Questions? Feedback? powered by Olark live chat software
| Get: Our Articals In Your Email | Get: 120 Important Softwares all on DVD | Buy a VPN Or Proxy to get free internet | Contact Us


Ads 468x60px

Sunday, 31 May 2015

How To Use Pattern Security method to Secure your windows PC

Pattern security is security method found in android phone where you join different dots together to form a password and unlock your phone  . lot of you out there have been asking them selves how they can use this mechanism on their pc  well it now possible with the use of a third party app called Enusing Maze Lock



Here am going to show you how to use it

How to

Before we start we need to go ahead and download  Enusing Maze Lock and install it and run it . on the first run it will ask you to reset the default pattern lock because it comes with a default pattern lock so you need to change it and put your own.



Press OK the configuration windows will appear . In order to create your own pattern, you will need to press the “Reset Pattern” button and then draw a pattern on the dots given above. Eusing Maze Lock provides you with three different grids of which you can draw your pattern  The default grid is 3*3 (9 points) and it is also the least secure. For better security, you can have 16 points (4*4) or 25 points (5*5) grid. Just select a suitable option from the drop down menu.


here is something you shouldn't forget  when you are configuring  Enusing Maze Lock for the first time you need to finish the configuration completely before doing something else on your computer because if you leave the configuration windows open  for a long time Enusing Maze Lock will automatically lock the system  how to prevent this you just have to finish the configuration first and then everything else will come after .
and if this happen for any reason  just restart you computer and start again the configuration but the best is the above tips.


After you have finish configuring  Enusing Maze Lock it will be in the system tray  when ever you want to lock the screen by right clicking the system tray or by doing the following shortcut key combination Windows key + A

Further Enusing Maze Lock configuration

Enusing Maze Lock has many configuration that you can mess up with to configure what you want 


The configuration options include the following:

Auto lock at Windows Startup – Turned off by default. You can turn it on to load the security software at Windows Startup.

Auto lock computer after – Specify the number of minutes of inactivity after which the computer is locked automatically.

Turn off monitor after – Specify the number of minutes of inactivity after which the monitor is turned off.

Auto-hide unlock window after – I recommend it to a value of Never to avoid problems.

Disconnect Internet when locked

Alert after entering incorrect pattern over – Number of times allowed to enter a pattern. This is necessary to keep the crackers and hackers from using brute force methods to break the security.

Alert mode – set alarm to notify you after a so many unlocking attempt

Lock keyboard – You can either use shutdown the computer or lock keyboard in order to prevent hackers from trying too many times.
Unlock mode

There are three unlock modes available in Eusing Maze Lock.

Normal Unlock Mode draws a trail as you fill in the pattern.

Secure Unlock Mode keeps the trail invisible. This is very helpful if you are unlocking your computer in front of someone else.

Dynamic Password Mode will require users to match and enter random generated passwords along with the pattern. This is especially useful to prevent key-loggers.



Note:  using  Enusing Maze Lock does not disable the security mechanism in your system  instead it will be an additional  security mechanism to your system if you have set a password for you computer and you are also using  Enusing Maze Lock you will be ask to put your password first and then draw a pattern to unlock your computer and have access to it .















Continue Reading...

Saturday, 30 May 2015

How to create a strong Password

A strong password is hard to create. to remember and to type it  that why so many people choose  a password which is very simple to remember and thus week 

remember  that strong password are for keeping hackers out of your account

here are the tricks to create a strong password  and easy to remember  but before i get there here are some rules for creating a strong password

 Never make a password easy to guess

you know that when Adobe was attacked last month, more than 38 million users (which was previously thought to only be 2.9 million) had private data stolen, including credit cards and Social Security numbers.

Adobe has since revealed that out of those 38 million people, 1.9 million used the password "123456" to protect their account. that really not protecting when you need to protect.

here are 20 most common and easy-to-crack passwords found in Adobe's database  

1.123456
2.123456789
3.password
4.adobe123
5.12345678
6.qwerty
7.1234567
8.111111
9.photoshop
10.123123
11.1234567890
12.000000
13.abc123
14.1234
15.adobe1
16.macromedia
17.azerty
18.iloveyou
19.aaaaaa
20.654321


really?
Don't risk using a weak password to protect your accounts.
Hackers look at these lists too and they have computer programs that can guess common passwords,
password that you think are hard might not be hard as you think for hacker to get in a shot time.

