Congratulations!

[Valid Atom 1.0] This is a valid Atom 1.0 feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://tutorial-hemlet.blogspot.com/atom.xml

  1. <?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4701803441346095986</id><updated>2024-03-13T17:13:48.398+07:00</updated><category term="Ubuntu"/><category term="Linux"/><category term="Tutorial"/><category term="Vacancy"/><category term="Download"/><category term="AntiVirus"/><category term="Programming"/><category term="SEO"/><category term="Anonymouse"/><category term="Hacking Security"/><category term="VB / . Net"/><category term="ASP"/><category term="Food and Beverages"/><category term="HTML5"/><category term="Information"/><category term="Infosec"/><category term="Internet"/><category term="Software"/><category term="Wordpress"/><title type='text'>IT Tutorial</title><subtitle type='html'>IT Tutorial</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://tutorial-hemlet.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>147</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-2159744804250190789</id><published>2016-05-01T17:01:00.000+07:00</published><updated>2016-05-01T17:01:00.158+07:00</updated><title type='text'>aceVoip - Kali Linux Tutorial</title><content type='html'>&lt;b&gt;ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface. In the same way that the &quot;corporate directory&quot; feature of VoIP hard phones enables users to easily dial by name via their VoIP handsets,&lt;/b&gt;&lt;br /&gt;
  2. &lt;b&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2016/04/acevoip-kali-linux-tutorial.html&quot; rel=&quot;nofollow&quot;&gt;ace-VoIP&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
  3. &lt;br /&gt;
  4. ACE was developed as a research idea born from &quot;VoIP Hopper&quot; to automate VoIP attacks that can be targeted against names in an enterprise Directory. The concept is that in the future, attacks will be carried out against users based on their name, rather than targeting VoIP traffic against random RTP audio streams or IP addresses. ACE works by using DHCP, TFTP, and HTTP in order to download the VoIP corporate directory. It then outputs the directory to a text file, which can be used as input to other VoIP assessment tools. ACE is a standalone utility, but its functions are integrated into UCSniff.&lt;br /&gt;
  5. &lt;br /&gt;
  6. ACE currently supports the VoIP corporate directory used in Cisco Unified IP Phones. It works in the following way:&lt;br /&gt;
  7. &lt;br /&gt;
  8. 1)Spoofs CDP to get VVID&lt;br /&gt;
  9. 2)Adds Voice VLAN Interface (VLAN Hop) - subsequent traffic is tagged with VVID&lt;br /&gt;
  10. 3)Sends DHCP request tagged with VVID&lt;br /&gt;
  11. 4)Decodes TFTP Server IP Address via DHCP Option 150&lt;br /&gt;
  12. 5)Sends a TFTP request for IP Phone configuration file&lt;br /&gt;
  13. 6)Parses file, learning Corporate Directory URL&lt;br /&gt;
  14. 7)Sends an HTTP GET request for Directory&lt;br /&gt;
  15. 8)Parses XML Data, writing directory users to a formatted text file&lt;br /&gt;
  16. &lt;br /&gt;
  17. &lt;br /&gt;
  18. What is VoIP ?&lt;br /&gt;
  19. Voice over IP (VoIP) is an exciting technology which provides many benefits and cost effective solutions for communication.&lt;br /&gt;
  20. it is is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks&lt;br /&gt;
  21. More and more small and enterprise businesses are replacing their old traditional telephony systems with an IP based ones. A VoIP based PBX can provide many features such as: Multiple Extensions, Caller ID, Voice mail, IVR capabilities, Recording of conversations, Logging, Usage with hardware based telephones or software based (aka soft phones). Now days there are many vendors for PBX, IP telephones, VoIP services and equipment such as: CISCO, AVAYA and ASTERISK, SNOM, THOMSON… With new technology comes a new challenge for both the defensive and offensive side of security, One of the “great” dangers of traditional phone lines was that it was susceptible to eavesdropping. The “old school” way to eavesdrop on somebody’s phone line was to physically connect a small transmitter which was connected inside or outside their premises somewhere along the phone cord.&lt;br /&gt;
  22. &lt;br /&gt;
  23. IP telephony systems are also susceptible to eavesdropping, doing so in an IP environment is a little bit more difficult to execute, detect and require more the knowledge and the right set of tools.&lt;br /&gt;
  24. &lt;br /&gt;
  25. &lt;br /&gt;
  26. Usage&lt;br /&gt;
  27. ACE can be used in one of two ways. First, it can auto-discover the TFTP Server IP Address via DHCP, or (second) the user can specify the TFTP Server IP address as a command line parameter of the tool. In either case, you must supply the MAC Address of the IP Phone with the -m option in order for the tool to correctly download the configuration file via TFTP.&lt;br /&gt;
  28. &lt;br /&gt;
  29. root@kali:~# ace&lt;br /&gt;
  30. ACE v1.10: Automated Corporate (Data) Enumerator&lt;br /&gt;
  31. Usage: ace [-i interface] [ -m mac address ] [ -t tftp server ip address | -c cdp mode | -v voice vlan id | -r vlan interface | -d verbose mode ]&lt;br /&gt;
  32. &lt;br /&gt;
  33. -i (Mandatory) Interface for sniffing/sending packets&lt;br /&gt;
  34. -m (Mandatory) MAC address of the victim IP phone&lt;br /&gt;
  35. -t (Optional) tftp server ip address&lt;br /&gt;
  36. -c (Optional) 0 CDP sniff mode, 1 CDP spoof mode&lt;br /&gt;
  37. -v (Optional) Enter the voice vlan ID&lt;br /&gt;
  38. -r (Optional) Removes the VLAN interface&lt;br /&gt;
  39. -d (Optional) Verbose | debug mode&lt;br /&gt;
  40. &lt;br /&gt;
  41. Example Usages:&lt;br /&gt;
  42. Usage requires MAC Address of IP Phone supplied with -m option&lt;br /&gt;
  43. Usage:&lt;br /&gt;
  44. &lt;br /&gt;
  45. ace -t -m&lt;br /&gt;
  46. &lt;br /&gt;
  47. Mode to automatically discover TFTP Server IP via DHCP Option 150 (-m)&lt;br /&gt;
  48. Example:&lt;br /&gt;
  49. &lt;br /&gt;
  50. ace -i eth0 -m 00:1E:F7:28:9C:8e&lt;br /&gt;
  51. &lt;br /&gt;
  52. Mode to specify IP Address of TFTP Server&lt;br /&gt;
  53. Example:&lt;br /&gt;
  54. &lt;br /&gt;
  55. ace -i eth0 -t 192.168.10.150 -m 00:1E:F7:28:9C:8e&lt;br /&gt;
  56. &lt;br /&gt;
  57. Mode to specify the Voice VLAN ID&lt;br /&gt;
  58. Example:&lt;br /&gt;
  59. &lt;br /&gt;
  60. ace -i eth0 -v 96 -m 00:1E:F7:28:9C:8E&lt;br /&gt;
  61. &lt;br /&gt;
  62. Verbose mode&lt;br /&gt;
  63. Example:&lt;br /&gt;
  64. &lt;br /&gt;
  65. ace -i eth0 -v 96 -m 00:1E:F7:28:9C:8E -d&lt;br /&gt;
  66. &lt;br /&gt;
  67. Mode to remove vlan interface&lt;br /&gt;
  68. Example:&lt;br /&gt;
  69. &lt;br /&gt;
  70. ace -r eth0.96&lt;br /&gt;
  71. &lt;br /&gt;
  72. Mode to auto-discover voice vlan ID in the listening mode for CDP&lt;br /&gt;
  73. Example:&lt;br /&gt;
  74. &lt;br /&gt;
  75. ace -i eth0 -c 0 -m 00:1E:F7:28:9C:8E&lt;br /&gt;
  76. &lt;br /&gt;
  77. Mode to auto-discover voice vlan ID in the spoofing mode for CDP&lt;br /&gt;
  78. Example:&lt;br /&gt;
  79. &lt;br /&gt;
  80. ace -i eth0 -c 1 -m 00:1E:F7:28:9C:8E&lt;br /&gt;
  81. &lt;br /&gt;
  82. &lt;a href=&quot;http://kalitut.blogspot.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  83. &lt;div&gt;
  84. &lt;br /&gt;&lt;/div&gt;
  85. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2159744804250190789'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2159744804250190789'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2016/05/acevoip-kali-linux-tutorial.html' title='aceVoip - Kali Linux Tutorial'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-2543516159492078821</id><published>2015-07-27T15:11:00.000+07:00</published><updated>2015-07-27T15:11:00.353+07:00</updated><title type='text'>Free Encryption Project</title><content type='html'>Let&#39;s Encrypt, a project aimed to provide free-of-charge and easier-to-implement way to obtain and use a digital cryptographic certificates (SSL/TLS) to secure HTTPS website, is looking forward to issue its first digital certificates next month.&lt;br /&gt;
  86. &lt;br /&gt;
  87. &lt;b&gt;With Let&#39;s Encrypt, any webmaster interested in implementing HTTPS for their services can get the certificates for free, which is a great move for encouraging people to encrypt their users’ connections to their websites.&lt;/b&gt;&lt;br /&gt;
  88. &lt;br /&gt;
  89. Let&#39;s &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/free-encryption-project.html&quot; rel=&quot;nofollow&quot;&gt;Encrypt &lt;/a&gt;is a combined effort of digital-era rights advocate Electronic Frontier Foundation (EFF), Mozilla Foundation, Cisco Systems, Internet content distributor Akamai Technologies, certificate provider IdenTrust and researchers from the University of Michigan.&lt;br /&gt;
  90. &lt;br /&gt;
  91. &lt;b&gt;Generally, the process of implementation of an SSL certificate, including the need to obtain and install a certificate, is complicated for most web developers as it sounds.&lt;/b&gt;&lt;br /&gt;
  92. &lt;br /&gt;
  93. In most cases, the cost related issues force web administrators to give up on using encrypted connections. &lt;a href=&quot;http://www.virthreat.com/2015/07/free-encryption-project-to-issue-first.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  94. &lt;div&gt;
  95. &lt;br /&gt;&lt;/div&gt;
