THX FOR VISITING..

MOST EVER WORKING HACKS

Showing posts with label NEWS OF TECHNOLOGIES. Show all posts
Showing posts with label NEWS OF TECHNOLOGIES. Show all posts

Saturday, October 27, 2012

Get free Alienware Laptops 2012


                           [Image: xNeGg.png]

This method is called “Social Engineering”. This will
teach you how to get free Alienware laptops. I have used this method 9 times and succeeded in every attempt. I didn’t want to share it, but I am still doing it because of earnest requests from our users and visitors. This method doesn’t involve anything related to Box, Replacement or spending money. You will NOT need to have a Credit Card. I have worked a week to make this guide, so I don’t want it to get saturated.


MY LAPPIE



Genre: Social Engineering
Release name: Get free Alienware Laptops [Secret Loophole of Dell Revealed].pdf
Size: 36.18 KB
Pages: 3



                                  alt text
Read more

Saturday, June 30, 2012

Some Developers Are Giving Up on Google+

Google has said that it's going to roll out a Google+ API when it's ready, meaning both the API and when the time is right. But the time hasn't been right so far and the API is most likely not coming very soon. Which seems for the better, as the few developers that have managed to get apps on Google+, via direct partnerships with Google, are not satisfied.

In fact, two of the biggest are packing up and leaving, both Wooga and EA, two of the most popular app makers on Facebook and the fourth and third largest game makers.

Wooga has shut down Monster World and other titles will follow. PopCap, which EA bought a while back, is also taking Bejeweled Blitz down starting next week.

Both companies have confirmed their waning interest in Google+, though they may not be giving up entirely. Wooga says only some games are getting shut down, those that are not seeing traction.

The company (more or less) says it'd much rather focus on Facebook where its games are actually played rather than spend resources on Google+. But Wooga's all three games it has on Google+ have been confirmed to shut down.

There are still plenty of games in there, well, plenty by Google+ standards, certainly more than there were at launch and more are being added.

Still, empirically, it doesn't seem like social gaming is going to have much success on Google+, at least not on the level it has on Facebook if only because the audience is different.

Google+ may or may not be a ghost town, depending on who you ask, but the ones that are there are generally more tech savvy and perhaps less likely to play casual or social games, not as much as the average Facebook user, and even less likely to pay for in-game items or click on ads.

That doesn't mean there's no money to be made on Google+, but it may be harder than on Facebook, or at least it's going to take a different strategy and a different sort of game. The size of the audience may be the biggest problem though.

Enjoy.......
Read more

Google Said to Launch Virtual Server Cloud at I/O

BY:JOSEPH LINOY[GPRS EXPERT]


Google is said to be introducing its very own cloud platform during the Google I/O developer conference to compete with similar offerings from Amazon and Microsoft.

That may sound strange at first since Google already has a cloud platform, App Engine. The difference is that Google will start offering virtual servers as opposed to an app platform, IaaS (Infrastructure as a Service) as opposed to Paas (platform as a service).

Amazon's Web Services for example allows developers to spun up virtual servers to suit their needs.

They don't actually get to run bare metal, though they can do that if they're willing to pay for it, but they get a machine or several to play with, for all intents and purposes.

They can choose from a number of available operating systems, several Linux distributions or Windows, and have complete freedom in the software configuration and what they're able to do with the servers.

Google's current cloud, on the other hand, enables developers to run applications, written in several programming languages though Python is prefered, and get all the resources they need, but they don't get access to the actual servers.

That's about to change, according to the rumor, Google will start renting virtual servers as well. It's going to interesting to watch as Google goes head to head with Amazon.

The latter has the IaaS market pretty nicely wrapped up and is a favorite of startups and companies or researchers on a budget. Google will also be able to compete with Amazon's storage service, S3, with its Cloud Storage service.

It remains to be seen what Google will announce, if anything, rumors don't always turn out to be accurate. But Google has usually reserved big announcements about its cloud platform for Google I/O so if the announcement is coming it's going to be there.
Read more

Thursday, June 28, 2012

Is Linux Safe From Viruses?

BY:JOSEPH LINOY
                                

Hi all users, I know many of you have heard it before that Linux can't get infected by virus, or in Linux you're safe from being infected but a question is arise Is Linux Immune to Viruses? In a word, "No."

Any computer that is attached to a network is not immune to viruses. But, as with everything else, it's relative. If you compare the vulnerability of Linux to Windows, you can understand why so many say Linux is immune. But before we get into any myth busting, let's examine just what a computer virus is.

According to Wikipedia, a virus is a computer program that can copy itself and infect a computer. That's a pretty broad description. Most people would consider a more specific definition. That same Wiki page continues on to say The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware and spyware programs that do not have the reproductive ability. Now we're talking. So with the two definitions combined, you could say a computer virus is any type of malicious code or software that can either infect a computer and replicate/distribute itself or a piece of malicious code or software that can be unwittingly distributed via numerous electronic means.

Means to an End

Computer viruses can be transmitted in many ways, such as:

   Email attachments.
    Malicious URLs.
    Within applications (such as browser add ons).
    Rootkits.

It will be my attempt, in this article, to show you that although it is very challenging for a virus to infect a Linux machine, that does not mean you should be without protection.

Email Attachments

Why are email attachments not so dangerous in Linux? Well, generally speaking it is because nearly all malicious email attachments target Windows machines. When you get those suspect attachments they are usually in the form of .exe or .zip files (the .zip files containing malicious .exe executable code). When you click on an .exe file in Linux your machine will not really know what to do with it (unless you have Wine installed).

But say that attachment has targeted Linux machines and is in the form of, say, .deb, .rpm, or .bin - what then? Those types of files can be installed on Linux machines. Well, first and foremost - if the file is in .deb format and you are using an RPM-based system, nothing will happen. If, however, you receive an email with a .rpm attachment, and you're using an RPM-based system, what happens? It will ask you for either your root or your sudo password (depending on your security model).