The strongest password is one that contains a random collection of letters (uppercase and lowercase), numbers and symbols. i know  that's nearly impossible to remember but that how things must be done.
Shorter passwords are much easier to crack, so hackers go for those first. The longer passwords take hackers longer to decode, as long as they aren't obvious like "123456789". Hackers scan for the obvious ones first a different way.

the strong the  password the long the time it take for hacker to crack your password or to guess it 
hacker don't don't even try password which are 8 characters long because they take long to crack but am not saying that 8 character long password id the good choice and strong because computer also are getting powerful so even 8 character long password can now less time to crack

Rules to create a strong password 



1. A strong password has to contain a random collection of letters (uppercase and lowercase), numbers and symbols

2. It has to be at least 8 characters or longer

3. never use the same password for different account each account must have it own unique password 

Example of a strong password 

something like "R2(*-*).^Gw-wG5+6" is a really strong  password.
You can use a catch phrase, quote or even a song lyric.  but then don't just put it like you found it  when you choose a lyrics like "we are going home"  a lyrics that you know that you can't forget to make it  a strong password you are not just going to put it just they way it is  .make  
W?|_|e(R)!G0H&m 
what  i did here is  i took a  we are  i turned it to W?|_|e(R)! and going home i turned it to G0H&m
and that how i made it strong  a password is strong when you are mixing characters am not saying you should take password that i just did there but am just giving you the idea.





Continue Reading...

Friday, 29 May 2015

How to remove a Virus on your Computer without using any Antivirus

here am about  to show you how to remove  virus and malware on your computer manually.here you don't need any antivirus to do what am about to show you here 


let get started...



Step 1

Run msconfig and look for suspicious files. here is one . It’s unknown, and it also has a startup key that we’ve never seen until now. check it and click on disable all 

















In case you think you are being monitored. Open Command Prompt and do the following procedures
open Run and type in CMD then press enter  you will now see the command prompt windows now type in the following command 
netstat -abno and press enter 
if you find a program having an establish state  and you don't recognize the address that could be 100% a virus 


 
Step 2

Boot into safe mode. This can be done by checking the box in the “boot” tab in msconfig.


















removing  a virus is very easy and secure when your are running your computer in safe mode  when your running your computer in safe mode virus won't  run  while your computer is in safe mode 


step 3

open Run and type in CMD  there you should see the command prompt windows , type in the following command cd/ and  press enter this will take you to the root  c:\>. after that you need to type in Attrib  

after typing in attrib  you will see the following screen  . now how to know a virus  usally in c:\> there is no .exe or .inf files  if you see one  then that a virus  and you need to delete it  by doing the following command 
type del  then the name of the file you are deleting and press enter   after deleting you will need to make sure that the file you deleted is really deleted  type in again Attrib  and look look to confirm that the file is no longer there  nd after confirming  there you have it  you have just saved your computer from viruses without antivirus  







Also read:  How to use Ultrasurf



Continue Reading...

Thursday, 28 May 2015

How To use Ultrasurf

here am about to show you how to use ultrasurf.   ultrasurf is a proxy software it's  used to unblock website  for which you don't have access to . like in universities there some website that that they block for whatever reason   after reading this  you will access to website that u never had access to before

before we get started  you need to go to the official website of  ultrasurf and download ultrasurf .
after downloading then we are good to go  all you need to do is to get you pc ready to access websites that it has never access before .

step 1. extract the file received it should be in a zip format u need to use Winrar or whatever you are using to extract  after extracting

step 2. run the .exe file   after running it don't expect it to start installing  it  does not install it will just start as soon as you run the setup   after running you will see the  something like this one














when you are launching ultrasurf  you may get a WINDOWS SECURITY ALERT , when you get it simply click on allow access to private network  and  and click on ALLOW ACCESS. doing this will give it admin permission and click okay 



















step 3. you  need to go to your browser proxy configuration  and put the proxy  manually  if you are using other browser apart from IE you need to got




3. Set browser network proxy

On IE, you can use the Ultrasurf proxy service directly after connection, but on Chrome, Firefox, Safari or any other browser, you also need to set the network proxy to "127.0.0.1 : 9666".

