tag:blogger.com,1999:blog-53966205541000787402024-03-16T06:39:06.924+05:30| GeekyHarsha.in |Computers themselves, and software yet to be developed, will revolutionize the way we learn.Unknownnoreply@blogger.comBlogger694125tag:blogger.com,1999:blog-5396620554100078740.post-62008140731030425582017-10-07T15:01:00.002+05:302017-10-07T15:01:35.561+05:30Apple Investigating Reports Of ‘Serious Battery Failure’ On iPhone 8 PlusApple has admitted it’s looking into multiple reports of swelling batteries in its new flagship iPhone 8 Plus smartphones.<br />
<br />
Pictures on social media and growing reports from tech websites and mainstream news media have shown a number of the high end iPhone 8 Plus handsets that appeared to have split alongside the side, forcing the screen to come away from the main body of the phone.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/10/apple-investigating-reports-of-serious.html#"><img border="0" data-original-height="384" data-original-width="708" height="346" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjztbmtTW44MvaCVENvkDl6eMm49anbHXR3NJVNLhNDL5uBQ1XcjsjmFXtaM3YlMuJBU9eR8kTQZymITKdbwfq8Ql-Y1PzfyRyLBp-HzCapswRKdhYC3jH1wFuyknYFgMaWFZSjaYxpPA/s640/a-a-a-a-a-a-a-a.png" width="640" /></a></div>
<br />
The issue seems to appear during charging. The issue also appears to be global, with several similar faults being reported in Europe, Asia, and North America, suggesting that the fault may be more than just a single bad batch, although how many are original reports are authentic is still unknown.<br />
<br />
An Apple spokesperson said the company was currently looking into the issue, but the company has not elaborated further at the time of writing. Several devices have however, allegedly been collected by Apple partners and returned for investigation by the tech giant.<br />
<br />
<b>Fire in the disco?</b><br />
While reports of swelling batteries is a serious concern, there have been no reports of any of them catching fire. The chemical makeup of lithium-ion batteries and the energy they store can however make them a potential hazard with any kind of fault.<br />
<br />
<b>Didn’t this happen last year?</b><br />
Yes. Except the fault last year was with the Samsung GaIaxy Note 7, which Samsung were forced to recall after several incidents of the battery catching fire while charging. There were only around 100 confirmed incidents of the Note 7 actually catching fire.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-28506816460611410802017-10-01T21:44:00.002+05:302017-10-01T21:46:59.584+05:30Google Cloud acquires Bitium
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/10/google-cloud-acquires-cloud-identity.html#"><img border="0" data-original-height="491" data-original-width="738" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5H8JaDiuyCGzfwi-XzqV4x5T66V96-HjI8UkfkthOZeEYgcaW2AXqBEdHPg0XF2mCxLwYkZLCz_qpJRbe5qMHg13Q08wGITEN_bf4hgWmYDA9ZwvHXL4lJ-x2SBKOKiv2DLUxs8qmbQ/s640/gettyimages-480522145.jpg" width="640" /></a></div>
<br />
Google Cloud announced today that it <a href="https://www.blog.google/topics/google-cloud/welcome-google-cloud/" target="_blank">has acquired Bitium</a>, a company that focused on offering enterprise-grade identity management and access tools, such as single-sign on, for cloud-based applications. This will basically help Google better manage enterprise cloud customer implementation across an organization, including doing things like setting security levels and access policies for applications working across their Cloud and G Suite offerings.<br />
<br />
Bitium was founded in 2012, and targets both mid market and larger enterprise customers,. It’s been offering a single-stop solution for managing Google Apps, Office 365, social network, CRM, collaboration and marketing tools, while ensuring organizations remain compliant with security standards.<br />
<br />
The goal of Bitium is to simplify the process of administrating and using popular cloud-based applications so that users aren’t tempted to enter the nefarious realm of “shadow IT,” where they fall back to their own personal accounts across these services because the enterprise alternative is sub-standard or difficult to access.<br />
<br />
It sounds like Google wants to continue the work that Bitium was doing on its own, and extend it to additional application partners, while also keeping the platform open to other third-party identity management providers that integrate with enterprise customers on the one side, and Google Cloud and G Suite on the other.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-37558630048384351992017-09-30T22:28:00.000+05:302017-09-30T22:28:57.422+05:30WPS Office 2016 Personal Edition – The MS Office AlternativePreviously known as Kingsoft Office, WPS is a lightweight yet very practical and powerful office suite, which includes full word-processing, spreadsheet and presentation functionality.<br />
<br />
