0
How to detect a hacker attack How to detect a hacker attack

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit , several exploit...

Read more »

0
Ubuntu 13.10 Kernel Exploit Ubuntu 13.10 Kernel Exploit

A security issue affects Ubuntu 13.10 releases of Ubuntu and its derivatives Saran Neti reported a flaw in the ipv6 UDP Fragmentation ...

Read more »

0
Google is monitoring Wikipedia Google is monitoring Wikipedia

Thomas Steiner, a Customer Solutions Engineer at Google Germany GmbH, Hamburg has created an application that shows in a very clear ...

Read more »

0
Millions of Vulnerable Android Devices Exposed Millions of Vulnerable Android Devices Exposed

Android devices prior to version 4.2.1 of the operating system—70 percent of the phones and tablets in circulation—have been vulnerable ...

Read more »

0
Win 100GB of Free OneDrive Storage Win 100GB of Free OneDrive Storage

Microsoft yesterday rebranded SkyDrive to OneDrive , so the company decided to give away 100 GB of storage for one year free of charge f...

Read more »

1
How to take Backup of your Blog How to take Backup of your Blog

Learn how to create a backup of your blogger blog with a click. You can download the entire blog include posts and comments. The Import...

Read more »

1
SMS Spoofing with Kali Linux SMS Spoofing with Kali Linux

The new Kali-Linux (BT6) comes with many advance and increasing features and one of its incredible feature is its SMS spoofing weapon. ...

Read more »
 
 
Top