Welcome to my blog

Programmer Site GitHub Says It’s Victim of Service-Denial Attack

(Bloomberg) — GitHub Inc., a U.S. website designed for computer programmers, has been under attack since Thursday in what may be an attempt by China to disrupt efforts to circumvent that country’s censorship policies. The San Francisco-based service, which helps programmers and tech companies share ideas for software development, has experienced its biggest-ever distributed denial of service attack, the...

How to Secure Mobile Messaging App Features

When you send a text or MMS from your phone the normal way, you can’t control what happens to the information once it leaves your device. Wireless carriers are required to save messages for a certain length of time to assist authorities in criminal investigations. The recipient can save the message indefinitely, or send it to someone else without your knowledge or permission. That means those risqué photos, videos...

Advantage Dental of Redmond hacked; 151,000 patients affected

REDMOND — A company with more than 30 dental clinics serving low-income people in Oregon says it’s been hacked, and the intruders got Social Security numbers and other personal information, but not treatment or financial data. Redmond-based Advantage Dental is notifying patients and paying for an identity-theft monitoring service, The Bulletin newspaper of Bend reported Tuesday. An intruder breached its...

How to Upgrade Kali Linux to Latest Version (1.1.*)

Hello there, in this post I am going to write the upgrade procedures for Kali Linux to the latest version as I did in my lab environment. I would like to inform you that these steps may change according to your environment. In my case, I upgraded from 1.0.7 x64 version to 1.1.0 x64. Let us start; Backup the current apt source list file as follow. cp /etc/apt/sources.list /etc/apt/sources.list.backup Open the...

Data Recovery: Best Practices

OVERVIEW Computer service centers encounter failed hard drives. Data recovery can be arevenue source, but it must be wisely and carefully done. Well-intentioned but ill-informed efforts and practices can reduce or even ruin the prospects for successful recovery, and they can even expose the provider to legal liability. As in medicine, the main precept of data recovery is “first, do no harm.” The purpose of this...

« Previous Entries

Powered by WordPress | Designed by Elegant Themes