  96. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2543516159492078821'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2543516159492078821'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/free-encryption-project.html' title='Free Encryption Project'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-8290082866036728739</id><published>2015-07-23T15:08:00.000+07:00</published><updated>2015-07-23T15:08:00.121+07:00</updated><title type='text'>WordPress Vulnerability </title><content type='html'>&lt;b&gt;WordPress Vulnerability Puts Millions of Websites At Risk.&lt;/b&gt;&lt;br /&gt;
  97. &lt;div&gt;
  98. &lt;br /&gt;&lt;/div&gt;
  99. &lt;div&gt;
  100. &lt;b&gt;Millions of WordPress websites are at risks of being completely hijacked by the hackers due to a critical cross-site scripting (XSS) vulnerability present in the default installation of the widely used content management system.&lt;/b&gt;&lt;/div&gt;
  101. &lt;div&gt;
  102. &lt;br /&gt;&lt;/div&gt;
  103. &lt;div&gt;
  104. The cross-site scripting (XSS) vulnerability, uncovered by the security researcher reported by Robert Abela of Security firm Netsparker.&lt;/div&gt;
  105. &lt;div&gt;
  106. &lt;br /&gt;&lt;/div&gt;
  107. &lt;div&gt;
  108. &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/wordpress-vulnerability.html&quot; rel=&quot;nofollow&quot;&gt;Wordpress&lt;/a&gt; vulnerability resides in Genericons webfont package that is part of default WordPress Twenty Fifteen Theme.&lt;/div&gt;
  109. &lt;div&gt;
  110. &lt;br /&gt;&lt;/div&gt;
  111. &lt;div&gt;
  112. &lt;b&gt;Here comes the threat:&lt;/b&gt;&lt;/div&gt;
  113. &lt;div&gt;
  114. &lt;br /&gt;&lt;/div&gt;
  115. &lt;div&gt;
  116. &lt;b&gt;The XSS vulnerability has been identified as a &quot;DOM-based,&quot; which means the flaw resides in the document object model (DOM) that is responsible for text, images, headers, and links representation in a web browser.&lt;/b&gt;&lt;/div&gt;
  117. &lt;div&gt;
  118. &lt;br /&gt;&lt;/div&gt;
  119. &lt;div&gt;
  120. The easy-to-exploit DOM-based Cross-Site Scripting (XSS) vulnerability occurred due to an insecure file included with Genericons that allowed the Document Object Model Environment in the victim’s browser to be modified. &lt;a href=&quot;http://www.virthreat.com/2015/07/wordpress-vulnerability-puts-millions.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;/div&gt;
  121. &lt;div&gt;
  122. &lt;br /&gt;&lt;/div&gt;
  123. </content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8290082866036728739'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8290082866036728739'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/wordpress-vulnerability.html' title='WordPress Vulnerability '/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-1876595649032949964</id><published>2015-07-19T15:05:00.000+07:00</published><updated>2015-07-19T15:05:00.070+07:00</updated><title type='text'>Android Brillo</title><content type='html'>Internet of Things is the future, and every big tech companies are trying to become an integral part of this upcoming trend. Keeping this in mind, Google is developing an operating system for connecting all devices via the Internet.&lt;br /&gt;
  124. &lt;br /&gt;
  125. Google is expected to launch a new Android-based operating system that would be lightweight enough to run on low-power devices connected to the &quot;Internet of Things&quot; (IoT), reported The Information.&lt;br /&gt;
  126. &lt;br /&gt;
  127. Google&#39;s Brillo OS for Internet Of Things&lt;br /&gt;
  128. &lt;br /&gt;
  129. &lt;b&gt;The OS is dubbed &quot;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/android-brillo.html&quot; rel=&quot;nofollow&quot;&gt;Brillo,&lt;/a&gt;&quot; and the news outlet claims the company is likely to release the new operating system under the Android brand next weekend at Google I/O, the company&#39;s annual conference for software developers.&lt;/b&gt;&lt;br /&gt;
  130. &lt;br /&gt;
  131. The connected OS, which may require as little as 32 or 64 MB of RAM to run, could be used on everything from major smart home appliances such as refrigerators, TVs to smaller tech such as garden monitors, light bulbs, door locks and sensors.&lt;br /&gt;
  132. &lt;br /&gt;
  133. According to The Information, the search engine giant wants to design their own IoT communications schemes instead relying on the hardware vendors for IoT operating systems. Google will also offer Brillo for free to OEMs. &lt;a href=&quot;http://www.virthreat.com/2015/07/google-brillo-os-new-android-based-os.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  134. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1876595649032949964'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1876595649032949964'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/android-brillo.html' title='Android Brillo'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-3612050055349681387</id><published>2015-07-15T15:02:00.000+07:00</published><updated>2015-07-15T15:02:00.545+07:00</updated><title type='text'>Yoast Plugin Vulnerability</title><content type='html'>A critical vulnerability has been discovered in the most popular plugin of the WordPress content management platform (CMS) that puts tens of Millions of websites at risks of being hacked by the attackers.&lt;br /&gt;
  135. &lt;br /&gt;
  136. &lt;b&gt;The vulnerability actually resides in most versions of a WordPress plugin known as ‘&lt;i&gt;WordPress SEO by Yoast,&lt;/i&gt;’ which has more than 14 Million downloads according to Yoast website, making it one of the most popular plugins of WordPress for easily optimizing websites for search engines i.e Search engine optimization (SEO).&lt;/b&gt;&lt;br /&gt;
  137. &lt;br /&gt;
  138. The vulnerability in WordPress SEO by &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/yoast-plugin-vulnerability.html&quot; rel=&quot;nofollow&quot;&gt;Yoast&lt;/a&gt; has been discovered by Ryan Dewhurst, developer of the WordPress vulnerability scanner ‘WPScan’.&lt;br /&gt;
  139. &lt;br /&gt;
  140. All the versions prior to 1.7.3.3 of ‘WordPress SEO by Yoast’ are vulnerable to Blind SQL Injection web application flaw, according to an advisory published today.&lt;br /&gt;
  141. &lt;br /&gt;
  142. SQL injection (SQLi) vulnerabilities are ranked as critical one because it could cause a database breach and lead to confidential information leakage. Basically in SQLi attack, an attacker inserts a malformed SQL query into an application via client-side input. &lt;a href=&quot;http://www.virthreat.com/2015/05/yoast-plugin-vulnerability.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  143. &lt;div&gt;
  144. &lt;br /&gt;&lt;/div&gt;
  145. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3612050055349681387'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3612050055349681387'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/yoast-plugin-vulnerability.html' title='Yoast Plugin Vulnerability'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-4705842284119918440</id><published>2015-07-11T14:59:00.000+07:00</published><updated>2015-07-11T14:59:00.033+07:00</updated><title type='text'>Windows 10 Reviews</title><content type='html'>Microsoft just announced in its Ignite 2015 conference in Chicago that Windows 10 is set to be &quot;the last version of Windows.&quot;&lt;br /&gt;
  146. &lt;br /&gt;
  147. &lt;i&gt;&lt;b&gt;&quot;Right now [we are] releasing Windows 10, and because Windows 10 is the last version of Windows, [we are] all still working on Windows 10,&quot;&lt;/b&gt;&lt;/i&gt; said Microsoft&#39;s developer evangelist Jerry Nixon while speaking at the conference this week.&lt;br /&gt;
  148. &lt;br /&gt;
  149. What exactly does it mean? Will Microsoft not launch Windows 11 next? Is &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/windows-10-reviews.html&quot; rel=&quot;nofollow&quot;&gt;Windows 10&lt;/a&gt; actually the end of Microsoft’s Windows operating system?&lt;br /&gt;
  150. &lt;br /&gt;
  151. These are some questions that were ongoing in the mind of the audience when Nixon gave this statement during his speech.&lt;br /&gt;
  152. &lt;br /&gt;
  153. &amp;nbsp;The reaction from Microsoft was really alarming though you do not have to panic, as Windows OS is not dying.&lt;br /&gt;
  154. &lt;br /&gt;
  155. &lt;b&gt;Windows 10 — Brand Name of Microsoft&#39;s OS&lt;/b&gt;&lt;br /&gt;
  156. &lt;br /&gt;
  157. For the moment, Microsoft will stick with Windows 10 and focus on smaller and faster updates to its Windows 10 platform, instead of launching new stand-alone versions of the operating system every few years.&lt;br /&gt;
  158. &lt;br /&gt;
  159. This Microsoft&#39;s new approach is something similar to Apple&#39;s OS X, the Mac operating system that gets smaller updates on a yearly basis and has been known as OS X for over 15 years. Every new release of OS X gets a unique name with some major updates, but Apple didn&#39;t change the name of its OS.&lt;br /&gt;
  160. &lt;br /&gt;
  161. Oh! Give me a break. If I take you back when it was decided by Microsoft that its next Windows version will be Windows 10 and not Windows 9. This could be a reason that Microsoft wants to stick with Windows 10 brand name for the near future. &lt;a href=&quot;http://sources-code-hemlet.blogspot.com/2015/06/windows-10-is-last-version-of-windows.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  162. &lt;div&gt;
  163. &lt;br /&gt;&lt;/div&gt;
  164. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/4705842284119918440'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/4705842284119918440'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/windows-10-reviews.html' title='Windows 10 Reviews'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-2762170297395427125</id><published>2015-07-07T14:56:00.000+07:00</published><updated>2015-07-07T14:56:00.111+07:00</updated><title type='text'>WebAssembly New Standard for Web Apps</title><content type='html'>Google, Apple, Microsoft, and Mozilla have joined hands to create code for use in the future web browsers that promises up to 20 times faster performance.&lt;br /&gt;