There are ads that can become annoying, but it’s a small price to pay when you consider the fact you’re not paying anything for the product.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/09/wps-office-2016-personal-edition-ms.html#"><img border="0" data-original-height="386" data-original-width="723" height="340" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5b0K1eZYvtXPxiiFW9-uVyi4r9WPrym2kA5WlpHFyURlbhqcpmz2E9hCraTjrY3oHfmWwksg4vftzSVZ7TEkBMla4Y1vCsdQLBP_dE0wTqEq8pdhNIOa3X4OZz8r4mgcPzG04zWgAQw/s640/wps_office_free_3.png" width="640" /></a></div>
<br />
<br />
<br />
And don’t let that fool you into thinking that WPS Office 2016 isn’t fully formed or that it’s some half functional basic suite. There’s some real depth behind the interface and it works.<br />
<br />
It comes bundled with three applications:<br />
<br />
WPS Writer (more than capable word processor)<br />
WPS Spreadsheets (a very good spreadsheet feature)<br />
WPS Presentations (which is pretty much PowerPoint)<br />
All three work very well, and if you’ve used any recent version of MS Office, or indeed any other Office suite, you should find yourself instantly at home. All three of the above also use the same style of interface as MS Office and all the usual tools and options are placed in a similar fashion and have intuitive positioning.<br />
<br />
<b>Works with MS Office files</b><br />
Compatibility with MS Office document formats comes as standard, and WPS does a good job opening and converting them without formatting errors such as suddenly finding paragraphs with five lines between them or spreadsheet calculations with formulas that have stopped working.<br />
<br />
Each program opens and saves all Microsoft Office document formats (doc, docx, xls, xlsx etc), as well as HTML, RTF, XML, even PDF.<br />
<br />
<b>Language support</b><br />
WPS Office 2016 Personal Edition currently supports English, French, German, Spanish, Portuguese, Russian and Polish, and has all the standard features you could hope and want for from your office suite, including spell check and word-count feature.<br />
<br />
<b>Fuel efficient</b><br />
WPS is also incredibly easy on systems and its low requirements mean it can be installed on even old PCs running Windows.<br />
<br />
<br />
WPS also comes with 1 GB of free cloud storage. It isn’t huge admittedly, but it’s there, it’s free, and it’s designed to store your documents and spreadsheets rather than 10 years’ worth of photos and videos.<br />
<br />
There are also iOS and Android versions of the software available which is a really nice touch. As well as this, there’s also a Linux version available.<br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-48904091981222695872017-09-30T22:18:00.001+05:302017-09-30T22:18:45.064+05:30This Bluetooth Vulnerability A Open Door to Hacking! This time, it’s a Bluetooth flaw that lets outsiders access your phone and any other connected devices.<br />
<br />
New BlueBorne attack can access computers, phones, and IoT devices, in seconds.<br />
<br />
Armis researchers discovered the potential attack portal that can affect everything from a phone to an IoT connected device – hacking them in as little as 10 seconds. Using BlueBorne, a hacker can not only conduct remote functions, but can also use the affected device to launch a variety of other forms of attacks.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/09/this-bluetooth-vulnerability-open-door.html#"><img border="0" data-original-height="600" data-original-width="1280" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBfJsKw4Wo__zbGUXukIlW_NmnlqxYiUM6HdVWh5dmx6DvWu9AGEVkR3jIOr6MfnMRcia6Q8d-6rvHWSLVBFaHEeJeTJAZlz-z79ujxRQj46KNsM-3El7u1gKfvKeDGeDhm_ECp3BwkA/s640/hack-bluetooth-part-1-terms-technologies-security.1280x600.jpg" width="640" /></a></div>
<br />
<b>No download required</b><br />
Even though it doesn’t require any effort on the part of the victim – meaning there’s no need to get you to download the malicious software or grab an infected app for this to work to a hacker’s benefit – it does let the user know when someone is utilizing the device. Unfortunately, once again, Android phones seem to be the hardest hit. Apple phones and tablets won’t work this way, nor will Windows phones. Google is reportedly issuing a patch very soon to remedy the situation, so be on the lookout for this important update and install it.<br />
<br />
<b>Shortsighted</b><br />
