StatCounter




Wednesday, March 4, 2015

Nvidia SHIELD "NO GAME TOO BIG"

Nvidia announced new shield device at GDC. Nvidia Shield a 4k android Tv with powered by tegra X1. Surprisingly this console is able to run Crysis 3 and will be priced at 200$ from May 2015. This technology is not new to the whole gaming scene and was tried by other small companies but none had that much money to spent in as Nvidia.
Nvidia has already been active in the E-sports industry and we all love it's effort.
Shield has sharp edges, a mix of gloss and matte black, a green glow that "cracks" through the front of the system, which is really eye catchy and looks good. A nice big handy controller is a compliment to it.
It is the world's first 4K Android TV that also doubles up as a game console.The Shield comes with an H.265 decoder that can handle 4K at 60Hz with 10-bit video processing.
SHIELD streams your favorite movies and TV shows up to 4K with apps
like Hulu Plus, YouTube, and Google Play.Waploft
English Music: webmusic

"FREAK" Attacks world wide web

A new vulnerability in apple and google devices browsing the internet is discovered. Vulnerabiltiy is due to the US govt. software policy which forces companies to use weaker security encryption due to national security issues.
Till now no hacker found exploiting this but it enables an attacker to eavesdrop on a victim.


University of Michigan computer scientist Zakir Durumeric said the vulnerability affects Apple web browsers and the browser built into Google’s Android software, but not Google’s Chrome browser or current browsers from Microsoft or Firefox-maker Mozilla. “This was a policy decision made 20 years ago and it’s now coming back to bite us,” said Edward Felten, a professor of computer science and public affairs at Princeton, referring to the old restrictions on exporting encryption code.

The exploit takes about seven hours to carry out and costs as little as $100 per site. The so-called FREAK attack—short for Factoring attack on RSA-EXPORT Keys—is possible when an end user with a vulnerable device—currently known to include Android smartphones, iPhones, and Macs running Apple's OS X operating system—connects to a vulnerable HTTPS-protected website. Vulnerable sites are those configured to use a weak cipher that many had presumed had been retired long ago. At the time this post was being prepared, most Windows and Linux end-user devices were not believed to be affected.
A client-testing feature on the above-referenced FREAKAttack.com site shows that Firefox for both OS X and Android isn't vulnerable, so users of those platforms should use that browser until more information is known. Green said that Google is in the process of delivering a version of Chrome for Macs that is immune to the attack, so Mac users should look out for that, as well. More info:waploft

Free English Music: webmusic

Setup SQUID and SARG on Ubuntu 14.04 (Video)

Setup SQUID and SARG on Ubuntu 14.04

 


More Info: waploft
Get Free English music: webmusic 

Tuesday, March 3, 2015

HP Envy with Beats Audio Laptop Review

HP Envy 17-j120us 17.3-Inch Laptop with Beats Audio

Not all audio is created equal. (waploft)The Beats audio implementations on HP PCs just sound better than the competition. With the power of Intel Core i7-4700MQ Processor and 12 GB of Memory, this laptop has the most amazing performance for power and speed. Completed with Beats Audio and 4 speakers, this laptop is designed not only for works, but also for multimedia. Its massive 1 TB of Hard Disk Drive lets you to save more files on this device.

Screen Size17.3 inches
Max Screen Resolution1600x900
Processor2.4 GHz Core i7-4700MQ
RAM12 GB DDR3L SDRAM
Hard Drive1024 GB
Graphics CoprocessorIntel HD graphics 4600
Wireless Type802.11bgn
Number of USB 3.0 Ports 3
Average Battery Life (in hours) 5.25 hours
Brand NameHP
SeriesEnvy
Item model numberE8A03UA#ABA
Hardware PlatformPC
Operating SystemWindows 8.1
Item Weight6.2 pounds
Item Dimensions L x W x H10.80 x 16.38 x 1.21 inches
Color Natural Silver
Processor BrandIntel Core I7
Processor Count1
Computer Memory TypeSODIMM
Hard Drive InterfaceSerial ATA
Hard Drive Rotational Speed5400 RPM
Optical Drive TypeSuperMulti DVD burner
Audio-out Ports (#)1
Batteries:1 Lithium ion batteries required. (included)

With the power of 4th generation of Intel Core i7-4700MQ Processor (2.4GHz) and 12 GB Memory you can enjoy your multitasking smooth and flawlessly without bugs. You can even boost its speed up to 3.4GHz using Turbo Boost and upgrade your RAM up to 16 GB for maximum performance. 

This laptop also has 1 TB of 5400 RPM Hard Disk Drive with Hp ProtectSmart to keep your file safe.

Free Download English music: webmusic

Monday, March 2, 2015

Using SSH behind a Squid Proxy

SQUID proxy works by redirecting all the traffic to port 3128 thus people might have difficulty in using ssh.(waploft)

For this we can use proxy-connect or corkscrew uility and channel our ssh traffic through the proxy.

So fire up the terminal and follow the steps.