  165. &lt;br /&gt;
  166. &lt;b&gt;Dubbed &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/webassembly-new-standard-for-web-apps.html&quot; rel=&quot;nofollow&quot;&gt;WebAssembly&lt;/a&gt; (or wasm for short), a project to create a new portable bytecode for the Web that will be more efficient for both desktop as well as mobile web browsers to parse than the complete source code of a Web page or an application.&lt;/b&gt;&lt;br /&gt;
  167. &lt;br /&gt;
  168. Bytecode is actually a machine-readable instruction set that is faster for web browsers to load than high-level languages.&lt;br /&gt;
  169. &lt;br /&gt;
  170. &lt;b&gt;WebAssembly — A New File Format to Compile Code&lt;/b&gt;&lt;br /&gt;
  171. &lt;br /&gt;
  172. At the moment, browsers use JavaScript to interpret the code and allow functionality on websites such as dynamic content and forms. By default, JavaScript files are downloaded from the server and then compiled by the JavaScript engine in the web browser.&lt;br /&gt;
  173. &lt;br /&gt;
  174. However, improvements have been made to load times via Asm.js — the stripped-down JavaScript dialect described as an &quot;assembly language for the web&quot; — but bytecode-based systems such as .NET are faster and enable efficient compilation.&lt;br /&gt;
  175. &lt;br /&gt;
  176. &lt;b&gt;WebAssembly will introduce a new file format that will allow developers to compile their code to a binary notation, which will then be executed inside each browser&#39;s (e.g. Chrome, Firefox, IE/Edge, Safari) JavaScript engine&lt;/b&gt;.&lt;br /&gt;
  177. &lt;br /&gt;
  178. If introduced as a standard implemented in all web browsers, WebAssembly could surely bring app-like performance to Web content as well as applications.&lt;br /&gt;
  179. &lt;br /&gt;
  180. &lt;b&gt;Over 20% Faster Performance&lt;/b&gt;&lt;br /&gt;
  181. &lt;br /&gt;
  182. Preliminary tests already show that the binary representation is 23 times faster to parse than similar JavaScript applications optimized through Mozilla&#39;s widely supported asm.js for browsers, and 20 to 30 percent smaller than its actual file size.&lt;br /&gt;
  183. &lt;br /&gt;
  184. &amp;nbsp; &amp;nbsp; &quot;I&#39;m happy to report that we at Mozilla have started working with Chromium, Edge and WebKit engineers on creating a new standard, WebAssembly,&quot; said Mozilla developer Luke Wagner, &quot;that defines a portable, size- and load-time-efficient format and execution model specifically designed to serve as a compilation target for the Web.&quot;&lt;br /&gt;
  185. &lt;br /&gt;
  186. &lt;b&gt;Currently, only C and C++ code can be compiled into a WebAssembly (a.k.a wasm) file.&lt;/b&gt;&lt;br /&gt;
  187. &lt;br /&gt;
  188. Moreover, the developers of wasm know that JavaScript is supported everywhere so for older web browsers, they are providing a polyfill — a JavaScript script that will convert WebAssembly bytecode into asm.js for those browsers that don&#39;t support wasm.&lt;br /&gt;
  189. &lt;br /&gt;
  190. &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/webassembly-new-standard-for-web-apps.html&quot; rel=&quot;nofollow&quot;&gt;WebAssembly&lt;/a&gt; is still in its early days of development with no formal standards as of now. The specifications and the high-level design has also not decided yet, but with all four major browser developers working together, wasm should appear soon.&lt;br /&gt;
  191. &lt;br /&gt;
  192. The future possibilities for &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/webassembly-new-standard-for-web-apps.html&quot; rel=&quot;nofollow&quot;&gt;WebAssembly&lt;/a&gt; file format are being explored on GitHub page. However, a new WebAssembly Community Group has already been formed by the World Wide Web Consortium (W3C), which is open for anyone to join. These are FAQs that will give you more details on the group plans.&lt;br /&gt;
  193. &lt;br /&gt;
  194. &lt;a href=&quot;http://thehackernews.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  195. &lt;div&gt;
  196. &lt;br /&gt;&lt;/div&gt;
  197. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2762170297395427125'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2762170297395427125'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/webassembly-new-standard-for-web-apps.html' title='WebAssembly New Standard for Web Apps'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-8885592784019631978</id><published>2015-07-03T14:53:00.000+07:00</published><updated>2015-07-03T14:53:00.384+07:00</updated><title type='text'>Android Apps To Make You Smarter!</title><content type='html'>&lt;b&gt;Duolingo&lt;/b&gt;&lt;br&gt;
  198. &lt;br&gt;
  199. &lt;b&gt;Duolingo &lt;/b&gt;is a free app that can help you learn languages. The app can teach you Spanish, French, German, Italian, Portuguese, Dutch, Irish, Danish, Swedish, and English in a totally entertaining manner. The best part is that the app is totally free and ad-free. Duolingo has 34 hours of tutorial for each language. These tutorials are equivalent to the semester of a university-level education.&lt;br&gt;
  200. &lt;br&gt;
  201. &lt;b&gt;Kindle&lt;/b&gt;&lt;br&gt;
  202. &lt;br&gt;
  203. &lt;b&gt;Kindle app for &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/07/android-apps-to-make-you-smarter.html&quot; rel=&quot;nofollow&quot;&gt;Android &lt;/a&gt;gives you access to the entire library of Kindle. Kindle store has over a million books&lt;/b&gt;. The app is must for book lovers. You can also enjoy popular magazines through this app. The app lets you sync your eBooks too. The app is full of rich features like built-in dictionary, Google search and Wikipedia. Kindle store also offers decent number of free books to its users.&lt;br&gt;
  204. &lt;br&gt;
  205. &lt;b&gt;Today in History&lt;/b&gt;&lt;br&gt;
  206. &lt;br&gt;
  207. &lt;a href=&quot;https://tutorial-hemlet.blogspot.com/2015/07/android-apps-to-make-you-smarter.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8885592784019631978'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8885592784019631978'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/07/android-apps-to-make-you-smarter.html' title='Android Apps To Make You Smarter!'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-1467531994673488201</id><published>2015-06-27T15:12:00.000+07:00</published><updated>2015-06-27T15:12:00.201+07:00</updated><title type='text'>Rombertik Malware Payload</title><content type='html'>Security researchers have discovered a new strain of malware that makes use of extraordinary measures to evade detection and analysis, making the computer it infects unusable.&lt;br /&gt;
  208. &lt;br /&gt;
  209. &lt;b&gt;Dubbed Rombertik, which is &quot;unique&quot; among other self-destructing malware samples due to its unique evasion techniques. As soon as any analysis tool is detected, Rombertik attempts to delete the device&#39;s Master Boot Record (MBR) and home directories, making the machine constantly restart.&lt;/b&gt;&lt;br /&gt;
  210. &lt;br /&gt;
  211. Rombertik is a complex piece of spyware designed to &quot;indiscriminately&quot; collect everything a user does online in order to obtain victim’s login credentials and other confidential information.&lt;br /&gt;
  212. &lt;br /&gt;
  213. &lt;b&gt;Infects users via Phishing campaign&lt;/b&gt;:&lt;br /&gt;
  214. &lt;br /&gt;
  215. &lt;b&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/rombertik-malware-payload.html&quot; rel=&quot;nofollow&quot;&gt;Rombertik&lt;/a&gt; typically gets installed on vulnerable machines when users click on malicious attachments included in phishing emails, Cisco security researchers Ben Baker and Alex Chiu said in a blog post Monday.&lt;/b&gt;&lt;br /&gt;
  216. &lt;br /&gt;
  217. Once loaded into the system, &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/rombertik-malware-payload.html&quot; rel=&quot;nofollow&quot;&gt;Rombertik&lt;/a&gt; first runs a series of anti-analysis checks to determine if it is running within a sandbox.&lt;br /&gt;
  218. &lt;br /&gt;
  219. &lt;b&gt;In case it isn’t running within the sandbox, &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/rombertik-malware-payload.html&quot; rel=&quot;nofollow&quot;&gt;Rombertik&lt;/a&gt; decrypts and installs itself on the victim&#39;s machine, which then allows the malware to launch a second copy of itself and overwrite the second copy with the malware&#39;s core spying functionality.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
  220. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  221. &lt;a href=&quot;http://silent-consultant.blogspot.com/2015/06/rombertik-malware-destroy-hard-drive.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  222. &lt;div&gt;
  223. &lt;br /&gt;&lt;/div&gt;
  224. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1467531994673488201'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1467531994673488201'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/rombertik-malware-payload.html' title='Rombertik Malware Payload'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-781346972102816678</id><published>2015-06-23T15:09:00.000+07:00</published><updated>2015-06-23T15:09:00.446+07:00</updated><title type='text'>New GPU-based Linux Rootkit </title><content type='html'>The world of hacking has become more organized and reliable over recent years and so the techniques of hackers.&lt;br /&gt;