The crisis behind BlueBorne isn’t the creativity of the cybercriminals, but rather the complete lack of foresight on the part of developers to figure out how someone might try to work around the security and use it for their gain. The industry continues to be shocked by the latest threats, as though no one in the room had ever analyzed a new software, network, or piece of technology and wondered how someone might break in. As the internet of things has taught us all too well, as a whole we have to start looking for the problems before releasing the innovation to consumers.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-89859693637146916362017-05-22T09:26:00.002+05:302017-05-22T09:42:04.856+05:30'Athena' CIA malware plants Gremlins’ on Microsoft machines – WikiLeaksThe latest in WikiLeaks’ series of #Vault7 leaks was released Friday detailing malware that provides remote beacon and loader capabilities on target computers using several Microsoft Windows operating systems.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/athena-cia-malware-plants-gremlins-on.html#"><img border="0" height="257" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZL1Ws-lIqX2qKySuuCVU6Sgh8WyXGAVo36Sd_ETjH55LJEoXoVpIRC8U3aU-yyI5b8hvSatknVJe78QRPttsR-haC4JKJw2fhmm8tyavvH0tngm9mGXIgm_mZR6qPny17uGklkVopPA/s640/athena+snap.PNG" width="640" /></a></div>
<br />
‘Athena’ is the latest codename for the release which consists of five documents.<br />
<br />
In the <a href="https://wikileaks.org/vault7/document/Athena-v1_0-UserGuide/page-7/#pagination" target="_blank">user guide</a>, the operating systems which can be targeted are: Windows XP Pro SP3 32-bit, Windows 7 32-bit/64-bit, Windows 8.1 32-bit/64-bit, Windows 2008 Enterprise Server, Windows 2012 Server, and Windows 10.<br />
<br />
Once installed on a target computer, Athena will use a listening post to receive beacons from the operator, allowing it to signal and trigger additional malware payloads undetected on the target computer.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/athena-cia-malware-plants-gremlins-on.html#"><img border="0" height="388" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1LPER_loZ-jJDQ3MKM38W4pEfWcSr-vvtTfnN5saH4RFDmwiHsleHcKy8IPeYUnatZl1J7b6yAVD_i2TbGxrKfyKA2RvUlzV5cpNnZdTy2WNUp2Cw0uzoX3w8-Yu9d6Llm4rV9UeD_g/s640/athena.PNG" width="640" /></a></div>
<br />
Athena “hijacks” the DNSCACHE, a temporary database maintained by the operating system to record internet traffic on the computer, to hide its presence, according to a document contained in the leak.<br />
<br />
The command module for Athena will only load during a signal, before being destroyed when completed.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/athena-cia-malware-plants-gremlins-on.html#"><img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOFs504iPDy-Y1CYYij9Y11PTSShFxTWgaDIPcwa4na6GwXs8uaaDzgiahso2-ZDrvWpWthsENuSO30KSpJA5hdcx_Xwxffe_xkRE030_YLZPlhOQpjFhnQSPu_WLGRnZ9aCYdpLN3OQ/s640/DSC_3766-868x580.jpg" width="640" /></a></div>
<br />
The CIA cooperated with the private cybersecurity firm Siege Technologies to develop the Athena malware.<br />
<br />
"I feel more comfortable working on electronic warfare… It’s a little different than bombs and nuclear weapons -- that’s a morally complex field to be in. Now instead of bombing things and having collateral damage, you can really reduce civilian casualties, which is a win for everybody," Jason Syversen, the founder of Siege Technologies, wrote in an email.<br />
<br />
The release is the latest in WikiLeaks series of leaks, allegedly from the CIA, known as #Vault7. Previous releases showed hacking techniques used to weaponize mobile phones, conduct surveillance via Smart TVs and load and execute malware on a target machine.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="354" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6dyRVVDyy4Xsv4UITsgztr4V7KaBWmtLq_c_XYQGHaynpmA6V1leKO-E-x0mmJQDZd4AKMHvWr9PdHI7EOfsM28fefCMggW48PpKw0rG_w4q4BxMueakmAnLQpMoU95I6qrrzkpF5Eg/s640/athena+evidence.jpg" width="640" /></div>
<br />
<div style="text-align: center;">
<i><span style="font-size: xx-medium;">A screenshot contained in the leak shows evidence of a Dell machine being used by a user named 'Justin.'</span></i></div>
<div style="text-align: center;">
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-30412594519895829092017-05-20T07:55:00.001+05:302017-05-20T07:59:03.878+05:30Is Blue Whale ‘Suicide Game’ A Hoax?The truth behind the headline-grabbing app?<br />
<br />
An app that’s making news headlines around the world for allegedly targeting children and young people has left quite a few parents shaking in fear, while authorities are still trying to connect even the slightest of dots. Blue Whale, created by Russian programmer Philipp Budeikin, supposedly lures young victims into self-harm and suicide, with a variety of humiliating, painful, and even violent steps along the way.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/is-blue-whale-suicide-game-hoax.html#"><img border="0" height="350" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWosZABbXDxM9JPoeq_3EyKxGkajF-9b4RjzBQPM6iAeAZ3klIzkgixptDkTNekl2PcrpVezirtg4m97AOdSiVeM7a32eSLQthLv4cluBK4K65bbnQDoyj6XvX5LTYUosOeJeRM8ohWw/s640/HowDoesABlueWhaleMove_whale.jpg" width="640" /></a></div>
<br />
Fact or fiction? :<br />
