Sunday , April 28 2024 5:55 PM
Home / Other OSpage 7

Other OS

602 Gbps! This May Have Been the Largest DDoS Attack in History

Cyber attacks are getting evil and worst nightmare for companies day-by-day, and the Distributed Denial of Service (DDoS) attack is one of the favorite weapon for hackers to temporarily suspend services of a host connected to the Internet. Until now, nearly every big website had been a victim of this …

Read More »

The Most Trusted Messenger for Private Chat

Telegram Messenger – what’s good? I’ve been using WhatsApp for more than 3 years now but lately it has been getting slow. A notification will be delayed by a couple of minutes, that funny video shared in the hilarious group will time out – little things like that. Granted, I got …

Read More »

HOW TO RUN NOT WORKING APPS ON ROOTED ANDROID

HOW TO RUN NOT WORKING APPS ON ROOTED ANDROID We all know how useful is a rooted android phone. Mostly when we want to gain access to several Android applications and require root menu access. But what happens when some apps refuse to run on rooted mobile phones.  Don’t worry, …

Read More »

How To Install and Configure Elasticsearch on Ubuntu 14.04

Introduction Elasticsearch is a platform for distributed search and analysis of data in real time. Its popularity is due to its ease of use, powerful features, and scalability. Elasticsearch supports RESTful operations. This means that you can use HTTP methods (GET, POST, PUT, DELETE, etc.) in combination with an HTTP …

Read More »

How Hackers Can Hack Your Chip-and-PIN Credit Cards

Now, a group of French forensics researchers have inspected a real-world case in which criminals played smart in such a way that they did a seamless chip-switching trick with a slip of plastic that it was identical to a normal credit card. The researchers from the École Normale Supérieure University …

Read More »

Google Secretly Records Your Voice

OK, Google is Listening… and Recording too. Google is not just listening to your searches, but the search engine is also recording and storing every single voice search you make. Google is incredibly accurate at understanding your voice. The company secretly stores its users’ searches from its voice-activated assistant Google’s …

Read More »

Multiple XSS security vulnerabilities in the Visual Composer WordPress plugin

There are multiple XSS security vulnerabilities in the Visual Composer WordPress plugin versions prior to 4.7.4 (releases prior to October 2, 2015). Finally WP Bakery, the creators of Visual Composer, who have addressed all identified vulnerabilities and undertaken a code audit to ensure that it is as secure as possible.Developers  whose …

Read More »

Terrorists Targeting Indian Government

The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm. Terrorists involved in Cyber Espionage and Operations aim at gaining access to Nation’s critical infrastructure involving both Government as well as Private sectors. The Frequency and Intensity of such Cyber-attacks are increasing rapidly …

Read More »

LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones

Your device’s lock screen PIN is believed to keep your phone’s contents safe from others, but sadly not from a new piece of ransomware that is capable of hijacking safety of your Android devices. A group of security researchers has uncovered what is believed to be the first real example …

Read More »

SQL Injection : How It Works

Introduction Lets get started at an apparently unrelated point. Lets assume we create a table in SQL. Now there are three main parts of a database management system, like SQL. They are – Creating structure of table Entering data Making queries (and getting meaningful results from data) Now, when SQL …

Read More »