Take Firefox for example, you can find the proxy settings page on the following way:


Preference –> Advanced –> Network –> Settings

Then select "Manual proxy configuration" to enter "127.0.0.1" & "9666" on the HTTP Proxy column, check the "Use this proxy server for all protocols" box, and click the "OK" button to save the change.

after that you are good to go
Continue Reading...

An iOS bug reportedly Causing the iPhone to Crash asking For reboot

Have you recently being sent a wired message on your iPhone and suddenly  shut down your iPhone ?  well that a issue with iPhone
Apple says it working to fix a bug in iOS,  this bug is a message that is causing app to crach and not only to crash the application but also to promp a reboot to the user's iPhone

According to 9to5Mac, the bug involves a very specific set of characters that will create problems when it pops up as a Notification on a user's smartphone when displaying the lock screen.

users are claiming that a message is forcing their iPhone to shutdown
Apple says the issue is "caused by a specific series of unicode characters" and will be fixed in a future software update.






Continue Reading...

Wednesday, 27 May 2015

JavaScript to be the default language for GNOME


JavaScript is becoming a force to reckon with GNOME developers have at last decided to stick to JavaScript to write applications for the desktop environment. However, the developers are still recommending C to write system libraries.


“During the GNOME Developer Experience Hackfest this week, one of the major goals we identified was the need to pick a single language to give a simple answer to those who ask, 'How do I write a GNOME app?' Our decision is to support JavaScript as the first class language for GNOME application development”, read a blog posting by Collabora engineer and GNOME developer, Travis Reitter.
Explaining the reason for choosing JavaScript, Travis added, “Our language of choice needs to be dynamic and high level. There is already momentum in the GNOME Project for JavaScript; it's used in GNOME Shell and GNOME Documents. There's a lot of work going into the language to make it especially fast, embeddable, and framework-agnostic. JavaScript is increasingly being seen as a first class desktop programming language; it is being used in Windows 8, in mobile platforms, and for local Web applications. JavaScript is self-contained; it doesn't come with its own set of core libraries, which makes it more convenient for us when integrating it into the platform”.

Until now, there were no specific set of tools to write an application for the GNOME desktop environment. With this announcement, JavaScript will become the default language for GNOME applications.


Also read: VENOM: A New Virus That can Attack Even Virtual Machines

Continue Reading...

The First Powerful RAM Ever Made The DDR4 128GB

The first kit highlighted by FossBytes is the new HyperX DDR4 128GB memory kit that runs at 3,000MHz, which makes it the fastest such kit in the world. The kit was unveiled last week by HyperX parent company Kingston, which explained that “the kit consists of eight 16GB HyperX Predator modules (16GB x 8) motherboard in an eight module, quad-channel configuration along with an MSI X99 MPOWER motherboard in an eight module, quad-channel configuration along with an Intel Core i7 5820K processor.”

Similarly, Corsair earlier this month released 128GB DDR4 RAM kits of its own that are designed to work with Intel X99 series motherboards and that run from 2,400MHz to 2,666MHz.

As you’d expect, these RAM kits are also insanely expensive — the cheapest one costs $1,755 and the more costly ones go well north of $2,000. All the same, if you want to make absolutely certain that your PC has enough RAM to run any game for the next several years, investing in these kinds of RAM kits will definitely do the trick.


Also read: Android M is about to add native support for fingerprint scanners
Continue Reading...

Simplicity Linux Makes everything easy and simple

The latest edition of Simplicity Linux, version 15.4, recently became available for download. Simplicity Linux delivers just what its name suggests: It is a simpler way to run a fully powered Linux desktop on any computer you touch.

The latest edition of Simplicity Linux, version 15.4, recently became available for download. Simplicity Linux delivers just what its name suggests: It is a simpler way to run a fully powered Linux desktop on any computer you touch.

Simplicity lets you carry your entire desktop, favorite installed applications, and complete collection of documents and files in your pocket everywhere you go. Other Linux distros let you do much the same thing -- but solutions like Puppy Linux, Porteus, Knoppix and such take a bit more technical prowess to set up and configure.