It reads like something straight out of a Hollywood cyberthriller, and it’s easy to see why some might dismiss it as nothing more than urban legend. At the same time, it’s exactly the kind of generational rumor that can strike fear in the public: much like the long-told stories of Halloween candy filled with razor blades, although there has never been a single reported instance of the event.<br />
<br />
Parents warned :<br />
Schools across the US are warning parents about the app nonetheless, and Russian authorities are taking it very seriously – they’ve arrested Budeikin for his supposed role in multiple suicides, although the exact number is still being investigated – and different websites tell different stories on the numbers of young people who’ve already been Blue Whale’s victim. Some numbers have been speculated to be in the hundreds, while other sites insist there hasn’t been a single suicide linked to the game.<br />
<br />
Tasks become dark :<br />
Blue Whale reportedly assigns the “players” different tasks depending on the level they reach in the game. Some of the early tasks have included nothing more than filming themselves singing a silly song, while later on as the “game” becomes darker and darker, tasks have included committing and filming acts of violence against animals, cutting themselves, and ultimately, committing suicide.<br />
<br />
Key takeaways :<br />
There are a number of key takeaways for parents where this app and others like it are concerned. First, whether or not all of the rumors surrounding Blue Whale are accurate, there is no question that the creator has been charged. Also, there are valid concerns of copycat behaviors based on the headlines about this app. Finally, one of the functions of the app was reportedly to root around in the player’s phone and steal incriminating photos or messages, then extort the desired behaviors out of the victim. There have been a number of widely reported and verified incidents in which young people have been victimized by this type of tactic, and the definition of “sextortion” usually involves this kind of approach. Blue Whale may be more rumor than truth, but there are genuinely hundreds of methods a predator can use to contact a young victim and lead to sextortion.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-13714998780494896202017-05-20T07:35:00.002+05:302017-05-20T07:46:16.141+05:30Things you need to know about Wannacry/ WannaCrypt RansomwareIt has been reported that a new ransomware named as "Wannacry" is spreading widely. Wannacry encrypts the files on infected Windows systems. This ransomware spreads by using a vulnerability in implementations of Server Message Block (SMB) in Windows systems. This exploit is named as ETERNALBLUE.<br />
<br />
The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN. The ransomware also spreads through malicious attachments to emails.<br />
<br />
In order to prevent infection, users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010.<br />
<br />
<a href="https://technet.microsoft.com/library/security/MS17-010">https://technet.microsoft.com/library/security/MS17-010</a><br />
<br />
After infecting, this Wannacry ransomware displays following screen on infected system:<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/things-you-need-to-know-about-wannacry.html#"><img border="0" height="486" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrKrJd_cq9d1ZpkSZDMYfQZ1Ry5P-wn6ZlLWmmfnEHsbReQn2wayNYmD6Wx4AEWLiRYKh8wSVW2VYl50m8VnIr5yUx8foX6G_MFkSz8XNNxuE4E9poilK9SD7MMLxxwxDcXtk3xzhWCw/s640/wannacry1.jpg" width="640" /></a></div>
Source: Symantec<br />
<br />
It also drops a file named !Please Read Me!.txt which contains the text explaining what has happened and how to pay the ransom.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/05/things-you-need-to-know-about-wannacry.html#"><img border="0" height="376" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7XXk2HqOaSwlakgKYN0xG1tpcegFN8f6NhYKxp_YyoQR2VcvCi1bjcCj6jjWfJtM-Navi5QC-5AVyCajve67yXcl7XuIqjf4nERACAiKS3EhL1RDQNcsRN_jRLG9cCUG2XT0ez8EEPA/s640/wannacry2.jpg" width="640" /></a></div>
<br />
Source: Symantec<br />
<br />
WannaCry encrypts files with the following extensions, appending .WCRY to the end of the file name:<br />
.lay6.sqlite3.sqlitedb.accdb.java.class.mpeg.djvu.tiff.backup.vmdk.sldm.sldx.potm.potx.ppam.ppsx.ppsm.pptm.xltm.xltx.xlsb.xlsm.dotx.dotm.docm.docb.jpeg.onetoc2.vsdx.pptx.xlsx.docx<br />
<br />
The file extensions that the malware is targeting contain certain clusters of formats including:<br />
<br />
Commonly used office file extensions (.ppt, .doc, .docx, .xlsx, .sxi).Less common and nation-specific office formats (.sxw, .odt, .hwp).Archives, media files (.zip, .rar, .tar, .bz2, .mp4, .mkv)Emails and email databases (.eml, .msg, .ost, .pst, .edb).Database files (.sql, .accdb, .mdb, .dbf, .odb, .myd).Developers' sourcecode and project files (.php, .java, .cpp, .pas, .asm).Encryption keys and certificates (.key, .pfx, .pem, .p12, .csr, .gpg, .aes).Graphic designers, artists and photographers files (.vsd, .odg, .raw, .nef, .svg, .psd).Virtual machine files (.vmx, .vmdk, .vdi).<br />
