Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

31 March 2008

Only Linux which Cannot Be Pierced


MacBook Air becomes first product successfully is leaked hacker. a laptop Fujitsu using Windows Vista to become the next victim. But, laptop Vaio with operating system Linux still not able be pierced at hacking competition in having conference CanSecWest in Vancouver, Kanada is taking place 26-28 Marchs 2008.

competition had been started since day firstly conference, Wednesday (26/3). Sponsored provides present for the price of $US 20000 just for who of which able to conquer one of them is in first day. But none conference participant ready.

When present downwards its the half in second day with order which more clearance, Charlie Miller from Independent Security Evaluator successfully takes over Mac which applies system operation OSX 10.5.2. He pierces security and safety of the laptop through weakness of web browser Safari after two minutes works. Present $US 10000 is entitled to be walked off with it following its the laptop.

In last day, innings Macaulay, becoming second winner in similar contest last year, successfully conquers laptop Fujitsu with Windows Vista SP1. But, this of he do not do his own and assisted to be expert of VMware Alexander Sotirov and its the friend crane Colloway.

How to both piercing the security and safety system is not explained specifically because according to competition order of the secret has just may be expressed after exit patch or mend from each company. Macaulay only tell that weakness of Vista which utility blessing of existence of incompatibility of platform Java at the operating system.

"This thing is having effect also at Linux and Vista," says Macaulay. But, until last day simply do not an also successfully pierces Linux Ubuntu 710 at Vaio VGN-TZ37CN though has tried variously.

Some of 400 participants is reported to finds some weakness at operating system bases on open source. But, altogether cannot make exploitation code needed to conquers according to contest order.

"I hardly surpriseding there's nothing able do it," says Terri Forsloff, security and safety response manager of Tipping Point which menyeponsori this contest.

14 March 2008

Cracker Attacks 10 Thousand Pages Game Online

Thousands of yard in website online game become target of cracker attack. This illusory cracker sets eye on password to steal item in website for then is sold. Reported, there is more than 10 thousand pages website which has been infection.

This madness attack first time detected by researcher from McAfee. In calculation hour clock, this security and safety company traces is more than 10 thousand pages from hundreds of website which has been infection. This attack anticipated comes from China.

Like laid open by Craig Schmugar, researcher from McAfee, has not may simply categorically how much many number of website becoming this incursion victim. But, attack takes place so quickly and shows off automatically.

Anticipated, the crackers has applied search engine to identify website which is susceptible, then makes automatic tool to groan it with bad code.

Website which has been infection the in a flash of course seen normal alias is not seen marking has been infiltrated, so that the owner doesn't realize that there is danger of peeping. Though in fact, the crackers has added a few codes JavaScript.

If this code successfully infiltrates, hence will install a password theft program at victim computer that is visible like ordinary password in a number of game online.

10 March 2008

Mobile Instant Messenger

Possibly in this world each and everyone has handphone and has connection internet in house which many applied for various needs of communications either e-mail, chat or know newest news.

If when you always mobile and doesn't wish communications is broken with friends is it doesn't matter, you can exploit one of software chating which familiar in various types handphone.

Same as which I do the existing, you can apply Yehba as one of software to support you mobility. To get software freely download you please here.

26 February 2008

Samsung-built, Google Branded Android Phones


what your opinion about this handphone ? if according to my opinion, this very interesting and beautiful handphone to be owned.

complete information visited : engadget.com

Hacker Launchs Tool Attacker Google

Hacker group 'Cult of the Dead Cow', makes a free tool so called Goolag. Goolag is claimed to facilitates the hackers to launch its the action by exploiting website popular searching machine, Google.

Software open source enables hacker applies it to use Google in business is looking for the security and safety gap in website Internet. Exploiting of Google for hacker activity like this of course is reported often is done, but by the way of a real complicated.

Goolag is claimed easy to be applied, either by the hackers or expert of computer security which wish to use it. Its the technique bases on technology developed a researcher from institute Computer Sciences Corp, Johny Long.

Johny pass the time through years to check how Google can be used to know security and safety gap in website made an index to by it.

'Cult of Dead Cow' reported is hacker group that is enough legendaris in year end era of 90th. This hacker group have ever created a software so called 'Back Orifice' capable to pierce into computer using operating system Windows.

"I think this is not goods which really has just, but I think Goolag to make action of hacking via Google becomes easier," said comments from Robert Hansen, website computer security, Sechteory.com