Simplicity Linux does all of the heavy lifting, well, more simply. If you already know Puppy Linux, consider Simplicity Linux a close family cousin that will bring new life to your computing.

One compelling reason for using Simplicity Linux is its desktop improvement. Simplicity Linux uses the LXDE desktop environment rather than Openbox. This choice by the distro's lone developer, David Purse, is critical. It puts a more contemporary face on Simplicity Linux.
X11 Desktop Environment
The Lightweight X11 Desktop Environment and the WBar give users two different menu options without requiring placement of application icons as launchers on the desktop itself.

Still, Simplicity Linux 15.4 uses Puppy Linux and the LXPup derivative as a base. It is a good choice for everyday users who are not Linux geeks or computer experts.

Simple but Not Foolproof

I have long been a fan and a user of the original Puppy Linux family of distros. I have reviewed a variety of Puppy Linux OSes several times for LinuxInsider.

However, Linux-on-a-stick distros, including the Puppy Linux species, have a serious weakness. They can not update the rapidly changing Web browsers and other packages. Simplicity Linux does not escape this problem.

Puppy Linux has a broad ecosystem and active community, but Simplicity Linux lacks a cadre of contributors to provide updated packages of essential software. So users who keep current with each updated release may soon be confronted with out-of-date versions of key software.

For example, The latest Simplicity release has Google Chrome version 40.0.2214.115 preinstalled. However, the current Chrome version available on my Ubuntu and Linux Mint distros already is updated to Version 42.0.2311.135 through the package manager.

Mozilla's Firefox Web browser is also preinstalled -- but it failed to properly open on any of my hardware. It never appeared on the desktop. Yet system tools indicated that it was running in the background.
Software Sophistication

One advantage to the Simplicity Linux line is its remix mentality. Much of the software bloat found in Puppy Linux is missing. Also gone are the overly lightweight Puppy-specific applications that run in the Open Box environment.

I have used Simplicity Linux on lots of my legacy gear, and I find it superior to the original Puppy Linux distro.

Simplicity Linux comes in three offerings. Depending on which one you select, some of the preinstalled software will be different -- but all of the flavors run the same Puppy Package Manager so you can add or remove applications to suit your needs.

Typical of portable Linux style distros, Simplicity Linux is not designed to reside on the hard drive. It loads into memory from a live CD/DVD.

You have the option to create either an encrypted or nonencrypted partition to save configuration settings and application changes. You can do this on the hard drive, a rewritable CD/DVD or USB drive. You also can install Simplicity Linux to a bootable USB drive.

The utility programs for doing all of these things are preinstalled and easy to use, even for newcomers to the process.
Simplicity Options

Simplicity Linux comes in two versions: Netbook and Desktop in both 32-bit and 64-bit editions. The 32-bit version uses the 3.14.20 kernel. The 64-bit version uses the 3.17.20 kernel.

Echoing Canonical's version system for its Ubuntu OS, Simplicity Linux versions are designated by the year and month of release. Simplicity Linux's release schedule is easy to follow: January, April, July and October.

That is the ideal release schedule, anyway. The sole developer makes no assurances in his blogs that he will always meet that schedule, with alpha and beta releases preceding any rigid release schedule. Of course, this is a user concern if new releases outpace the gap in new package releases.

I found very little difference in the Netbook or Desktop versions of Simplicity. Keep in mind that the hardware designation of "Netbook" may be a bit out of sync now with current market hardware. Netbooks are not likely to be a computing platform -- but the concept of a lighter-weight distro for less-capable or legacy laptops is still valid.
More Goodies

The Simplicity Netbook release is a more cloud-based Linux distro. It includes the TOR and Chrome browsers. It comes with shortcuts to Gmail, Twitter, Facebook, YouTube, Netflix, Google Docs, Dropbox and Grooveshark, as well as a virtual assistant application. Overall, the Netbook version has a smaller system resource footprint, and most things are cloud-based.

The Simplicity Desktop release is a more heavyweight OS edition. It comes with the TOR browser, the desktop version of Dropbox, Chrome and the full LibreOffice suite. The Desktop edition has a bigger footprint caused by including more applications and larger packages.