<br />
Indicators of compromise:<br />
Ransomware is writing itself into a random character folder in the 'ProgramData' folder with the file name of "tasksche.exe" or in 'C:\Windows\' folder with the file-name "mssecsvc.exe" and "tasksche.exe".<br />
<br />
Ransomware is granting full access to all files by using the command:<br />
Icacls . /grant Everyone:F /T /C /Q<br />
<br />
Using a batch script for operations:<br />
176641494574290.bat<br />
<br />
hashes for WANNACRY ransomware:<br />
5bef35496fcbdbe841c82f4d1ab8b7c2<br />
775a0631fb8229b2aa3d7621427085ad<br />
7bf2b57f2a205768755c07f238fb32cc<br />
7f7ccaa16fb15eb1c7399d422f8363e8<br />
8495400f199ac77853c53b5a3f278f3e<br />
84c82835a5d21bbcf75a61706d8ab549<br />
86721e64ffbd69aa6944b9672bcabb6d<br />
8dd63adb68ef053e044a5a2f46e0d2cd<br />
b0ad5902366f860f85b892867e5b1e87<br />
d6114ba5f10ad67a4131ab72531f02da<br />
db349b97c37d22f5ea1d1841e3c89eb4<br />
e372d07207b4da75b3434584cd9f3450<br />
f529f4556a5126bba499c26d67892240<br />
use endpoint protection/antivirus solutions to detect these files and remove the same<br />
<br />
Network Connections<br />
The malware use TOR hidden services for command and control. The list of .onion domains inside is as following:<br />
<br />
gx7ekbenv2riucmf.onion57g7spgrzlojinas.onionXxlvbrloxvriy2c5.onion76jdd2ir2embyv47.onioncwwnhwhlz52maqm7.onionsqjolphimrr7jqw6.onion<br />
<br />
Note: For update on latest Indicators of Compromises, please see references to security vendors given in references section<br />
<br />
<br />
Specific Countermeasures to prevent Wannacry/WannaCrypt Ransomware:<br />
Users and administrators are advised to take the following preventive measures to protect their computer networks from ransomware infection/ attacks:<br />
In order to prevent infection users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010<br />
<br />
Microsoft Patch for Unsupported Versions such as Windows XP,Vista,Server 2003, Server 2008 etc. http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598<br />
<br />
To prevent data loss Users & Organisations are advised to take backup of Critical Data<br />
<br />
Block SMB ports on Enterprise Edge/perimeter network devices [UDP 137, 138 and TCP 139, 445] or Disable SMBv1. <a href="https://support.microsoft.com/en-us/help/2696547">https://support.microsoft.com/en-us/help/2696547</a><br />
<br />
Apply following signatures/rules at IDS/IPS<br />
<br />
alert tcp $HOME_NET 445 -> any any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response"; flow:from_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:isset,ETPRO.ETERNALBLUE; classtype:trojan-activity; sid:2024218; rev:2;)<br />
<br />
(<a href="http://docs.emergingthreats.net/bin/view/Main/2024218">http://docs.emergingthreats.net/bin/view/Main/2024218</a>)<br />
<br />
alert smb any any -> $HOME_NET any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set)"; flow:to_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 18 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:set,ETPRO.ETERNALBLUE; flowbits:noalert; classtype:trojan-activity; sid:2024220; rev:1;)<br />
<br />
alert smb $HOME_NET any -> any any (msg:"ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response"; flow:from_server,established; content:"|00 00 00 31 ff|SMB|2b 00 00 00 00 98 07 c0|"; depth:16; fast_pattern; content:"|4a 6c 4a 6d 49 68 43 6c 42 73 72 00|"; distance:0; flowbits:isset,ETPRO.ETERNALBLUE; classtype:trojan-activity; sid:2024218; rev:1;)<br />
<br />
Yara:<br />
rule wannacry_1 : ransom<br />
{<br />
meta:<br />
author = "Joshua Cannell"<br />
description = "WannaCry Ransomware strings"<br />
weight = 100<br />
date = "2017-05-12"<br />
<br />
Strings:<br />
$s1 = "Ooops, your files have been encrypted!" wide ascii nocase<br />
$s2 = "Wanna Decryptor" wide ascii nocase<br />
$s3 = ".wcry" wide ascii nocase<br />
$s4 = "WANNACRY" wide ascii nocase<br />
$s5 = "WANACRY!" wide ascii nocase<br />
$s7 = "icacls . /grant Everyone:F /T /C /Q" wide ascii nocase<br />
<br />
Condition:<br />
any of them<br />
}<br />
rule wannacry_2{<br />
meta:<br />
author = "Harold Ogden"<br />
description = "WannaCry Ransomware Strings"<br />
date = "2017-05-12"<br />
weight = 100<br />
strings:<br />
$string1 = "msg/m_bulgarian.wnry"<br />
$string2 = "msg/m_chinese (simplified).wnry"<br />
$string3 = "msg/m_chinese (traditional).wnry"<br />
$string4 = "msg/m_croatian.wnry"<br />
$string5 = "msg/m_czech.wnry"<br />
$string6 = "msg/m_danish.wnry"<br />
$string7 = "msg/m_dutch.wnry"<br />
$string8 = "msg/m_english.wnry"<br />
$string9 = "msg/m_filipino.wnry"<br />
$string10 = "msg/m_finnish.wnry"<br />
$string11 = "msg/m_french.wnry"<br />
$string12 = "msg/m_german.wnry"<br />
$string13 = "msg/m_greek.wnry"<br />
$string14 = "msg/m_indonesian.wnry"<br />
$string15 = "msg/m_italian.wnry"<br />