STEP 1:-  Install proxy-connect (*At this time you are not on a proxy network)

#apt-get update

#apt-get install proxy-connect

STEP 2:- Add following lines to .ssh/config

# Outside of the firewall, with HTTPS proxy
Host *
  ProxyCommand connect -H 10.0.0.254:3128 %h 22
## Inside the firewall (do not use proxy)
Host *
   ProxyCommand connect %h %p




*Note:-   Replace Ip address to your proxy server IP and PORT



Step 3:- Now Add you system into the proxy network and ssh to your server

#ssh name@server.com
(webmusic)

That's it!! You are through to the proxy server.

Sandisk 200 GB microcard pocket bomb

SanDisk popular storage device company launched a wooping 200 GB microcard.

The Ultra microSDXC UHS-I card Premium Edition  is the world’s highest capacity microSD card for use in mobile devices. 

In just one year after introducing its record-breaking 128GB SanDisk Ultra microSDXC card, SanDisk has increased storage capacity by 56% within the same fingernail-sized form factor.(waploft)

Keeping up with the demands of today’s mobile users, the new card provides the freedom to capture, save and share photos, videos and other files without worrying about storage limitations.  


The card supports data transfer at up to 90MB per second, or around 1,200 photos per minute.
“Mobile devices are completely changing the game. Seven out of 10 images captured by consumers are now from smartphones and tablets. Consumers view mobile-first devices as their primary means for image capture and sharing, and by 2019 smartphones and tablets will account for nine out of 10 images captured,” said Christopher Chute, Vice President, Worldwide Digital Imaging Practice, IDC. 
“As the needs of mobile users continue to change, SanDisk is on the forefront of delivering solutions for these demands as is clearly illustrated through their growing portfolio of innovative products, including the new 200GB SanDisk Ultra microSDXC card.”

 

Pricing and Availability

The 200GB SanDisk Ultra microSDXC UHS-I card, Premium Edition, features a ten-year limited warranty3 and will be available worldwide in Q2 at an MSRP of $399.99. 
 English music Free Download: webmusic 

Thursday, October 2, 2014

ATM Being Hacked Just By Sending A SMS

We already know that Microsoft’s support for  windows XP has been ended on 8th April of this year , apparently 95% of the world’s 3 million ATM machines are runnnig on it. Microsoft’s decision to withdraw support for Windows XP poses critical security threat to the economic infrastructure worldwide.
Security researchers at Antivirus firm Symantec claimed that hackers can exploit a weakness in Windows XP based ATMs, that allow them to withdraw cash simply by sending an SMS to compromised ATMs.



     What was interesting about this variant of Ploutus was that it allowed cybercriminals to simply send an SMS to the compromised ATM, then walk up and collect the dispensed cash. It may seem incredible, but this technique is being used in a number of places across the world at this time. researchers said.waploft

According to researchers – In 2013, they detected a malware named Backdoor. Ploutus, installed on ATMs in Mexico, which is designed to rob a certain type of standalone ATM with just the text messages.
To install the malware into ATMs machines, hacker must connect the ATM to a mobile phone via USB tethering and then to initiate a shared Internet connection, which then can be used to send specific SMS commands to the phone attached or hardwired inside the ATM.

Since the phone is connected to the ATM through the USB port, the phone also draws power from the connection, which charges the phone battery. As a result, the phone will remain powered up indefinitely.


How it is Possible ?
  • Connect a mobile phone to the machine with a USB cable and install Ploutus Malware.
  • The attacker sends two SMS messages to the mobile phone inside the AT
SMS 1 contains a valid activation ID to activate the malware.
SMS 2 contains a valid dispense command to get the money out.
  • Mobile attached inside the ATM detects valid incoming SMS messages and forwards them to the ATM as a TCP or UDP packet.
  • Network packet monitor (NPM) module coded in the malware receives the TCP/UDP packet and if it contains a valid command, it will execute Ploutus
  • Amount for Cash withdrawal is pre-configured inside the malware
  • Finally, the hacker can collect cash from the hacked ATM machine.
  • Researchers have detected few more advanced variants of this malware, some attempts to steal customer card and PIN data, while others attempt man-in-the-middle attacks.
  • This malware is now spreading to other countries, so you are recommended to pay extra attention and remain cautious while using an ATM.
                                                                                                 Source: Internet

For any query Comment below.
Get Free English Mp3: webmusic

Wednesday, October 1, 2014

The Windows 10 Technical Preview Will Be Available For Download Tomorrow







At its San Francisco event, Microsoft announced that the technical preview of Windows 10 will touch down tomorrow.waploft
The company’s new operating system is a long-awaited replacement for its beleaguered Windows 8.x platform. That version of Windows saw limited business adoption, and consumer fatigue.
On stage, Microsoft executive Terry Myerson stated that Windows has 1.5 billion users. Myerson indicated that Windows is at a “threshold,’ ironically
The ‘Insider Program” is designed to let people get the new code, but with the expectation that they new stuff will be a bit off, here and there. New code is new code, after all. Myerson indicated that the new code is an attempt to “share more than ever before.” The goal, he said, is to build something for every Microsoft customer.
Windows 10 is the name for the “product family,” according to the company.
The full operating system will be available after Build in 2015, or, put another way, mid of next year.
Free Download mp3 Songs: webmusic