  225. &lt;br /&gt;
  226. Nowadays, attackers use highly sophisticated tactics and often go to extraordinary lengths in order to mount an attack.&lt;br /&gt;
  227. &lt;br /&gt;
  228. &lt;b&gt;And there is something new to the list&lt;/b&gt;:&lt;br /&gt;
  229. &lt;br /&gt;
  230. &lt;b&gt;A team of developers has created not one, but two pieces of malware that run on an infected computer’s graphics processor unit (GPU) instead of its central processor unit (CPU), in order to enhance their stealthiness and computational efficiency.&lt;/b&gt;&lt;br /&gt;
  231. &lt;br /&gt;
  232. &lt;b&gt;The two pieces of malware:&lt;/b&gt;&lt;br /&gt;
  233. &lt;br /&gt;
  234. &amp;nbsp; &amp;nbsp; &lt;b&gt;Jellyfish &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/new-gpu-based-linux-rootkit.htm&quot; rel=&quot;nofollow&quot;&gt;Rootkit &lt;/a&gt;for Linux operating system&lt;/b&gt;&lt;br /&gt;
  235. &lt;b&gt;&amp;nbsp; &amp;nbsp; Demon Keylogger&lt;/b&gt;&lt;br /&gt;
  236. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  237. &lt;a href=&quot;http://silent-consultant.blogspot.com/2015/06/new-gpu-based-linux-rootkit-and.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  238. &lt;div&gt;
  239. &lt;br /&gt;&lt;/div&gt;
  240. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/781346972102816678'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/781346972102816678'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/new-gpu-based-linux-rootkit.html' title='New GPU-based Linux Rootkit '/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-3392787123426155262</id><published>2015-06-19T14:59:00.000+07:00</published><updated>2015-06-19T14:59:00.242+07:00</updated><title type='text'>Hacker Bypass Extension Password Alert </title><content type='html'>Less than 24 hours after Google launched the new &lt;b&gt;Phishing alert extension Password Alert, &lt;/b&gt;a security researcher was able to bypass the feature using deadly simple exploits.&lt;br /&gt;
  241. &lt;br /&gt;
  242. On Wednesday, the search engine giant launched a new Password Alert Chrome extension to alert its users whenever they accidentally enter their Google password on a carefully crafted phishing website that aimed at hijacking users’ account.&lt;br /&gt;
  243. &lt;br /&gt;
  244. &lt;b&gt;However, security expert Paul Moore easily circumvented the technology using just seven lines of simple JavaScript code that kills phishing alerts as soon as they started to appear, defeating Google’s new Password Alert extension.&lt;/b&gt;&lt;br /&gt;
  245. &lt;br /&gt;
  246. Google shortly fixed the issue and released a new update to &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/hacker-bypass-extension-password-alert.html&quot; rel=&quot;nofollow&quot;&gt;Password Alert extension&lt;/a&gt; that blocked the Moore’s exploit. However, Moore discovered another way to block the new version of Password Alert, as well.&lt;br /&gt;
  247. &lt;br /&gt;
  248. The first proof of concept exploit by Moore relied on a JavaScript that looks for instances of warning screen every five milliseconds and simply removes anything it detects. Generally, the warning screen is still there, but the exploit prevented the user from ever seeing it.&lt;br /&gt;
  249. &lt;br /&gt;
  250. Moore (@Paul_Reviews) posted the proof-of-concept JavaScript exploit yesterday, explaining that Google’s Password Alert can be bypassed by anyone using just seven lines of code.&lt;br /&gt;
  251. &lt;br /&gt;
  252. &lt;b&gt;Here’s the Kicker:&lt;/b&gt;&lt;br /&gt;
  253. &lt;br /&gt;
  254. However, Google assured its users that the company has now fixed the issue, releasing Password Alert version 1.4. &quot;To update quickly, go to Chrome://extensions/ , enable developer mode, click update extensions now,&quot; Google engineer Drew Hintz said.&lt;br /&gt;
  255. &lt;br /&gt;
  256. But Moore didn’t want to stop here. He began analyzing the code for the extension more closely and figured out another way to bypass Password Alert, effectively killing phishing alerts as soon as they generated.&lt;br /&gt;
  257. &lt;br /&gt;
  258. &lt;b&gt;No simple this time baby:&lt;/b&gt;&lt;br /&gt;
  259. &lt;br /&gt;
  260. And according to Moore, the second exploit developed by him will be more difficult for Google to repair.&lt;br /&gt;
  261. &lt;br /&gt;
  262. Moore also provided a proof-of-concept video on YouTube showing the attack in action. You can watch the video below:&lt;br /&gt;
  263. &lt;br /&gt;
  264. &lt;b&gt;Now, let’s see how much time the search engine giant would take to fix this issue in its all new &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/hacker-bypass-extension-password-alert.html&quot; rel=&quot;nofollow&quot;&gt;Password Alert Chrome Extension&lt;/a&gt;.&lt;/b&gt;&lt;br /&gt;
  265. &lt;br /&gt;
  266. The technology was just launched by Google on Wednesday, so you can expect some flaws at its early stage. Password Alert extension has been installed by nearly 30,000 Chrome users, who are advised to update version 1.4, the latest version available at the moment, to fix the first issue.&lt;br /&gt;
  267. &lt;br /&gt;
  268. In order to fix another problem, you may have to wait until Google releases the next update. Till then, you are advised to turn on two-factor authentication and use a good password manager to protect yourself against phishing attacks.&lt;br /&gt;
  269. &lt;br /&gt;
  270. &lt;a href=&quot;http://thehackernews.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  271. &lt;br /&gt;
  272. &lt;br /&gt;
  273. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3392787123426155262'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3392787123426155262'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/hacker-bypass-extension-password-alert.html' title='Hacker Bypass Extension Password Alert '/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-8926676656758178963</id><published>2015-06-15T14:57:00.000+07:00</published><updated>2015-06-15T14:57:00.458+07:00</updated><title type='text'>Quantum Operating System</title><content type='html'>So far, we just have heard about Quantum computing that could make even complex calculations trivial, but there are no practical Quantum computers exist.&lt;br /&gt;
  274. &lt;br /&gt;
  275. However, the dream of &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/quantum-operating-system.html&quot; rel=&quot;nofollow&quot;&gt;Quantum&lt;/a&gt; computers could become a reality in coming future.&lt;br /&gt;
  276. &lt;br /&gt;
  277. &lt;b&gt;Cambridge Quantum Computing Limited (CQCL) has build a new Fastest Operating System aimed at running the futuristic superfast quantum computers.&lt;/b&gt;&lt;br /&gt;
  278. &lt;br /&gt;
  279. The new &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/quantum-operating-system.html&quot; rel=&quot;nofollow&quot;&gt;operating system&lt;/a&gt;, dubbed t|kit&amp;gt;, has been featured by CQCL&#39;s very own proprietary custom designed high-speed super mechanism, allowing the company to accurately impersonate the working of a quantum processor. &lt;a href=&quot;http://www.virthreat.com/2015/06/fastest-operating-system-for-quantum.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  280. &lt;div&gt;
  281. &lt;br /&gt;&lt;/div&gt;
  282. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8926676656758178963'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/8926676656758178963'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/quantum-operating-system.html' title='Quantum Operating System'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-5052925623878505898</id><published>2015-06-11T14:52:00.000+07:00</published><updated>2015-06-11T14:52:00.998+07:00</updated><title type='text'>Android M</title><content type='html'>While majority of smartphone users are waiting for Android 5.0 Lollipop update for their devices, Google is soon going to launch the next version of Android at its official Google I/O 2015 developer event May 28 in San Francisco.&lt;br /&gt;
  283. &lt;br /&gt;
  284. &lt;b&gt;Android M — The name of the latest version of Android mobile operating system was spotted at the Google I/O 2015 schedule under the &quot;Android for Work Update&quot; Session, which says…&lt;/b&gt;&lt;br /&gt;
  285. &lt;br /&gt;
  286. &amp;nbsp; &amp;nbsp; &quot;&lt;i&gt;Android M is bringing the power of Android to all kinds of workplaces.&lt;/i&gt;&quot;&lt;br /&gt;
  287. &lt;br /&gt;
  288. According to the company, this will open up &quot;huge new markets for hundreds of Millions of devices to workers at small businesses, logistics, deskless workers, and warehousing jobs.&quot;&lt;br /&gt;
  289. &lt;br /&gt;
  290. However, Google appears to have since removed any mention of &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/android-m.html&quot; rel=&quot;nofollow&quot;&gt;Android M&lt;/a&gt; from Google&#39;s I/O website, most probably the company wants to keep it as a surprise for Android users.&lt;br /&gt;
  291. &lt;br /&gt;
  292. Considering the full Android releases with starting letters in alphabetical order, — Android M — strongly believes to be the next version of the Android operating system.&lt;br /&gt;
  293. &lt;br /&gt;
  294. When the Google launched Android 5.0 at its developer conference last year, it was known by the name &quot;Android L&quot; before the company revealed its final name &quot;Lollipop&quot; months later.&lt;br /&gt;