$string16 = "msg/m_japanese.wnry"<br />
$string17 = "msg/m_korean.wnry"<br />
$string18 = "msg/m_latvian.wnry"<br />
$string19 = "msg/m_norwegian.wnry"<br />
$string20 = "msg/m_polish.wnry"<br />
$string21 = "msg/m_portuguese.wnry"<br />
$string22 = "msg/m_romanian.wnry"<br />
$string23 = "msg/m_russian.wnry"<br />
$string24 = "msg/m_slovak.wnry"<br />
$string25 = "msg/m_spanish.wnry"<br />
$string26 = "msg/m_swedish.wnry"<br />
$string27 = "msg/m_turkish.wnry"<br />
$string28 = "msg/m_vietnamese.wnry"<br />
condition:<br />
any of ($string*)<br />
}<br />
<br />
Best practices to prevent ransomware attacks:<br />
Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.Establish a Sender Policy Framework (SPF),Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization's website directly through browserRestrict execution of powershell /WSCRIPT in enterprise environment Ensure installation and use of the latest version (currently v5.0) of PowerShell, with enhanced logging enabled. script block logging, and transcription enabled. Send the associated logs to a centralized log repository for monitoring and analysis.Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%, %PROGRAMDATA% and %TEMP% paths. Ransomware sample drops and executes generally from these locations. Enforce application whitelisting on all endpoint workstations.Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable antivirus solution.Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.Maintain updated Antivirus software on all systemsConsider installing Enhanced Mitigation Experience Toolkit, or similar host-level anti-exploitation tools.Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsfRegularly check the contents of backup files of databases for any unauthorized encrypted contents of data records or external elements, (backdoors /malicious scripts.)Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches.Follow safe practices when browsing the web. Ensure the web browsers are secured enough with appropriate content controls.Network segmentation and segregation into security zones - help protect sensitive information and critical services. Separate administrative network from business processes with physical controls and Virtual Local Area Networks.Disable remote Desktop Connections, employ least-privileged accounts.Ensure integrity of the codes /scripts being used in database, authentication and sensitive systems, Check regularly for the integrity of the information stored in the databases.Restrict users' abilities (permissions) to install and run unwanted software applications.Enable personal firewalls on workstations.Implement strict External Device (USB drive) usage policy.Employ data-at-rest and data-in-transit encryption.Carry out vulnerability Assessment and Penetration Testing (VAPT) and information security audit of critical networks/systems, especially database servers from CERT-IN empaneled auditors. Repeat audits at regular intervals.Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report such instances of fraud to CERT-In and Law Enforcement agencies<br />
<br />
Generic Prevention Tools:<br />
<br />
Tool (NoMoreCry) to prevent Wannacry Ransomware by CCN-CERT:<br />
<a href="https://loreto.ccn-cert.cni.es/index.php/s/tYxMah1T7x7FhND?path=CCN-CERT%20NoMoreCry%20">https://loreto.ccn-cert.cni.es/index.php/s/tYxMah1T7x7FhND?path=CCN-CERT%20NoMoreCry%20</a><br />
<br />
Tool Sophos: Hitman.Pro : https://www.hitmanpro.com/en-us/surfright/alert.aspx<br />
Bitdefender Anti-Crypto Vaccine and Anti-Ransomware (discontinued) : <a href="https://labs.bitdefender.com/2016/03/combination-crypto-ransomware-vaccine-released/">https://labs.bitdefender.com/2016/03/combination-crypto-ransomware-vaccine-released/</a><br />
<br />
Malwarebytes Anti-Ransomware(formally Crypto Monitor) : <a href="https://blog.malwarebytes.com/malwarebytes-news/2016/01/introducing-the-malwarebytes-anti-ransomware-beta/">https://blog.malwarebytes.com/malwarebytes-news/2016/01/introducing-the-malwarebytes-anti-ransomware-beta/</a><br />
<br />
Trendmicro Ransomware Screen Unlocker tool: <a href="https://esupport.trendmicro.com/en-us/home/pages/technical-support/1105975.aspx">https://esupport.trendmicro.com/en-us/home/pages/technical-support/1105975.aspx</a><br />
<br />
Microsoft Enhanced mitigation and experience toolkit(EMET) : <a href="https://www.microsoft.com/en-us/download/details.aspx?id=50766">https://www.microsoft.com/en-us/download/details.aspx?id=50766</a><br />
<br />
References<br />
<ul style="box-sizing: border-box; color: #333333; font-family: verdana, Arial, sans-serif; font-size: 14px; list-style: none; margin-bottom: 10px; margin-top: 0px; padding-bottom: 10px; text-align: justify; word-break: normal;">