Both versions of Simplicity Linux come preinstalled with a well-configured version of WINE and a Windows version of the OnLive client. The WINE installation works well and is a good attraction for users transitioning from Windows to Linux.

Double-clicking on a Windows .exe file from within the PCMAN FM file explorer runs the Windows program on Linux. But WINE has limitations and does not work well with every Windows program. So expect trial-and-error to be the standard operating procedure. (within the limitations of what WINE supports).
Look and Feel

Simplicity Linux has a single taskbar across the top of the screen. This has the typical panel bar functionality for holding notification icons on the right side, and icons for running programs on the left side.

At the far left of the panel are the main menu icon, launcher icons for file manager and Google Chrome, and a virtual workspace pager. A trait of the LX desktop, only two virtual desktops are accessible.

Simplicity Linux

Simplicity Linux has a single fully functional taskbar across the top of the screen. At the far left of the panel is the main menu icon, launcher icons for file manager and Google Chrome, and a virtual workspace pager.

A WBar Dock sits at the bottom center of the screen. This bar has limited configurability but provides useful access to other features.

For instance, several icons for system settings and key program launchers are hard-wired to the WBar. An Application Finder and menu are one click away at the far left of the dock bar.

Using Simplicity

You can run Simplicity unchanged from the CD/DVD, much like any live-session Linux distro. Once booted, a first-run settings panel opens with various options like the keyboard layout and screen resolution.

Each new boot presents this panel. You also will have to set up Internet access, whether you plug in a modem cable or need to access a wireless connection. Three program options are available to do this. The computer's wireless card will determine which method works best in finding your access path.


Simplicity Linux settings panels

A collection of settings panels makes Simplicity Linux easy to configure.
A better option for continually using Simplicity Linux is to create a personal save file and set up a frugal installation on either the hard drive or a bootable CD/DVD/USB installation. To do this, use the Puppy Universal Installer.

Another option is to run the Bootflash installer found in the Setup menu to put a bootable copy of Simplicity Linux on a USB drive. However, some legacy computers will not support booting from a USB drive.

In that case, you will have to boot from the CD/DVD and create a personal storage file on either the hard drive or a USB drive. This option is presented each time you shut down a live session unless you have selected the option to boot Simplicity in a no-save session.
Bottom Line

Simplicity Linux is very usable whether you use it as-is each time you boot up from the CD/DVD or do a frugal installation on the hard drive or USB drive. The LXDE desktop consumes few system resources. It loads into system memory when possible to run fast and furious without having to read from the CD/DVD or USB storage.

The complete installation needs less than 2 GB of disk space. You can tailor the size of the personal storage file to fit the available capacity. The preinstalled software provides all you will need in most use-cases. The package manager lets you add packages from both the Slackware and Puppy repositories.

The installer lacks any built-in tools for hard drive partitioning, so you will have to manually do that with gParted and a boot manager if you want to share the hard drive space with an existing operating system. That really is not necessary, though. The purpose of portable Linux distros like this is to boot from a CD/DVD and access stored files from a USB or cloud drive. Hard drive installation is not required.

Overall, Simplicity Linux is easy to use and runs fast. It runs well on legacy hardware. It has a gentle learning curve for users already familiar with the Linux OS. Users transitioning from Windows will find Simplicity Linux easy to use.


Also read:  How to Hide Files Inside Pictures
Continue Reading...

Android M is about to add native support for fingerprint scanners


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

 


One of the reasons for lack of widespread presence of fingerprint scanners on Android devices is the lack of native support in Android, relegating it to just unlocking the phones on which it is present. But that might change soon.

According to BuzzFeed and Ars Technica, Google might announced support for fingerprint scanner in Android M at I/O 2015. although the company declined to comment on that. Ars Technica found commits in AOSP for Nexus 6 for a fingerprint sensor, which Google has been working on on the software side. The Nexus 6 was also supposed to have a fingerprint sensor but according to Motorola ex-CEO Dennis Woodside, Apple bought the one good company that made those.