  295. &lt;a href=&quot;http://silent-consultant.blogspot.com/2015/06/android-m-latest-android-operating.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  296. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5052925623878505898'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5052925623878505898'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/android-m.html' title='Android M'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-251741565219071914</id><published>2015-06-07T14:47:00.000+07:00</published><updated>2015-06-07T14:47:00.245+07:00</updated><title type='text'>PayPal Wants To Integrate Password with Human Body</title><content type='html'>You would have been holding a number of online accounts for different services, but how many of you hold a different and unique password for every single account?&lt;br /&gt;
  297. &lt;br /&gt;
  298. Probably a very few of you. The majority of people have one or two passwords that are quite simple and easy to remember and comfortably manage on their own.&lt;br /&gt;
  299. &lt;br /&gt;
  300. &lt;b&gt;However, you need not worry as the Future of identification would not rely on Passwords, according to &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/paypal-wants-to-integrate-password-with.html&quot; rel=&quot;nofollow&quot;&gt;PayPal’s&lt;/a&gt; global head of developer evangelism Jonathan Leblanc&lt;/b&gt;.&lt;br /&gt;
  301. &lt;br /&gt;
  302. &lt;a href=&quot;http://sources-code-hemlet.blogspot.com/2015/05/hacking-paypal.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  303. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/251741565219071914'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/251741565219071914'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/paypal-wants-to-integrate-password-with.html' title='PayPal Wants To Integrate Password with Human Body'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-5425001963408995999</id><published>2015-06-03T14:42:00.000+07:00</published><updated>2015-06-03T14:42:00.854+07:00</updated><title type='text'>Magento E Commerce Phishing Attacks</title><content type='html'>&lt;b&gt;The &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/magento-e-commerce-phishing-attacks.html&quot; rel=&quot;nofollow&quot;&gt;Magento&lt;/a&gt; Market of &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/magento-e-commerce-phishing-attacks.html&quot; rel=&quot;nofollow&quot;&gt;E-commerce &lt;/a&gt;websites is at its peak, as today people love to shop online to save their time. However, E-commerce and financial sites stand first in the rundown of potential victims as they manage financial exchanges.&lt;/b&gt;&lt;br /&gt;
  304. &lt;br /&gt;
  305. The traditional way to target victims of e-commerce sites is to use targeted &quot;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/06/magento-e-commerce-phishing-attacks.html&quot; rel=&quot;nofollow&quot;&gt;phishing&lt;/a&gt;&quot; attacks via social media and emails. But…&lt;br /&gt;
  306. &lt;br /&gt;
  307. …due to increased awareness among the people about the threat of phishing attacks, hackers have now discovered new way — by malvertising legitimate websites where people assume to be safe and secure. &lt;a href=&quot;http://silent-consultant.blogspot.com/2015/05/how-to-protecting-magento-ecommerce.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  308. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5425001963408995999'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5425001963408995999'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/06/magento-e-commerce-phishing-attacks.html' title='Magento E Commerce Phishing Attacks'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-1349476938958223318</id><published>2015-05-27T14:39:00.000+07:00</published><updated>2015-05-27T14:39:00.613+07:00</updated><title type='text'>OpenSSL Patch</title><content type='html'>The OpenSSL Foundation is set to release a handful of patches for undisclosed security vulnerabilities in its widely used open source software later this week, including one that has been rated &quot;high&quot; severity.&lt;br /&gt;
  309. &lt;br /&gt;
  310. In a mailing list note published last night, Matt Caswell of the OpenSSL Project Team announced that OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r, and 0.9.8zf will be released Thursday.&lt;br /&gt;
  311. &lt;br /&gt;
  312. &amp;nbsp; &amp;nbsp; &quot;These releases will be made available on 19th March,&quot; Caswell wrote. &quot;They will fix a number of security defects. The highest severity defect fixed by these releases is classified as &quot;high&quot; severity.&quot;&lt;br /&gt;
  313. &lt;br /&gt;
  314. &lt;b&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/openssl-patch_27.html&quot; rel=&quot;nofollow&quot;&gt;OpenSSL&lt;/a&gt; is an open-source implementation of the SSL and TLS protocols. It&#39;s a technology that&#39;s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL.&lt;/b&gt;&lt;br /&gt;
  315. &lt;br /&gt;
  316. Further details on the mystery security vulnerabilities (CVE-2015-0209, CVE-2015-0285, CVE-2015-0288) are unavailable at this time, although some industry experts have speculated that this high severity flaw could be another POODLE or Heartbleed bug, worst TLS/SSL flaws that are still believed to be affecting websites on Internet today.&lt;br /&gt;
  317. &lt;br /&gt;
  318. Heartbleed was discovered in April last year in an earlier version of OpenSSL, which allowed hackers to read the sensitive contents of users&#39; encrypted data, such as credit card transactions and even steal SSL keys from Internet servers or client software. &lt;a href=&quot;http://www.virthreat.com/2015/05/openssl-to-patch-high-severity.html&quot; rel=&quot;nofollow&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  319. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1349476938958223318'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1349476938958223318'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/openssl-patch_27.html' title='OpenSSL Patch'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-6766233510671344990</id><published>2015-05-23T21:37:00.000+07:00</published><updated>2015-05-23T21:37:00.670+07:00</updated><title type='text'>Yoast Plugin Vulnerability</title><content type='html'>A critical vulnerability has been discovered in the most popular plugin of the WordPress content management platform (CMS) that puts tens of Millions of websites at risks of being hacked by the attackers.&lt;br /&gt;
  320. &lt;br /&gt;
  321. The vulnerability actually resides in most versions of a WordPress plugin known as ‘&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/yoast-plugin-vulnerability.html&quot; rel=&quot;nofollow&quot;&gt;WordPress SEO by Yoast,&lt;/a&gt;’ which has more than 14 Million downloads according to Yoast website, making it one of the most popular plugins of WordPress for easily optimizing websites for search engines i.e Search engine optimization (SEO).&lt;br /&gt;
  322. &lt;br /&gt;
  323. &lt;b&gt;The vulnerability in WordPress SEO by Yoast has been discovered by Ryan Dewhurst, developer of the WordPress vulnerability scanner ‘WPScan’.&lt;/b&gt;&lt;br /&gt;
  324. &lt;br /&gt;
  325. All the versions prior to 1.7.3.3 of ‘WordPress SEO by Yoast’ are vulnerable to Blind SQL Injection web application flaw, according to an advisory published today.&lt;br /&gt;
  326. &lt;br /&gt;
  327. SQL injection (SQLi) vulnerabilities are ranked as critical one because it could cause a database breach and lead to confidential information leakage. Basically in SQLi attack, an attacker inserts a malformed SQL query into an application via client-side input.&lt;a href=&quot;http://www.virthreat.com/2015/05/yoast-plugin-vulnerability.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; Read Full Article&lt;/a&gt;&lt;br /&gt;
  328. &lt;div&gt;
  329. &lt;br /&gt;&lt;/div&gt;
  330. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6766233510671344990'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6766233510671344990'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/yoast-plugin-vulnerability.html' title='Yoast Plugin Vulnerability'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-2699394495387182927</id><published>2015-05-19T21:36:00.000+07:00</published><updated>2015-05-19T21:36:00.329+07:00</updated><title type='text'>OpenSSL Patch</title><content type='html'>he OpenSSL Foundation is set to release a handful of patches for undisclosed security vulnerabilities in its widely used open source software later this week, including one that has been rated &quot;high&quot; severity.&lt;br /&gt;
  331. &lt;br /&gt;
  332. In a mailing list note published last night, Matt Caswell of the &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/openssl-patch.html&quot; rel=&quot;nofollow&quot;&gt;OpenSSL&lt;/a&gt; Project Team announced that OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r, and 0.9.8zf will be released Thursday.&lt;br /&gt;
  333. &lt;br /&gt;
  334. &lt;b&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &quot;These releases will be made available on 19th March,&quot; Caswell wrote. &quot;They will fix a number of security defects. The highest severity defect fixed by these releases is classified as &quot;high&quot; severity.&quot;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
  335. &lt;br /&gt;
  336. OpenSSL is an open-source implementation of the SSL and TLS protocols. It&#39;s a technology that&#39;s widely used by almost every websites to encrypt web sessions, even the Apache web server that powers almost half of the websites over the Internet utilizes OpenSSL.&lt;br /&gt;