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://technet.microsoft.com/library/security/MS17-010" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://technet.microsoft.com/library/security/MS17-010</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://www.us-cert.gov/ncas/current-activity/2017/05/12/Multiple-Ransomware-Infections-Reported" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://www.us-cert.gov/ncas/current-activity/2017/05/12/Multiple-Ransomware-Infections-Reported</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="http://blog.talosintelligence.com/2017/05/wannacry.html" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">http://blog.talosintelligence.com/2017/05/wannacry.html</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Ransom_Wana.A" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Ransom_Wana.A</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="https://www.us-cert.gov/ncas/alerts/TA17-132A" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">https://www.us-cert.gov/ncas/alerts/TA17-132A</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="http://blogs.quickheal.com/ms17-010-windows-smb-server-exploitation-leads-ransomware-outbreak/" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">http://blogs.quickheal.com/ms17-010-windows-smb-server-exploitation-leads-ransomware-outbreak/</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="http://blogs.quickheal.com/wannacry-ransomware-creating-havoc-worldwide-exploiting-patched-windows-exploit/" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">http://blogs.quickheal.com/wannacry-ransomware-creating-havoc-worldwide-exploiting-patched-windows-exploit/</a></li>
<li style="box-sizing: border-box; float: left; list-style: disc; margin: 0px; padding: 3px 0px; width: 1100px; word-break: normal;"><a href="http://www.cyberswachhtakendra.gov.in/documents/WannacryWannaCryptRansomware_CRITICAL_ALERT_CERT-In.pdf" style="box-sizing: border-box; color: #1356a4; text-decoration-line: none; word-break: normal;" target="_blank">Wannacry/WannaCrypt Ransomware Presentation of CERT-In</a></li>
</ul>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-55020712476562511142017-02-07T13:09:00.000+05:302017-02-07T13:13:48.055+05:30Cisco Annual Cybersecurity breaches ReportData breaches have been setting new records almost every year for the past decade, and as such, the numbers of compromised consumer records floating around the dark web is astronomical. But while companies of every size and in every industry work to clean up the aftermath of a breach or hacking event, one source has uncovered just how staggering this cost really is.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/02/cisco-annual-cybersecurity-breaches.html#"><img border="0" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEmvJGSoWWghVQZ58lSdxumKIcOqu-F2VwzBhipivvGJJxhqMkUORDp9SfilATshTNCwikkZyh7G71eFQI6bqSjhsvIZvU71OoSR6IUQ2BNQ7YjwFk0WY43frNR4ksKQ7TpE63UjDPaw/s640/data-breach.jpg" width="640" /></a></div>
<br />
<br />
The latest Cisco Annual Cybersecurity Report shows that “more than a third of organizations that experienced a data breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent… after attacks, 90 percent of these organizations are improving threat defense technologies and processes.”<br />
<br />
<br />
Sadly, it gets worse. <a href="https://betanews.com/2017/02/01/true-cost-data-breaches/" target="_blank">According to BetaNews.com</a>, “The effect of breaches on organizations is substantial, 22 percent of breached organizations say they lost customers – 40 percent of them losing more than 20 percent of their customer base. In addition 29 percent lost revenue, with 38 percent of that group losing more than 20 percent. Lost business opportunities were cited by 23 percent, with 42 percent of them losing more than 20 percent.”<br />
<br />
So what’s behind all these breach events? A lot of factors. After polling more than 3,000 chief security officers from 13 different countries, Cisco determined that budget issues, lack of integrated system compatibility, and a workforce that had not been trained in even the most basic cybersecurity measures were some of the biggest corporate threats. They also cited the complex nature of trying to navigate their own companies’ IT departments, along with a bizarre mash-up of antivirus and anti-malware software within even the same company. After all, it’s not possible to maintain data security when every workstation is running a different security protocol.<br />
<br />
Of course, it doesn’t help that hackers are just as good at their jobs as some companies are ineffective. With new innovations every day and new tactics for stealing large amounts of corporate data, there doesn’t appear to be an end in sight where data breaches are concerned. That obviously doesn’t mean anyone should throw in the towel, but it certainly means that no company or industry is safe, or has a handle on how to block every threat.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-50513793780021895492017-02-04T15:17:00.000+05:302017-02-04T18:44:04.394+05:30Former Mozilla engineer makes controversial antivirus claim.