With native fingerprint scanner support in the OS, all the apps can tap into it and use it for authentication. You would be able to use it for your Play Store purchases, or Google Wallet authentication, or for apps like 1Password, Authy, Dropbox, OneDrive, Simplenote, or any other app that allows you to use a passcode lock, and that currently use Touch ID on iOS, can be used with the fingerprint scanner if they add support for it on Android.

Currently very few Android phones have a fingerprint scanner, with only the recent Galaxy S6 and S6 edge having implemented it the right way, but we could see more devices in future if Google does decide to include it in Android M.

Continue Reading...

How To Remove Memory Card Password With PC


Below are some basic methods to remove the memory card password with the help of a PC.




First Method:

For Android Users.

If you are using an Android device, then follow the below steps to remove memory card password.

-First of all download ES file explorer from the store and open it.

-Go to system folder and locate for a file named mmcstore.

-Then send that file to your PC or laptop via data cable or via any other way.

-Open that file with notepad on your PC.

-After opening the file, you will able to see your password there.

-Now apply that password to open your locked memory card




Second Method:

If you are not an android user then you can follow this method.

Firstly, download any File Explorer app and install it. (Use FExplorer for Better result)

Now insert your locked memory card in it. (Don’t open)

Then run File Explorer, and go to the path C:system.

Here you will find a file named mmcstore.

Rename mmcstore to mmcstore.txt

Connect your phone to the PC via data cable and transfer that file to your PC.

Open that file (mmcstore.txt) with notepad.

Here you will able to see your Password.







Al so read: How to Hide Files Inside Pictures



Continue Reading...

The World’s Fastest 128GB DDR4 RAM Kit

The new HyperX DDR4 128GB memory kit that runs at 3,000MHz, which makes it the fastest such kit in the world. This kit was unveiled last week by HyperX parent company Kingston, which explained that “the kit consists of eight 16GB HyperX Predator modules (16GB x 8) motherboard in an eight module, quad-channel configuration along with an MSI X99 MPOWER motherboard in an eight module, quad-channel configuration along with an Intel Core i7 5820K processor.”

Similarly, Corsair earlier this month released 128GB DDR4 RAM kits of its own that are designed to work with Intel X99 series motherboards and that run from 2,400MHz to 2,666MHz.

As you’d expect, these RAM kits are also insanely expensive — the cheapest one costs $1,755 and the more costly ones go well north of $2,000. All the same, if you want to make absolutely certain that your PC has enough RAM to run any game for the next several years, investing in these kinds of RAM kits will definitely do the trick.

Continue Reading...

How to Hide Files Inside Pictures

guys am about to show you a trick that will let you hide files inside a picture. i know we all need privacy sometimes when we have something and we don't want other people to see them so that when this trick comes in 
before we begin this interesting trick there a things that you need
-a picture to where you will hide your files
-files that you want to hide
-a file compression software i use Winrar  you can also use Winzip  you can find them on google for free
 once you have all of those then you are good to go ...
let hide our file now
first thing you need to do
-create a folder in the drive C   for example C:\ diclan .  C:\ is the drive letter where you are going to create your folder and diclan  that how i named my folder  you can also name your whatever you like  or if you like that name the fine  , then you will need to past everything you want to hide  you put them on that folder   you can hide everything you want  including txt, exe, mp3, avi, or whatever you want.  



 now after you have created your folder  you going to need to past all the things that you want to hide then  right click on that folder and select add to archive.zip



now when you finish creating that archive  you now need to choose a  picture where you are going to be hiding your files mine it called code.jpg.  then create another folder and put inside the archive that you created and  the picture  that you are going to use and name that folder whatever you want .   



now after choosing the picture  you going to need  to open CMD  the command prompt  to do that  Click on Start, and then click on Run. Type in “CMD” without the quotes you going to need to

 run it as administrator  and press Enter. You should now see the command prompt window open. Type in “CD \” to get to the root directory. Then type CD and the directory name that you created  and press enter you will be now on the folder that you created .
now type in these codes      copy /b code.jpg+diclan.zip code.jpg.  
note: code and diclan are the names that i gave to my folder and picture  so you won't put the same you will put there you names that you created

how to see the files inside the picture

Method 1: Simply right-click code.jpg and select 'open with winrar'. You (or anyone you send the file to) can see diclan.zip  file there. Just unzip it and there you will see all your files 

Method 2: just change the file extantion  of the picture  ie: code.jpg  you change it to code.zip and then double click on it and you will see all your files

Also read: The Multi-Software Disk [Sponsered]
Continue Reading...