  337. &lt;br /&gt;
  338. Further details on the mystery security vulnerabilities (CVE-2015-0209, CVE-2015-0285, CVE-2015-0288) are unavailable at this time, although some industry experts have speculated that this high severity flaw could be another POODLE or Heartbleed bug, worst TLS/SSL flaws that are still believed to be affecting websites on Internet today. &lt;a href=&quot;http://www.virthreat.com/2015/05/openssl-to-patch-high-severity.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read Full Article&lt;/a&gt;&lt;br /&gt;
  339. &lt;br /&gt;
  340. &lt;br /&gt;
  341. &lt;div&gt;
  342. &lt;br /&gt;&lt;/div&gt;
  343. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2699394495387182927'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/2699394495387182927'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/openssl-patch.html' title='OpenSSL Patch'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-790795919933850530</id><published>2015-05-15T21:33:00.000+07:00</published><updated>2015-05-15T21:33:00.452+07:00</updated><title type='text'>Forensic Analysis</title><content type='html'>An often overlooked feature of log management software is the ability to conduct &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/forensic-analysis.html&quot; rel=&quot;nofollow&quot;&gt;forensic&lt;/a&gt; &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/forensic-analysis.html&quot; rel=&quot;nofollow&quot;&gt;analysis&lt;/a&gt; of historical events. If your network goes down, your network monitoring tool can tell you what happened, but knowing why it happened is even more valuable.&lt;br /&gt;
  344. &lt;br /&gt;
  345. &lt;b&gt;SolarWinds Log &amp;amp; Event Manager has cutting-edge IT search for fast and easy forensic analysis. Here are six ways that the forensic analysis feature of Log &amp;amp; Event Manager can help you piece together what really happened.&lt;/b&gt;&lt;br /&gt;
  346. &lt;br /&gt;
  347. You can download a free, fully functional 30-day trial of Log &amp;amp; Event Manager from here.&lt;br /&gt;
  348. &lt;br /&gt;
  349. &lt;b&gt;ID file changes&lt;/b&gt;&lt;br /&gt;
  350. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  351. When collecting logs, you’re going to see millions of file changes. How do you know which ones to isolate? It’s best to isolate file changes against critical files (protected docs, financial information, personal documents, HR records, etc.).&lt;br /&gt;
  352. &lt;br /&gt;
  353. Look at file changes from a forensic approach to determine if suspicious activity has occurred. Often times, a virus will affect file attribute changes such as permissions changes. This could allow the retrieval of information like a password, resulting in unauthorized file or network access.&lt;br /&gt;
  354. &lt;br /&gt;
  355. Forensic analysis can help you identify if files have been changed, when they were changed, and who made the changes.&lt;br /&gt;
  356. &lt;br /&gt;
  357. &lt;b&gt;Identify user activity&lt;/b&gt;&lt;br /&gt;
  358. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  359. You can map user activity using historical data to link together event logs. You can see the activity of one user, a group of accounts, or a specific type of account.&lt;br /&gt;
  360. &lt;br /&gt;
  361. Using Log &amp;amp; Event Manager to collect logs from hundreds devices makes it easy to summarize the log data to surface events, privilege changes, etc. The forensic analysis feature allows you to quickly identify anything that looks unusual in the accounts you are investigating. &lt;a href=&quot;http://www.virthreat.com/2015/05/how-to-perform-forensic-analysis.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Read Full Article&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
  362. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/790795919933850530'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/790795919933850530'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/forensic-analysis.html' title='Forensic Analysis'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-6794710654179940886</id><published>2015-05-11T21:31:00.000+07:00</published><updated>2015-05-11T21:31:00.146+07:00</updated><title type='text'>BEEBONE Botnet</title><content type='html'>U.S. and European law enforcement agencies have shut down a highly sophisticated piece of the botnet that had infected more than 12,000 computers worldwide, allowing hackers to steal victims’ banking information and other sensitive data.&lt;br /&gt;
  363. &lt;br /&gt;
  364. The law enforcement agencies from the United States, United Kingdom and the European Union conducted a joint operation to get rid of the botnet across the globe and seized the command-and-control server that had been used to operate the nasty &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/beebone-botnet.html&quot; rel=&quot;nofollow&quot;&gt;Beebone &lt;/a&gt;(also known as AAEH) botnet.&lt;br /&gt;
  365. &lt;br /&gt;
  366. What’s a Botnet?&lt;br /&gt;
  367. &lt;br /&gt;
  368. A botnet is a network of large number of computers compromised with malicious software and controlled surreptitiously by hackers without the knowledge of victims.&lt;br /&gt;
  369. &lt;br /&gt;
  370. Basically, a &quot;botnet&quot; is a hacker’s &quot;robot&quot; that does the malicious work directed by hackers.&lt;br /&gt;
  371. &lt;br /&gt;
  372. &lt;b&gt;Hackers and Cyber Criminals have brushed up their hacking skills and started using Botnets as a cyber weapon to carry out multiple crimes such as DDoS attacks (distributed denial of service), mass spamming, advertising revenue manipulation, cyber espionage, mining bitcoins, surveillance etc.&lt;/b&gt;&lt;br /&gt;
  373. &lt;br /&gt;
  374. However, this is not first time we hear about a sophisticated botnet took down by law enforcement agencies.&lt;br /&gt;
  375. &lt;br /&gt;
  376. Just two months ago, law Enforcement took down Ramnit botnet, which infected over 3.2 Million computers worldwide, and last year the FBI and Europol torn down the GameOver Zeus botnet, although it came back a month after its took down.&lt;a href=&quot;http://sources-code-hemlet.blogspot.com/2015/05/beebone-botnet.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt; Read Full Article&lt;/a&gt;&lt;br /&gt;
  377. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6794710654179940886'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6794710654179940886'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/beebone-botnet.html' title='BEEBONE Botnet'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-1922875518995561797</id><published>2015-05-07T21:27:00.000+07:00</published><updated>2015-05-07T21:27:00.058+07:00</updated><title type='text'>Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities</title><content type='html'>&lt;b&gt;Yahoo! has offered $24,000 to a security researcher for finding out and reporting three critical security vulnerabilities in its products including &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/yahoo-pays-24000-to-hacker-for-finding.htm&quot; rel=&quot;nofollow&quot;&gt;Yahoo&lt;/a&gt;! Stores and Yahoo!-hosted websites&lt;/b&gt;.&lt;br /&gt;
  378. &lt;br /&gt;
  379. While testing all the company&#39;s application, Mark Litchfield, a bug bounty hunter who often works with different companies, discovered three critical vulnerabilities in Yahoo!&#39;s products. All the three vulnerabilities have now been fixed by Yahoo!.&lt;br /&gt;
  380. &lt;br /&gt;
  381. &lt;b&gt;THREE CRITICAL SECURITY VULNERABILITIES&lt;/b&gt;&lt;br /&gt;
  382. The first and most critical vulnerability gives hackers full administrator access to Yahoo!&#39;s e-commerce platform, Yahoo! Small Business, a portal that allows small business owners to create their own web stores through Yahoo! and sell merchandise.&lt;br /&gt;
  383. &lt;br /&gt;
  384. According to the researcher, the flaw in the service allowed him to fully administrator any Yahoo store and thereby gain access to customers&#39; personally identifiable information, including names, email addresses, telephone numbers.&lt;br /&gt;
  385. &lt;br /&gt;
  386. &lt;b&gt;BUG ALLOWS FREE SHOPPING&lt;/b&gt;&lt;br /&gt;
  387. Beside allowing hackers full admin access to the web stores, the vulnerability could also leverage an attacker to rig a user-run eCommerce web store to let them shop for free, or at a huge discount, Litchfield claimed.&lt;br /&gt;
  388. &lt;br /&gt;
  389. &lt;b&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &quot;We could also shop for free by either changing the prices, or creating our own discount code,&quot; Litchfield said in an email describing the attack. &quot;Also, we could place an order, then once received, go and refund our money.&quot;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
  390. &lt;br /&gt;
  391. A separate but related vulnerability in Yahoo! Stores, second flaw discovered by Litchfield, allows an unauthorized user to edit Yahoo-hosted stores through the app, thereby creating a means for hackers to hijack an online website store.&lt;br /&gt;
  392. &lt;br /&gt;
  393. Last but not the least, Litchfield discovered a critical vulnerability in Yahoo’s Small Business portal that allows hackers to seize administrative access to Yahoo!-hosted websites and gain full, unauthorized access to them.&lt;br /&gt;
  394. &lt;br /&gt;
