.ng/2015/10/02/googles-project-link-brings-broadband-supply-ghana/" target="_blank">Techpoint.ng</a>Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0tag:blogger.com,1999:blog-2488750746636771523.post-965308371894073412015-09-22T17:06:00.000+00:002015-09-22T17:06:34.854+00:00SOLVED: Fix the "Program is to big to fit memory" Issue<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsxL5FTdFajyyRIghPu3PnlxSEcP0gPrH2gqvME3SP_DstZq0-6M1AnpH9OKGs8HSqEFAi8XA-QVujNb110UB_esnUVEMindW-Hkw4g5jNds37RvJG0fwox-AfV9mmososcF5lLjIE4g/s1600/fit+in+memory1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="347" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsxL5FTdFajyyRIghPu3PnlxSEcP0gPrH2gqvME3SP_DstZq0-6M1AnpH9OKGs8HSqEFAi8XA-QVujNb110UB_esnUVEMindW-Hkw4g5jNds37RvJG0fwox-AfV9mmososcF5lLjIE4g/s640/fit+in+memory1.png" width="640" /></a></div>
<br />
You might be experiencing a problem whiles installing a program with the message <b>"program is to big to fit memory" </b>shown in the command prompt interface just like the <b>featured </b>image on top, or the message might appear in flash within a second and vanishes when you try reading<br />
<br />
<b>SOLUTION 1</b><br />
<br />
Thr program you are installing is a 64bit (x64) processing application program whiles your computer system hardware is a 32bit (x86) processing system.<br />
<br />
Therefore, you need to get the 32bit version of the application program for it to work.<br />
<br />
<br />
<b>SOLUTION 2</b> (USE ONLY IF <i>SOLUTION 1 </i>IS NOT THE CAUSE OF THE PROBLEM)<br />
<br />
1. Go to System Properties - > Click <b>"Advanced system settings"</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrG588Tc7l6mBDA2HTfO19FAUAWeI9P0DwelT8yigkzmKceiXRcYm-wiNH7IaNAKDBt_2ZzyEH364grXREM2YRYKM9nkzePJIguDD91vvbNRJxu2MzGpGXhIfdVIYH0-WWwAiPiuTNsR4/s1600/1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="325" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrG588Tc7l6mBDA2HTfO19FAUAWeI9P0DwelT8yigkzmKceiXRcYm-wiNH7IaNAKDBt_2ZzyEH364grXREM2YRYKM9nkzePJIguDD91vvbNRJxu2MzGpGXhIfdVIYH0-WWwAiPiuTNsR4/s640/1.JPG" width="640" /></a></div>
<br />
<br />
2. The below dialog-box opens - Click "Settings"<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdQ1RU4XQDc_qh9DhWo4ri-AC5ygETlifDqDN8AFppVimTmkiAOBuI57lJ4lHWBpmdimHFV7bVtaC-yicnLa10oIuTE7Catfy2mFd0d1awHAGdGY3Whi4UvD0bwvz0w4-hyXQRN75v54A/s1600/2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdQ1RU4XQDc_qh9DhWo4ri-AC5ygETlifDqDN8AFppVimTmkiAOBuI57lJ4lHWBpmdimHFV7bVtaC-yicnLa10oIuTE7Catfy2mFd0d1awHAGdGY3Whi4UvD0bwvz0w4-hyXQRN75v54A/s1600/2.JPG" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
3. Switch to "Advanced"</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix5JYw3y5xkL9irNjaTTqfwRxEz5rJTZVLv6eI2iEY6fPoYfvTbKE4AVTs0v_KVppw1z7GhSDHsLLpE_A0XoPlC7RTJFbwz6SBrk_09ctYM7QAzIAILDczLaCfbjmdac0I5khg8C9HroI/s1600/3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix5JYw3y5xkL9irNjaTTqfwRxEz5rJTZVLv6eI2iEY6fPoYfvTbKE4AVTs0v_KVppw1z7GhSDHsLLpE_A0XoPlC7RTJFbwz6SBrk_09ctYM7QAzIAILDczLaCfbjmdac0I5khg8C9HroI/s1600/3.JPG" /></a></div>
