Tuesday, May 16, 2017

Intel Skylake-X leak suggests first Core i9 CPUs are coming this year

Hello Friends,
Let's be honest, Intel hasn't released anything particularly exciting in a long while now. It's the reason my primary desktop is still rocking an Intel Core i7-4790K Devil's Canyon processor released several years ago. Sure, I could scamper over to an X99 configuration, but at this point it makes more sense to see what Skylake-X and Kaby Lake-X bring to the table. That remains to be seen, though if the latest rumor is to believed, at minimum we can expect new branding, at least for Skylake-X.
Read More

Thursday, April 13, 2017

Special IP Addresses

Hello Friends,
IP Addresses short for Internet Protocol address, an IP or IP address is a number (example shown right) used to indicate the location of a computer or other device on a network using TCP/IP. These addresses are similar to those of your house; they allow data to reach the appropriate destination on a network and the Internet.

IPV4  and  IPV6

As the Internet and technology
Read More

Penetration Testing with Kali Linux Methodology

Hello Friends,
Kаli Linux is designed for penetrаtion testing. Whether the penetration tester’s stаrting point is white-box testing, black-box testing, or grаy-box testing, there are аlways steps to follow when performing penetration testing with Kali or other tools.





Read More

Wednesday, April 12, 2017

Microsoft Office Word 0-day remote code execution vulnerability

Hello Friends,
On April 7, two researchers from McAfee and FireEye broke a 0-day vulnerability in Microsoft Office Word. By sending a message with an OLE2link object attachment, when the user opens the attachment, the code executes and connects to an attacker-controlled remote server, thereby downloading a malicious HTML application file (HTA) that will disguise Become a Microsoft RTF document.
Read More

Tuesday, April 11, 2017

Practice VS Theory

Hello Friends,
Education in many countries attaches great importance to theory. We are thrown into the head of a bunch of knowledge. To go to college, things aren't much better either.

Most of these theories are quite abstract, so students are difficult to absorb. By learning without knowing how to apply, these theories will fade out. Many students feel confused because they don't know "what do I learn this for ? "

Read More

How to Edit Google Drive's file on Microsoft Office

Hello Friends,
Edit any document or spreadsheet stored on Google Drive, you no longer need access through Drive, which can be edited directly on Microsoft Office.
Google has provided a very useful plugin that makes this easy. You download and install the plugin at https://tools.google.com/dlpage/driveforoffice. This plugin supports Microsoft Office for Windows XP and above.

Read More

Monday, November 14, 2016

IoT Malwares Can Turn the World Upside Down

Hello Friends,
When it comes to Internet of Things (IoT) devices, everything from smart glasses to connected cars is susceptible to malware infection if not properly secured, Fortinet senior researcher Axelle Apvrille said in a presentation at the DefCamp 2016 security conference in Bucharest, Romania this week.
CCTV cameras, DVRs and network routers have made headlines recently as vulnerable IoT devices due to their connection to distributed denial of service (DDoS) botnets such as Mirai and Bashlite, but malware could target more devices, including smart toys, home appliances, wearables, and more. In fact, the future could be a dark one for such devices and for their users, the researcher says.
Read More

Chinese Hacking Group Hacked Google’s Pixel Smartphone In 60 Seconds

Hello friends,
The brand new Android smartphone launched by Google- Google Pixel, just a few months back has been hacked by a team of  white-hat hackers at the 2016 PwnFest hacking competition in Seoul(South Korea). In less than the minute this Chinese hacking group from Qihoo 360 hacked this smartphone
The Qihoo 360 team demonstrated a proof-of-concept exploit that used a zero-day vulnerability in order to achieve remote code execution (RCE) on the target smartphone. They won $120,000 cash prize for successfully hacking the Pixel smartphone.
Read More

Monday, November 7, 2016

This Simple Hack Can Hijack More Than 1 Billion Android App Accounts

 Hello Friends,
A group of researchers from Hong Kong has discovered a method to attack numerous mobile app accounts effortlessly. They have said that these applications have been downloaded more than 1 billion times.
Ronghai Yang, Wing Cheong Lau, and Tianyu Liu from the Chinese University of Hong Kong have looked at 600 most popular US and Chinese Android applications. Out of that, 182 applications, i.e., 41 percent of the total, supported single sign-on.

Read More

Microsoft Is Working To Bring A New File Format With Windows Creators Update

Hello friends,
Microsoft has joined the 3D formats working group at Khronos. They will contribute their efforts to the development of the GL Transmission Format (glTF) open project. This will bring the glTF to Windows as part of the Creators update in 2017.
The glTF is a runtime asset delivery format for Graphics Library (GL) APIs like OpenGL, OpenGL ES, WebGL. It has been brought into existence to bridge the gap between 3D content creation tools and modern GL applications. It can be understood as the JPEG of 3D.
Read More

Thursday, November 3, 2016

Microsoft will pay you not to use a Macbook

Hello Friends ,
How about getting paid $650 for trading a MacBook Pro or MacBook Air and get a Surface Book or Surface Pro instead? Does the deal sound exciting to you?

Well, that’s what Microsoft is trying to do. The software giant is hoping to sway you by paying as much as $650 to get rid of your current MacBook Pro or MacBook Air and “trade up” to a new Surface Book or Surface Pro at a Microsoft Store or via Microsoft.com. Microsoft’s Mac trade-in program is yet another campaign in the company’s buyback battle against Apple.
Read More

Search This Blog

Powered by Blogger.

Pages