Tuesday, 26 May 2015

VENOM: A New Virus That can Attack Even Virtual Machines

With Venom, a malicious user program with sufficient root privileges "could break through the isolation normally afforded by the hypervisor and reach into the memory space of its hosted peers, potentially corrupting the software stack running in the other VMs and gaining access to sensitive data and applications," said Bill Weinberg, senior director of open source strategy at Black Duck Software.


Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability.
"Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456.

Venom exists in the virtual floppy drive code (FDC) used by virtualization platforms based on QEMU (quick emulator). It has been around since 2004.

The code probably went undetected for 11 years because "it's not obvious at all that this is a vulnerability," Geffner told LinuxInsider.

What is venom and how it kills


Venom is a threat to virtual machines.
A server runs a hypervisor, which in turn runs one or more virtual machines, called "guest machines." The hypervisor provides each guest operating system with a virtual OS and manages the execution of the guest OSes.
Several VMs, running multiple instances of one OS or different OSes, can be guested on one hardware platform.
When guest OSes send commands such as seek, read, write or format to the FDC's input/output port, the FDC stores them and their associated parameters in a fixed-size buffer, according to Crowdstrike.
It keeps track of how much data to expect for each command. After all expected data for a given command is received from the guest OS, the FDC executes the command and clears the buffer for the next command.


However, two commands, which Crowdstrike did not disclose, are not reset. An attacker can send those commands and specially crafted parameter data from the guest system to the FDC to create a buffer overflow and execute arbitrary code during the host's hypervisor process.

Attackers will need administrator privileges or root access privileges, so it's not as if a hacker can waltz in and take over the FDC.

Continue Reading...

Apple Makes A MacBook Pro With, iMac Features and Pricing

Last week Apple announced performance enhancements for the MacBook Pro and a new configuration and price changes for the iMac.

The new 15-inch MacBook Pro with its Force Touch trackpad and improved flash storage, battery and graphics performance is available immediately online, starting at US$1,999 which is about 6,036,980 UG.

The Force Touch trackpad first appeared in the latest 13-inch MacBook. It includes the taptic engine found in the Apple Watch, which provides tactile feedback for tasks. It also includes Force Touch features that let users customize the pressure sensitivity of the trackpad.

The 256 gigabytes of flash storage make the new MacBook Pro 2.5 times faster than the previous generation. It also has longer battery life up to nine hours and its AMD Radeon R9 M370x graphics card is 80 percent faster than the one in the previous MacBook Pro.
It comes with 16 GB of RAM and a quad-core Intel Core i7 processor running at 2.2 GHz.

For the Apple lovers in Uganda, start growing your pockets hard.... Really hard
Continue Reading...

Monday, 25 May 2015

Microsoft to Stop Production of Windows

In a speech about a weeks ago, weekJerry Nixon  (Development executive) at Microsoft said  that
 Windows 10 would be the “last version” of the dominant desktop software.His comments were echoed by Microsoft which said it would update Windows in future in an “ongoing manner”.

Instead of new stand-alone versions, Windows 10 would be improved in regular instalments, the firm said.
Mr Nixon made his comments during Microsoft’s Ignite conference held in Chicago.
In a statement, Microsoft said Mr Nixon’s comments reflected a change in the way that it made its software.
“Windows will be delivered as a service bringing new innovations and updates in an ongoing manner,” it said, adding that it expected there to be a “long future” for Windows.

The company said it had yet to decide on what to call the operating system beyond Windows 10.

“There will be no Windows 11,” warned Steve Kleynhans, a research vice-president at analyst firm Gartner who monitors Microsoft.

He said Microsoft had in the past deliberately avoided using the name “Windows 9″ and instead chose Windows 10 as a way to signify a break with a past which involved successive stand-alone versions of the operating system.
However, he said, working in that way had created many problems for Microsoft and its customers.
"Every three years or so Microsoft would sit down and create ‘the next great OS’,” he said.

 The developers would be locked away and out would pop a product based on what the world wanted three years ago.”

Microsoft also had to spend a huge amount of money and marketing muscle to convince people that they needed this new version, and that it was better than anything that had come before, he explained.

Moving to a situation in which Windows is a constantly updated service will break out of this cycle, and let Microsoft tinker more with the software to test new features and see how customers like them, he added.

‘Positive step’
Most of the revenue generated by Windows for Microsoft came from sales of new PCs and this was unlikely to be affected by the change, Mr Kleynhans pointed out.

“Overall this is a positive step, but it does have some risks,” he said.

“Microsoft will have to work hard to keep generating updates and new features, he said, adding that questions still remained about how corporate customers would adapt to the change and how Microsoft would provide support.

“It doesn’t mean that Windows is frozen and will never move forward again,” Mr Kleynhans stated.

“Indeed we are about to see the opposite, with the speed of Windows updates shifting into high gear.”

see also: How To Install Windows Software on Ubuntu
Continue Reading...

Sunday, 24 May 2015

How To Install Windows Software on Ubuntu

In some linux distributions on linux. this application so all you have to do is skip to where i talk about actually installing windows Software.
Wine is a free and open source application that aims to allow applications designed for Microsoft Windows to run on Unix-like operating systems. Wine also provides a software library, known as Winelib, against which developers can compile Windows applications to help port them to Unix-like systems.

Wine is a compatibility layer. It duplicates functions of Windows by providing alternative implementations of the DLLs that Windows programs call and a process to substitute for the Windows NT kernel. This method of duplication differs from other methods that might also be considered emulation, where Windows programs run in a virtual machine. In this article we are installing wine 1.7.25 version on Ubuntu 14.04.

To install it in Ubuntu you will have to add the repository to the system and just use the apt-get install command, this will also make it easy to update wine in the future by just using apt-get upgrade. The bellow command will also automatically install any extra dependencies you may need.

$ sudo add-apt-repository ppa:ubuntu-wine/ppa
$ sudo apt-get update
$ sudo apt-get install wine1.7






now the installation is over  you just need to install windows application which am about to show you 

Actually installing windows Software

Installing a Windows application using Wine is just as simple as installing it on the native operating system. After downloading the installation executable (in this case i chose foobar2013 - a nice media player), you can just click the executable and the installation wizard will open up, exactly like it would do on Windows.



After you're done with the installation you can run the application from the installer or from the Ubuntu button just like you would run any other Linux application.
And there is your windows application working in UBUNTU 




Continue Reading...

Saturday, 2 May 2015

How Old You Look: This website will tell you in seconds

You're only as old as you think you are. Or in this case, As old as a computer algorithm thinks you are.


You're only as old as you think you are.
Or in this case, as old as a computer algorithm thinks you are.
In a machine learning experiment that's taken social vanity to new heights, Microsoft has created a website that tells you how old you look just by analyzing your photo:

This website is Sometimes dead on it. Other times it's hilariously, outrageously wrong.
It's simple: Upload a selfie, wait a few seconds -- then the machine gives you a number.
And since it can analyze anyone's photo, you can compare yourself to your friends, family, and foes.
But guessing someone's age is a dangerous game, even for a robot. That's probably why the site comes with a sheepish apology. "Sorry if we didn't quite get the age and gender right," it says after each result.
The company unveiled the website at a conference Thursday as a way to show off its new software called Project Oxford, Microsoft says you could use this face detection technology for tasks like sorting through a large photo collection.


But we're human -- so we'll probably just use it to judge our own looks.
And everyone else's.

Source: CNN
Continue Reading...
Get Our Latest Articles Delivered to Your email

You will shortly receive a confirmation email. Please approve to complete Subscribtion.

 

Alittle About Me

I am an open minded person with a great interest in computer networks, programming and cyber security. My love for computers started way back since elementary school where I din't have access to the internet nor did I have a computer at my disposal. In the long run at the right time, the love I had for so long was taken to the next level when I was granted internet access and mostly, A computer at my disposal. This allowed me to develop and enhance my skills more effectively. Currently on a cyber... Continue Reading

To all those that visit. We highly appreciate.
Thank You!

Do you like what you see?

Get our Daily email updates (It's Free):