  395. The Internet giant patched all the three bugs two weeks ago after Litchfield publicly released details and proof of concepts for the exploits on Bug Bounty HQ, a community for Bug Bounties website, established by Litchfield last month for fellow hunters to share their findings.&lt;br /&gt;
  396. &lt;br /&gt;
  397. &lt;b&gt;&#39;ON DEMAND PASSWORD&#39;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
  398. At recent SXSW session, Yahoo! launched &#39;on-demand passwords,&#39; which it says will eliminate the need for you to ever remember your email password. Whenever you need it, the company will send you a OTP (one time password) via SMS to your mobile phone.&lt;br /&gt;
  399. &lt;br /&gt;
  400. It&#39;s sort of two-factor authentication—without the first factor involved, as there is no need of any log-in password to enter by a user. In order to opt-in for the feature follow some simple steps:&lt;br /&gt;
  401. &lt;br /&gt;
  402. &amp;nbsp; &amp;nbsp; Sign in to your Yahoo email account.&lt;br /&gt;
  403. &amp;nbsp; &amp;nbsp; Click on your name at the top right corner to access your account information page.&lt;br /&gt;
  404. &amp;nbsp; &amp;nbsp; Choose Security in the sidebar.&lt;br /&gt;
  405. &amp;nbsp; &amp;nbsp; Click on the slider for on-demand passwords, in order to opt-in.&lt;br /&gt;
  406. &amp;nbsp; &amp;nbsp; Enter your phone number and Yahoo will send you a verification code.&lt;br /&gt;
  407. &amp;nbsp; &amp;nbsp; Enter the code.&lt;br /&gt;
  408. &lt;br /&gt;
  409. Now, next time whenever you will sign in into your email account, Yahoo will send a password via an SMS to your phone when you need it.&lt;br /&gt;
  410. &lt;br /&gt;
  411. Also, the end-to-end email encryption that Yahoo! promised will be available soon by the end of this year. The company gave its first demonstration of the locked down messaging system at SXSW session, and it is also delivering early source code for security researchers to analyze.&lt;br /&gt;
  412. &lt;br /&gt;
  413. &lt;a href=&quot;http://thehackernews.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  414. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1922875518995561797'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/1922875518995561797'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/yahoo-pays-24000-to-hacker-for-finding.html' title='Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-3546194007481822484</id><published>2015-05-03T21:24:00.000+07:00</published><updated>2015-05-03T21:24:00.345+07:00</updated><title type='text'>Play Store Android App Submissions</title><content type='html'>Google has changed the way it managed apps on the Google &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/play-store-android-app-submissions.html&quot; rel=&quot;nofollow&quot;&gt;Play Store&lt;/a&gt;. After years of depending on the automated app check process, the company just made some changes to its Play Store policies that will successfully weed out malicious and undesirable apps from &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/05/play-store-android-app-submissions.html&quot; rel=&quot;nofollow&quot;&gt;Google Play store&lt;/a&gt;.&lt;br /&gt;
  415. &lt;br /&gt;
  416. Google has introduced an update for developers and users that&#39;s sure to make some parents happy and some developers sad. The new features are —&lt;br /&gt;
  417. &lt;br /&gt;
  418. &amp;nbsp; &amp;nbsp; Better App Review Process&lt;br /&gt;
  419. &amp;nbsp; &amp;nbsp; Age-Based Rating System&lt;br /&gt;
  420. &lt;br /&gt;
  421. &lt;b&gt;BETTER APP REVIEW PROCESS&lt;/b&gt;&lt;br /&gt;
  422. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  423. The search engine giant announced on Tuesday that it has started employing humans to review apps before they go live on the Google Play Store, a move intended to &quot;better protect the community&quot; and &quot;improve the app catalog.&quot;&lt;br /&gt;
  424. &lt;br /&gt;
  425. The new approach would definitely affect app developers, as they&#39;ll have to wait for their apps to be approved by Google after they submit them to the Play Store. But, it would keep users safe from harmful malware or offensive content.&lt;br /&gt;
  426. &lt;br /&gt;
  427. &quot;This new process involves a team of experts who are responsible for identifying violations of our developer policies earlier in the app lifecycle,&quot; Google Play product manager Eunice Kim wrote in a blog post, and giving developers specific feedback on what they need to fix before their apps will be listed.&lt;br /&gt;
  428. &lt;br /&gt;
  429. According to the company, this new review process began &quot;several months ago&quot; and &quot;there has been no noticeable change for developers during the rollout.&quot; Google simply made an official announcement of the new policy on Tuesday.&lt;br /&gt;
  430. &lt;br /&gt;
  431. The newly updated review status page will give developers &quot;more insight into why apps were rejected or suspended&quot; and will allow them to easily fix the issue and resubmit the apps for minor policy violations.&lt;br /&gt;
  432. &lt;br /&gt;
  433. The company also assured developers that new features wouldn&#39;t slowed down the app submission process.&lt;br /&gt;
  434. &lt;br /&gt;
  435. &lt;i&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &quot;We value the rapid innovation and iteration that is unique to Google Play, and will continue to help developers get their products to market within a matter of hours after submission, rather than days or weeks,&quot; Kim wrote. &quot;In fact, there has been no noticeable change for developers during the roll-out.&quot;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
  436. &lt;br /&gt;
  437. &lt;b&gt;AGE-BASED RATINGS&lt;/b&gt;&lt;br /&gt;
  438. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;
  439. Besides the human review element, Google is also rolling out age ratings for apps, which will be based on data from the International Age Rating Coalition (IARC), Entertainment Software Rating Board (ESRB), Pan-European Game Information (PEGI) and more.&lt;br /&gt;
  440. &lt;br /&gt;
  441. &amp;nbsp; &amp;nbsp; &quot;We know that people in different countries have different ideas about what content is appropriate for kids, teens and adults,&quot; Google said. &quot;Today&#39;s announcement will help developers better label their apps for the right audience.&quot;&lt;br /&gt;
  442. &lt;br /&gt;
  443. Developers have to answer some special questionnaires about their apps – such as whether their app contains nudity or curse words – to help independent ratings organisations assign age-based ratings.In the United States, ratings will appear like – Everyone (E), Teen (T), Mature (M), etc.&lt;br /&gt;
  444. &lt;br /&gt;
  445. For now, Age-based rating feature is optional for app developers but will become mandatory for all new app and update submissions in May. &quot;Unrated&quot; apps &quot;may be blocked in certain territories or for specific users.&quot;&lt;br /&gt;
  446. &lt;br /&gt;
  447. &lt;a href=&quot;http://thehackernews.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  448. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3546194007481822484'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/3546194007481822484'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/05/play-store-android-app-submissions.html' title='Play Store Android App Submissions'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-6360180200826934133</id><published>2015-04-27T11:59:00.000+07:00</published><updated>2015-04-27T11:59:00.302+07:00</updated><title type='text'>How to use urlcrazy in kali linux </title><content type='html'>&lt;b&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/how-to-use-urlcrazy-in-kali-linux.htm&quot; rel=&quot;nofollow&quot;&gt;URLCrazy&lt;/a&gt;&lt;/b&gt; is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.&lt;br /&gt;
  449. &lt;br /&gt;
  450. &lt;b&gt;How to open&lt;/b&gt;&lt;br /&gt;
  451. &lt;i&gt;GUI Method&lt;/i&gt;&lt;br /&gt;
  452. Application → kali Linux → information gathering → DNS analysis → UrlCrazy&lt;br /&gt;
  453. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;br /&gt;
  454. &lt;br /&gt;
  455. Open Terminal type &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/how-to-use-urlcrazy-in-kali-linux.htm&quot;&gt;urlcrazy&lt;/a&gt; and hit enter.&lt;br /&gt;
  456. &lt;br /&gt;
  457. This command is used to scan a url after scanning we can see names of the characters on the wrong web, Spelling reversed etc kindly use this command and see yourself I cant show you whole image here.&lt;br /&gt;
  458. Syntax – urlcrazy domain&lt;br /&gt;
  459. Ex – urlcrazy www.google.com&lt;br /&gt;
  460. &lt;br /&gt;
  461. This command is used to check domain popularity.&lt;br /&gt;
  462. Syntax – urlcrazy –p domainname&lt;br /&gt;
  463. EX – urlcrazy –p www.mcdonalds.com&lt;br /&gt;
  464. &lt;br /&gt;
  465. This command is used to show invalid domain name&lt;br /&gt;
  466. Syntax – urlcrazy –I domainname&lt;br /&gt;
  467. EX – urlcrazy –I www.mcdonalds.com&lt;br /&gt;
  468. &lt;br /&gt;
  469. This command is used to do not resolve the DNS&lt;br /&gt;
  470. Syntax – urlcrazy –r domainname&lt;br /&gt;
  471. Ex- urlcrazy –r www.mcdonalds.com&lt;br /&gt;
  472. &lt;br /&gt;
  473. &lt;a href=&quot;http://knoxd3.blogspot.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  474. &lt;div&gt;
  475. &lt;br /&gt;&lt;/div&gt;
