W@T-A-H@CK

Blogger templates

Gentoo-based Sabayon Linux 8 available for download.

The Sabayon development team announced the availability of version 8 this week, acknowledging the challenge to allow “the bleeding edge and reliability to coexist.” Gentoo-based Sabayon touts its variety of packages and installations to choose from, and even though their FAQ mentions its appropriateness for new Linux users, it’s aimed at...
READMORE
 

How To Increase Your You Tube Streaming.

Do you feel that your youtube streaming is very slow even the connection speed is good? This might be the problem due to cache. Don’t worry we can increase that speed. Just follow the below steps that it, you are done. Step 1 Open any of your favorite video on youtube and right click on the video. Click on the Setting Tab as shown in...
READMORE
 

Microsoft Share Point Service.

Windows SharePoint Services is a versatile technology that organizations and business units of all sizes can use to increase the efficiency of business processes and improve team productivity. With tools for collaboration that help people stay connected across organizational and geographic boundaries, Windows SharePoint Services gives people...
READMORE
 

Finally Microsoft unveil Windows 8 on Feb 29.

BANGALORE, INDIA: It seems Microsoft was waiting for a perfect date to launch its upcoming operating system code named Windows 8. So, a consumer preview of the Windows 8 operating system has been scheduled on February 29 in Barcelona, Spain, at a mobile industry show. Also read: How to develop metro apps for Windows 8Inviting...
READMORE
 

Satellite phones vulnerable to eavesdropping.

Security researchers in Germany cracked two encryption standards used for protecting satellite phone signals, giving the ability to eavesdrop on calls over an entire continent. Researchers at Ruhr University Bochum in Germany cracked the encryption algorithms , known as GMR-1 and GMR-2, are standards used across satellite phone operators,...
READMORE
 

Man In The Middle (MITM) Attack.

Man in the middle attack is a type of attack in which the attacker intercept into the existing connection and breaks it in two different connections, one between the client and the attacker and the other between the attacker and the server. Now all the data would go through the attacker and he would be able to read, modify and insert data...
READMORE
 

University of Washington Vulnerable and Database Leaked by Hacker.

University of Washington Vulnerable and Database Leaked by Hacker A few days back, a Team INTRA member hacked into the University of Washington database and released much data. Today, N0B0DY and N0LIFE hacked into it again, releasing the most recent passwords on Pastebin. The root MySQL password was also released, as well as many...
READMORE