<br />
<br />
4. Click - "Change"<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaTyfWJYO1Mw_B3A2qwjl0uw6px3DH_XBc73dcoCJkMvBDJKcQko3-AC0NsOCGflhunHYGDFpgC8cJi3782Za9c6rFDx2iyAa4nB-c3wT_9ETYtcnBlfyIAQnyIIAulMSEiFCs7GBopy4/s1600/4.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaTyfWJYO1Mw_B3A2qwjl0uw6px3DH_XBc73dcoCJkMvBDJKcQko3-AC0NsOCGflhunHYGDFpgC8cJi3782Za9c6rFDx2iyAa4nB-c3wT_9ETYtcnBlfyIAQnyIIAulMSEiFCs7GBopy4/s1600/4.JPG" /></a></div>
<br />
<br />
5. Click the check-box "Automatically manage paging file size for all drives" to uncheck<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHHITI8QOlxQTwK48IQz0vUETv9RYJ3iqDevmtd-f-luueems_b-tcggELYUCe_EydCOkHkXdpwfStAC8vgXrtS9trFnAeLPUqEGz4_OTof6_DHMxny2yN4uEhP13Ifq83e0fw6XUO4y4/s1600/5.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHHITI8QOlxQTwK48IQz0vUETv9RYJ3iqDevmtd-f-luueems_b-tcggELYUCe_EydCOkHkXdpwfStAC8vgXrtS9trFnAeLPUqEGz4_OTof6_DHMxny2yN4uEhP13Ifq83e0fw6XUO4y4/s1600/5.JPG" /></a></div>
<br />
<br />
6. Select your "System managed" drive and click the custom size radio button<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit6mFTTkUhxdHTbJQw1R7hXvGS5uilnBAcQSt3EXu-7rxoJmyD2ABl-bfH2gnsL2wdaG2u5q0_ljSNm7wMF4ELVpa0HhyIOdn_QZAXALsW6vv1umelypBtYM9ASv-ZLd9lgJCWJ6CXS4c/s1600/6.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit6mFTTkUhxdHTbJQw1R7hXvGS5uilnBAcQSt3EXu-7rxoJmyD2ABl-bfH2gnsL2wdaG2u5q0_ljSNm7wMF4ELVpa0HhyIOdn_QZAXALsW6vv1umelypBtYM9ASv-ZLd9lgJCWJ6CXS4c/s1600/6.JPG" /></a></div>
<br />
<br />
7. Specify the initial size (MB) to 5000 and the Maximum size (MB) to 6000<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq3qidAzHZdpnelKDWtqEKdsd-1JHRAiCGrDrnCbD7FCJXAa6aJDc7W1zKU2u784Qt2qLQLZRtJKmhcVLlpcpqwWQg1IJmNoQgiAlNU6F4Bmqm5Qm_2Lt-5B8aY3h9FO2Jpf_qHA678N0/s1600/7.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq3qidAzHZdpnelKDWtqEKdsd-1JHRAiCGrDrnCbD7FCJXAa6aJDc7W1zKU2u784Qt2qLQLZRtJKmhcVLlpcpqwWQg1IJmNoQgiAlNU6F4Bmqm5Qm_2Lt-5B8aY3h9FO2Jpf_qHA678N0/s1600/7.JPG" /></a></div>
<br />
<br />
8. Your Virtual Memory dialog-box should appear this way below, after clicking "set"<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDox-VIlV2TXUmh3ffGG729JMbwYVtAq7s3TGe4E0dL4eNjAIv1LAm6b2d9rqeaLfJpohjmMaTRFfHEhB_wFiM5ehwQy3-yhmnk-nfxH4RW0NvzD1pN6oIeyL_VHciOaUvBRq_3E1w2ns/s1600/8.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDox-VIlV2TXUmh3ffGG729JMbwYVtAq7s3TGe4E0dL4eNjAIv1LAm6b2d9rqeaLfJpohjmMaTRFfHEhB_wFiM5ehwQy3-yhmnk-nfxH4RW0NvzD1pN6oIeyL_VHciOaUvBRq_3E1w2ns/s1600/8.JPG" /></a></div>
9. Click "OK" and restart<br />
<br />
This should solve the problem.<br />
If it helped please comment and share!<br />
Thanks<br />
<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/11506734316393020657noreply@blogger.com0