  476. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6360180200826934133'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/6360180200826934133'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/04/how-to-use-urlcrazy-in-kali-linux.html' title='How to use urlcrazy in kali linux '/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-5059972166699561397</id><published>2015-04-23T11:57:00.000+07:00</published><updated>2015-04-23T11:57:00.612+07:00</updated><title type='text'>Google Chrome Data Server Extension</title><content type='html'>Google want to save its users&amp;#39; bandwidth at home. The company has released a &amp;quot;&lt;i&gt;&lt;b&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/google-chrome-data-server-extension.html&quot; rel=&quot;nofollow&quot;&gt;Data Saver extension for Chrome&lt;/a&gt;&lt;/b&gt;&lt;/i&gt;,&amp;quot; bringing its data compression feature for its desktop users for the first time.&lt;br&gt;
  477. &lt;br&gt;
  478. While tethering to a mobile Hotspot for Internet connection for your laptop, this new &lt;span id=&quot;goog_981398722&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/google-chrome-data-server-extension.html&quot;&gt;Data Saver extension&lt;span id=&quot;goog_981398723&quot;&gt;&lt;/span&gt; &lt;/a&gt;for Chrome helps you reduce bandwidth usage by compressing the pages you visit over the Internet.&lt;br&gt;
  479. &lt;br&gt;
  480. If you are unaware of it, the data compression proxy service by Google is designed to save users&amp;#39; bandwidth, load pages faster, and increase security (by checking for malicious web pages) on your smartphones and tablets.&lt;br&gt;
  481. &lt;br&gt;
  482. &lt;b&gt;REDUCE AS MUCH AS 50% OF DATA USAGE &lt;/b&gt;&lt;br&gt;
  483. &lt;br&gt;
  484. Until now, the data compression service has been meant to benefit only mobile users, but the latest Data Saver Chrome Extension aims at helping desktop users by reducing their data usage by as much as 50 percent.&lt;br&gt;
  485. &lt;br&gt;
  486.    &lt;i&gt; &amp;quot;Reduces data usage [bandwidth] by using Google servers to optimize pages you visit,&amp;quot; the extension&amp;#39;s official description reads. &amp;quot;Browse more for less! When this [Data Saver] extension is enabled, Chrome will use Google servers to compress [web] pages you visit before downloading them.&amp;quot;&lt;/i&gt;&lt;br&gt;
  487. &lt;br&gt;
  488. When you visit a website, web server delivers the requested files to your browser. If enabled by the server, Gzip compresses web pages and style sheets before sending them over to the browser.&lt;br&gt;
  489. &lt;br&gt;
  490. Gzip compression drastically reduces transfer time since the files are much smaller.&lt;br&gt;
  491. &lt;br&gt;
  492. &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/google-chrome-data-server-extension.html&quot; rel=&quot;nofollow&quot;&gt;Data Saver Extension&lt;/a&gt; for Chrome checks if the website you visited has gzip enabled or not. If not, it compresses the requested web page via Google Data Compression proxy and makes it significantly smaller.&lt;br&gt;
  493. &lt;br&gt;
  494.     &amp;quot;&lt;i&gt;The proxy performs intelligent compression and minification of HTML, JavaScript and CSS resources, which removes unnecessary whitespace, comments, and other metadata which is not essential to the rendering of the page. These optimizations, combined with mandatory gzip compression for all resources, can yield substantial bandwidth savings for the client&lt;/i&gt;.&amp;quot; Google explains.&lt;br&gt;
  495. &lt;br&gt;
  496. &lt;b&gt;AVAILABLE FOR CHROME 41 AND HIGHER&lt;/b&gt;&lt;br&gt;
  497. &lt;br&gt;
  498. &lt;a href=&quot;https://tutorial-hemlet.blogspot.com/2015/04/google-chrome-data-server-extension.html#more&quot;&gt;Read more »&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5059972166699561397'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/5059972166699561397'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/04/google-chrome-data-server-extension.html' title='Google Chrome Data Server Extension'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-4701803441346095986.post-552610926847686202</id><published>2015-04-19T11:49:00.000+07:00</published><updated>2015-04-19T11:49:00.455+07:00</updated><title type='text'>GitHub hit by Massive DDoS Attack</title><content type='html'>Popular coding website used by programmers to collaborate on software development – was hit by a large-scale distributed denial of service (&lt;b&gt;DDoS&lt;/b&gt;) attack for more than 24 hours late Thursday night.&lt;br /&gt;
  499. &lt;br /&gt;
  500. It seems like when users from outside countries visit different websites on the Internet that serve advertisements and tracking code from Chinese Internet giant Baidu, the assailants on Chinese border quietly inject malicious JavaScript code into the pages of those websites.&lt;br /&gt;
  501. &lt;br /&gt;
  502. The code instructs browsers of visitors to those websites to rapidly connect to &lt;b&gt;&lt;a href=&quot;https://github.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;GitHub.com&lt;/a&gt;&lt;/b&gt; every two seconds in a way that visitors couldn&#39;t smell, creating &quot;an extremely large amount of traffic,&quot; according to a researcher who goes by the name A nthr@x.&lt;br /&gt;
  503. &lt;br /&gt;
  504. &lt;b&gt;&amp;nbsp; &amp;nbsp;&lt;i&gt; &quot;A certain device at the border of China’s inner network and the Internet has hijacked the HTTP connections went into China, replaced some JavaScript files from Baidu with malicious ones,&quot;&lt;/i&gt;&lt;/b&gt; A nthr@x wrote at Insight Labs.&lt;br /&gt;
  505. &amp;nbsp; &amp;nbsp; &quot;In other words, even people outside China are being weaponized to target things the Chinese government does not like, for example, freedom of speech.&quot;&lt;br /&gt;
  506. &lt;br /&gt;
  507. &lt;b&gt;The attack specifically targets two popular &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html&quot; rel=&quot;nofollow&quot;&gt;Github&lt;/a&gt; projects – GreatFire and CN-NYTimes – anti-censorship tools used to help Chinese citizens circumvent The Great Firewall Of China, the government&#39;s censorship of Internet access in China.&lt;/b&gt;&lt;br /&gt;
  508. &lt;br /&gt;
  509. GreatFire – A well-known group on &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html&quot; rel=&quot;nofollow&quot;&gt;Github&lt;/a&gt; that fights against Chinese government censorship of the Internet.&lt;br /&gt;
  510. &lt;br /&gt;
  511. CN-NYTimes – A group that hosts New York Times mirrors to allow Chinese citizens to access the news website, which is normally blocked in China.&lt;br /&gt;
  512. &lt;br /&gt;
  513. Since Baidu search engine is extremely popular, the attack results in the massive flood of traffic on the Github website which begun around 2 AM UTC on Friday and last for more than 24 hours.&lt;br /&gt;
  514. &lt;br /&gt;
  515. GitHub said yesterday that the flood of traffic, a continuous string of distributed denial-of-service attacks, caused irregular outages and that their admins have been working to mitigate the attack with periodic success.&lt;br /&gt;
  516. However, the most recent status on the site says the company has deployed new defenses.&lt;br /&gt;
  517. &lt;br /&gt;
  518. &lt;i&gt;&quot;We&#39;re aware that GitHub.com is intermittently unavailable for some users during the ongoing DDoS,&quot;&lt;/i&gt; GitHub said in a message posted at 1549 UTC Friday.&lt;br /&gt;
  519. &lt;br /&gt;
  520. &lt;i&gt;&quot;Restoring service for all users while deflecting attack traffic is our number one priority. We&#39;ve deployed our volumetric attack defenses against an extremely large amount of traffic. Performance is stabilizing,&quot; &lt;/i&gt;a message posted by &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html&quot; rel=&quot;nofollow&quot;&gt;Github&lt;/a&gt; at 15:04 UTC says.&lt;br /&gt;
  521. &lt;br /&gt;
  522. Later, the company noted, &lt;i&gt;&quot;We&#39;ve been under continuous DDoS attack for 24+ hours. The attack is evolving, and we&#39;re all hands on deck mitigating.&quot;&lt;/i&gt;&lt;br /&gt;
  523. &lt;br /&gt;
  524. The researcher analyzed the attack and dug out the injected JavaScript that looks like this (pastebin), once unscrambled.&lt;br /&gt;
  525. &lt;br /&gt;
  526. Chinese search engine giant has denied any involvement in the current &lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html&quot; rel=&quot;nofollow&quot;&gt;DDoS &lt;/a&gt;&lt;a href=&quot;http://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html&quot; rel=&quot;nofollow&quot;&gt;attack&lt;/a&gt;, saying that Baidu was not intentionally involved in any traffic redirection. &lt;i&gt;&quot;We&#39;ve notified other security organizations,&quot;&lt;/i&gt; the company said in a statement, &quot;and are working together to get to the bottom of this.&quot;&lt;br /&gt;
  527. &lt;br /&gt;
  528. &lt;a href=&quot;http://thehackernews.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Source&lt;/a&gt;&lt;br /&gt;
  529. &lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/552610926847686202'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/4701803441346095986/posts/default/552610926847686202'/><link rel='alternate' type='text/html' href='https://tutorial-hemlet.blogspot.com/2015/04/github-hit-by-massive-ddos-attack.html' title='GitHub hit by Massive DDoS Attack'/><author><name>admin</name><uri>http://www.blogger.com/profile/02033149918343548108</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry></feed>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid Atom 1.0" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//tutorial-hemlet.blogspot.com/atom.xml

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda