RSS
Loading...

Wikileaks- will the whistle blower now blow India?

0 comments
The dirty game is on both on the shelf and of the shelf. With the arrest of wikileaks founder in London has arouse a tremor both in the cyberspace and in the real world . The whistle blower has really brought u a big issue in front now. The website has brought out many classified documents infront of public  and exosed...


Google Vulnerability Reward Program

0 comments
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. They’ve seen a sustained increase in the number of high quality...


DOWNLOAD!! UR ENTIRE FACEBOOK HISTORY

0 comments
Now it is possible to download every single bit of information you have put on Facebook, including pictures, status updates, events and messages. This is undoubtedly the control many users have been looking for, and provides a nice “grab and go” option for those fed up with the service.The feature should have rolled out to most...


Popular sites caught sniffing user browser history

0 comments
This summary is not available. Please click here to view the pos...


How to disable or enable USB port or device

0 comments
USB Devices are portable enough to carry the data from one computer to another , It is always risky to enable USB ports of computers in large organizations , data center and cyber cafes since it can be the gateway for virus and malwares. You can disable or enable USB port or device in three ways Enable / Disable USB port and device in...


“h4x0r 1n m3″ – Developing a Hacker’s Behaviour

0 comments
To obtain the status of a Hacker, You Have To Want It, and You Have To Earn It. It is not something that can really be taught, it is only something you can learn for yourself, although I can attempt to help guide you. Although hackers are substantially different people with unique personalities, they mysteriously all seem to lead similar...


Linux isn’t exactly the same as Windows.

0 comments
You’d be amazed how many people make this complaint. They come to Linux, expecting to find essentially a free, open-source version of Windows. Quite often, this is what they’ve been told to expect by over-zealous Linux users. However, it’s a paradoxical hope. The specific reasons why people try Linux vary wildly, but the overall...


The Browser Takes All

0 comments
This week, Google unveiled a computer like no other: the Cr-48, a notebook that relies on the Web for all its software applications. Yet the Web search giant thinks the notebook can compete with computers that run all kinds of installed software. The matte black Cr-48 won't be sold to the public, but thousands are being sent to consumers...


Google Chrome OS

0 comments
"Google's Chrome OS chiefs explain in Technology Review how most of the web-only OS's features flow from changing one core assumption of previous operating system designs. 'Operating systems today are centered on the idea that applications can be trusted to modify the system, and that users can be trusted to install applications that are trustworthy,' says Google VP Sundar Pichai. Chrome doesn't trust applications, or users...


Google Adds Flash Sandbox to Chrome Browser

0 comments
Two weeks after releasing Reader X with its new sandbox security mechanism, Adobe has teamed up with Google to enable a sandboxed version of its Flash software to run in Google Chrome. The two companies said on Wednesday that Google has released a version of Chrome to its developer channel that includes the sandboxed Flash player....


Adobe Releases Reader X With Sandbox

0 comments
Adobe has released the much anticipated new version of its Reader software, Adobe Reader X, which includes the new sandboxing feature meant to prevent exploits against the software from affecting other applications on a PC. The new version of Reader, one of the more widely deployed applications anywhere, is designed to be a major step...


Researchers Bypass Internet Explorer Protected Mode

0 comments
 "A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added...


Microsoft Builds Javascript Malware Detection Tool

0 comments
"As browser-based exploits and specifically JavaScript malware have shouldered their way to the top of the list of threats, browser vendors have been scrambling to find effective defenses to protect users. Few have been forthcoming, but Microsoft Research has developed a new tool called Zozzle that can be deployed in the browser and...


How to add Command Prompt to the Right Click ?

0 comments
I love command prompt. Do you ?? I bet, a great hacker always love to be on Command Prompt so am I, although I am not a great hacker, but still, I love it. Wanna see the Command Prompt in action on every Right Click ??? Let’s get busy..For this, we gotta gear up our tools to tweak the Windows Registry. Oh Ya.. I love to modify every value...


How to Remove All Hyperlinks in Word or Excel ?

0 comments
These two nifty macros enable you to delete the embedded hyperlinks that are generated when typing URLS or copying information from the web Ever copy and paste something from the Internet and then into Word only to get the hyperlinks embedded? You can removed them easily with the Macros below. ...


 
Copyright © 2010 | Flash News Converted into Blogger Template by HackTutors