Linux Firewall – Top 7 software
For all the linux fans out there, I have compiled a Top 7 list with the best linux firewall solution available on the market. At least this is my opinion. Feel free to share your point of view regarding what is the best linux firewall you have worked with. #1 Iptables In order to operate Iptables you need to have root access, otherwise it will not work. Iptables is a linux firewall, a user space application software that executes packet filtering, port ...
How Android devices can be infected via PC
Symantec researchers have found out a PC Trojan that is able to infect Android powered devices with financial stealing malware. This malware was named Droidpak and until now it is not known how it affects the PCs or laptops in the first place but we know how it works. In the initial phase it stores a vicious DLL file so it can register as a system service and after that it connects to a remote server in order to download a configuration ...
Yahoo users targeted with infected ads
Yahoo users targeted with infected ads Visitors of the Yahoo domain got targeted with infected ads that were redirecting them to an exploit kit that bombed their machines with various kinds of malware according to Fox-IT, a dutch security audit company. For the moment it is not known how these infected ads managed to pop up in the iframes of ads.yahoo.com but it is sure that they were leading the targeted users to some domains that were hosting the Magnitude exploit kit. All these ...
How NSA uses the Google cookies to track suspects
How NSA uses the Google cookies to track suspects The latest documents that were released by Edward Snowden shed a new light on how NSA and the British GCHQ (Government Communications Headquarters) are taking advantage of Google's "preference" cookies in order to track suspects and follow their moves on the Internet. Finally all these lead to the exploitation of these suspects. The Google PREF cookies or "GooglePrefIDs" as the NSA likes to name them, consists from an unique number that is assigned ...
Password cracking – a quick guide to success
Password cracking – a quick guide to success This article will give you an insight on password cracking and you will learn the basic approaches of this process. If you are new to this subject you will see that this article was meant to help you understand better the principles of password hacking. Password cracking is the procedure of retrieving a password from data that was saved onto or sent by a computer system. There are various reasons why one would want ...
Help Desk Software – beginner’s guide
Help Desk Software – beginner’s guide If you work in a big company (like me for example) you know that things are a little more complicated when it comes to it help desk because all requests are processed through help desk software. Back in the days when I was working as a network administrator things were different. My mobile phone and my desk phone rang like crazy. I was running from one office to another helping my colleagues with their technical problems. ...
Linksys WRT54G – A successful wireless router saga – Part 1
The WRT54G, WRT54GS, WRT54GL and WRTSL54GS are members of a very popular series of wireless routers produced by the American company Linksys, which in 2008 was bought by another American company, Cisco. The WRT54G was first released in 2003, based on a Linux OS firmware. Since 2005 the WRT54G manufactured devices work on the VxWorks OS. To provide support for Linux-based firmware, Linksys has renamed the original type routers with Linux in WRT54GL from WRT54G. These routers are suitable for sharing Internet ...
Watch out for Android Defender mobile scam
Font apps from Google Play contain spyware
Analysts discover more BadNews on Google Play
An old Android Trojan got downloaded from Google Play by millions
Beware of Android malware spreaded by Cutwail botnet
Aggressive Android adware and malware on an uptrend
How to defend your Android apps
Watchout for fake Candy Crush apps from Google Play
Researcher discovered critical Samsung Android smartphone vulnerabilities
Read More Posts From Android
Second Life Client 3.7.0 Build 285178
Minecraft Server 1.7.4 Stable / Snapshot 14w02a
DotA Allstars – Warcraft III Map 6.79d
Get the GTA IV Addon – GTA V Taxi with Liberty City Texture
Get GTA IV Addon – BMW M3 1990 Race Version
Get the GTA IV Addon – Volkswagen Caddy
World of Tanks Patch 0.8.8
Battle of the Immortals Patch 1309090
Heroes of Might and Magic 3 Unofficial HD Patch 3.57f
Read More Posts From Software patches