What would be the proper reaction to this? To not proceed. The difference between this model and the traditional Windows model is that when you double click on that attachment in Windows, the installation can proceed without your intervention. In certain instances there is no "sanity" check. Click and BOOM the virus has installed itself and you are infected.

Now naturally, if you are using a Windows machine, you are taking advantage of an anti-virus solution to prevent such issues from arising. What about Linux? Do you need an anti-virus for Linux? You might be surprised when I say "Yes!" But why? If Linux is so much more immune to viruses, why should you employ a virus scanner?

Let me ask you a simple question: Have you ever forwarded anything with attachments to another user? If so, is that user a Windows user? If so, you could very well have given that attachment a chance at a successful infection. So why not add a virus scan to your Linux system to avoid such an issue?

And if you manage your own email server (such as a Postfix or Sendmail server) on a Linux machine, anti-virus scanning is a must have. Just because your email server is a Linux machine does not mean an email containing a virus is non-lethal. That email-strapped virus could easily make its way to a Windows machine where it will happily begin its infectious life.

To that end, you owe it to yourself to install an anti-virus such as ClamAV.

Malicious URLs

I have yet to come across a URL that has done any direct damage to a Linux machine. But harmful URLs are not the only type of malicious URLs. One type of URL is a spoofed address. A spoofed address is a malicious address that masquerades itself as a safe address. These can be in the form of a fake bank account login screen, or Paypal login. Any number of addresses can be spoofed. And any address that requires you to log in with credentials is dangerous when spoofed.

Do these types of threats directly effect the Linux operating system? No, but they do effect the user. Fortunately most modern browsers have add ons to protect your browsing experience. These should not be neglected just because you are using Linux. A good sampling of Firefox add ons can be found in the Firefox Security Add on page.

Application Danger

Because Linux is open source, you can not trust every piece of software out there. You can, however, trust all software that is distributed by your distribution's OFFICIAL channels. For example, any software officially supported within the Ubuntu Software Center will be safe. Once you venture outside of the realm of the "Officially Supported," you risk installing malicious software.

That is not to say you should not trust any software not provided through the official channels of your distribution. Because Linux is open source, software is generally under a lot of peer scrutiny. No one wants to be known as the coder that created malicious Linux software.

But if you are of the paranoid persuasion, as long as you stick with software supported by your distribution, you should avoid installing any malicious code on your machine.

I will warn you, though, there was a proof of concept virus for Linux that took advantage of both GNOME and KDE launchers. This code could be added to either the ~/.config/autostart folder (For GNOME) or ~/.kde/Autostart (For KDE). Anyone really paranoid (using either GNOME or KDE) could create a bash script to search for, and delete, any suspicious files (or links) in that directory. Just be careful writing that script so that you do not delete anything important.

Got Root?

Root kits are the real danger. A root kit is a system of malicious software designed to obfuscate itself such that the user has no idea it was installed and is running. I have been a victim of a root kit (long ago) and strongly suggest the addition of the rkhunter tool. In fact, when installing a new Linux system, rkhunter is one of the first tools I add. And as soon as it is added, it is used.

Root kits are those nasty pieces of software that once installed are really difficult (if not impossible) to remove. And some root kits are so bad they compromise your system such that you can not recover. And if you're wondering how many root kits are out there, install rkhunter, run it, and see how many root kits it checks for. You will be surprised. And root kits do not just attack servers. I have seen desktop machines infected with root kits. This is especially true if your Linux machine lives on a static IP address with no firewall protection between it and the outside world.

Final Thoughts

So, what do you think? Is Linux immune to viruses? I hope your answer is "no." That answer, and the prevention it inspires, will keep your Linux machine virus free for years to come. Personally, I have used Linux for twelve years and not had a virus or any malicious software on any of my personal machines or servers. If you are cautious like me, you too can enjoy virus-free computing for years. But if you fall into the trap of believing that Linux is perfectly immune to viruses, you very well might fall victim to that naivety.

Read more

PayPal Launches Paid Bug Bounty Program

BY:JOSEPH LINOY
                                  PayPal Launches Paid Bug Bounty Program

PayPal joins the ranks of companies such as Mozilla and Google by launching a bug bounty program that compensates security researchers who report vulnerabilities which might affect the online payment service and its customers.

“Today I’m pleased to announce that we have updated our original bug reporting process into a paid ‘bug bounty’ program. The experience from other companies such as Facebook, Google, Mozilla, Samsung and others who have implemented similar programs has been very positive,” PayPal’s Chief Information Security Officer Michael Barrett explained.

“I originally had reservations about the idea of paying researchers for bug reports, but I am happy to admit that the data has shown me to be wrong – it’s clearly an effective way to increase researchers attention on Internet-based services and therefore find more potential issues.”

So, how does the bug bounty program work?

The process is fairly simple. The researcher submits his findings to sitesecurity@paypal.com by using the PGP public key that’s available here.

Then, PayPal’s own security team determines the severity of the issue and assigns it a priority. The development team takes over and addresses the issue.

Once the bug is fixed, the expert is paid via a verified PayPal account.

The vulnerabilities that researchers can report are split into four categories: cross-site scripting (XSS), cross-site request forgery (CSRF), SQL Injection, and authentication bypass.

“While a small handful of other companies have implemented bug bounties, we believe we are the first financial services company to do so. It’s yet another example of the innovation that PayPal is bringing to shake up the industry as the world moves more and more payments online,” Barrett concluded.

We applaud PayPal’s decision to reward security experts because this decision will not only make the payment platform safer, but it will also encourage the responsible disclosure of vulnerabilities.

Read more