Chameleon Virus that Spreads Across WiFi Access Points like Common Cold. Do you know, A Computer viruses could go Airborne over WiFi networks?
Security researchers at the University of Liverpool in Britain have demonstrated a WiFi virus that can spread between computer networks just like the 'common cold' spreads between Humans.They have created a proof-of-concept which can infect the entire wireless network instead of a single computer at a time, that replaces the firmware of the vulnerable Access Point (AP) with a virus-loaded version, and then propagates itself to the next victim on the WiFi network. The WiFi based virus named as 'Chameleon', that can self-propagate over WiFi networks from access point to access point, but doesn't affect the working of the Wireless Access Point. This Virus is able to identify WiFi access points that are not protected by encryption and passwords, according to the research paper.
Teach Yourself a New Programming Language in 21 Minutes (Or 2-3 Years, It Depends) You’re sitting at work, grinding out a bug in the legacy system, when your boss comes in and tells the team that you finally get the chance to rewrite the whole system–and even better, you get to do it in Clojure!
(Or Scala or Erlang or Rust or Dart or some other Language You Only Know A Little About But Have Secretly Wanted To Learn For A While Now.) Or maybe you’re happy with the language you’re using, but your VP of Software Architecture just spent $150,000 on a suite of Enterprise Tools which includes a module that will let your project scale infinitely into the cloud… all you have to do is learn Clojure. Learn to Code: The Full Beginner's Guide. CS50x: Introduction to Computer Science. CS50x is Harvard College's introduction to the intellectual enterprises of computer science and the art of programming for majors and non-majors alike, with or without prior programming experience.
Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. Students who earn a satisfactory score on 9 problem sets (i.e., programming assignments) and a final project will receive a certificate from HarvardX. Simply Audit this Course Can't commit to all of the lectures, assignments, and tests? Try for a Certificate. Interactive Vim tutorial. Bento - Learn to code. Kegbot makes creating an Android-controlled kegerator easy. The idea of a connected kegerator isn't anything new.
We've seen quite a few startups build high-tech kegs -- even Google has gotten in on the action. Those projects, however, require quite a bit of technical know-how. Now there's an easier solution for the beer enthusiasts: Kegbot. Kegbot is a bit different simply because it handles most of the geeky stuff for you. To get the device up and running, you just have to connect a flow sensor to your keg's line, and connect the pre-made board to your favorite Android tablet. Creators Mike Wakerly and Eric Webb have been at the smart keg game for a while. Kegbot Interface. Ettercap + Sslstrip + Hamster + Driftnet + Urlsnarf Script BT5 R1 :-)
How to use sslstrip in kali linux ~ Geeky Shows. Intro – In this tutorial we will use sslstrip for stealing password from any PC which is connected in LAN.
How To Create Your Own Cryptocurrency. When you look at the complexities that go into making a physical dollar bill it’s plain to see why most people don’t start trying to print a new form of currency every day, but making a new digital currency is surprisingly easy for someone with even basic coding skills.
But coding isn’t the only step to getting your digital currency off the ground. Here are the five steps you should follow according to the makers of three cryptocurrencies. 1Reaction 1. Security seal - Video Encyclopedia. A basic metal security seal and a basic plastic security seal.
Security seals are mechanisms used to seal shipping containers in a way that provides tamper evidence and some level of security. Such seals can help to detect theft or contamination, either accidental or deliberate. Security seals are commonly used to secure truck trailers, vessel containers, chemical drums, airline duty-free trolleys and utility meters. Typically they are considered an inexpensive way of providing tamper evidence of intrusion into sensitive spaces.  Vulnerabilities Security seals are not designed to resolve all security problems: The effectiveness of seals is strongly dependent on the proper protocols for using them. How to run your own e-mail server with your own domain, part 1. E-mail is old and complex.
It's the oldest still-recognizable component of the Internet, with its modern incarnation having coalesced out of several different decades-old messaging technologies including ARPANET node-to-node messaging in the early 1970s. And though it remains a cornerstone of the Internet—the original killer app, really—it's also extraordinarily hard to do right. We most often interact with e-mail servers through friendly Web-based front-ends or applications, but a tremendous amount of work goes into hiding the complexity that allows the whole system to work.
E-mail functions in a poisoned and hostile environment, flooded by viruses and spam. The seemingly simple exchange of text-based messages operates under complex rules with complex tools, all necessary to keep the poison out and the system functioning and useful in spite of the abuse it's constantly under.
How to run your own e-mail server with your own domain, part 1. Ars walkthrough: Using the ZFS next-gen filesystem on Linux. In my last article on next-gen filesystems, we did something in between a generic high altitude overview of next-gen filesystems and a walkthrough of some of btrfs' features and usage.
This time, we're going to specifically look at what ZFS brings to the table, walking through getting it installed and using it on one of the more popular Linux distributions: Precise Pangolin. That's the most current Long Term Support (LTS) Ubuntu release. With that said... if Ubuntu's not your cup of tea, don't worry! There are lots of options for running ZFS, and very little of this walkthrough will really depend on your use of Ubuntu in particular or even Linux in general. You can always visit directly for help with the initial installation if you prefer RHEL or Fedora or Arch or what have you—and if you're a BSD fan, ZFS is available from the base installer in either PC-BSD or in the latest 10.0 release of FreeBSD itself. Prerequisites and installation Initial tuning. 2014/02/hackers-exploiting-router.html. In past months, we have reported about critical vulnerabilities in many wireless Routers including Netgear, Linksys, TP-LINK, Cisco, ASUS, TENDA and more vendors, installed by millions of home users worldwide.
Polish Computer Emergency Response Team (CERT Polska) recently noticed a large scale cyber attack ongoing campaign aimed at Polish e-banking users. 2014/02/hackers-exploiting-router.html.