Anyone who’s been around a computer for a while has probably been beaten over the head with the long-standing mantra to install and update their antivirus software regularly. AV software is an industry all on its own, and it’s long been seen as the safety net that keeps all our data from falling into the abyss of hackers and scammers. But a new report from a former Mozilla developer sheds a little light on things: not only is it supposedly not as important as the tech world would have us believe, in some cases it may be leaving us vulnerable rather than protecting us.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2017/02/former-mozilla-engineer-makes.html#"><img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdufoj6am6bwX881pxXnRSL86YBnBa8FnN35P4LRIsds2jHHn1I-izkwGIxuAaPAho6WJs5KJTFPP9yZmJ5MHguzvJ5t2mB1LQczICCPKvyabcJ20P5sb2mxDWiBYhWpIpHGGl7Z91OA/s640/Antivirus-Shield.png" width="640" /></a></div>
<br />
Robert O’Callahan wrote a blog post late last week and stated that those who run an up-to-date newer Windows OS have no need of any third-party AV installs, and that opting for one of those titles could actually be putting flawed software on your machine.<br />
<br />
“At best, there is negligible evidence that major non-MS AV products give a net improvement in security. More likely, they hurt security significantly; for example, see bugs in AV products listed in Google’s Project Zero. These bugs indicate that not only do these products open many attack vectors, but in general their developers do not follow standard security practices. (Microsoft, on the other hand, is generally competent.)”<br />
<br />
O’Callahan goes on to cite a Twitter convo that highlighted a genuine problem: the people who are creating our mechanisms – like operating systems and web browsers – are actually hindered by the often-faulty code in antivirus software. When a third-party title attempts to block what it perceives as a threat, the browser developer never gets wind of it and therefore cannot strengthen the browser’s security capabilities.<br />
<br />
The author’s recommendation? Run a Windows machine and keep its updates installed, then rely on Microsoft’s inherent security measures. You’ll be more likely to get your protection from the source rather than from what an outside company with a product-pushing agenda perceives to be harmful. That’s all well and good if you run a later Windows version or if you trust Microsoft not to meddle with your privacy, though, and that’s not something that critics of the Windows 10 forced rollout may be willing to do.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-20390514141964207032016-12-13T20:46:00.002+05:302016-12-13T20:46:37.703+05:30Ubuntu Budgie - Ultra Minimal version of Ubuntu Linux distribution <i>The Ubuntu Budgie developers are working on an Ultra Minimal version of their Linux distribution that’ll consume less than 220MB RAM. This version is expected to ship without any standard applications or a RAM-intensive desktop environment.</i><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgvFVi-Q2xYjDNQ0MRlbx162Ka-E2e7VibODdHpVNZU5pqeJu4T4DnChdTKBzxuyVTxET1L7ZnK8kSS3XnE9o-f_4n-0VRSdZ6RbteGLZyJ6RGO7tgb-4taY-4rBL0SPAil6-jdb8fpw/s1600/ubuntu-budgie-ultra-minimal-640x360.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgvFVi-Q2xYjDNQ0MRlbx162Ka-E2e7VibODdHpVNZU5pqeJu4T4DnChdTKBzxuyVTxET1L7ZnK8kSS3XnE9o-f_4n-0VRSdZ6RbteGLZyJ6RGO7tgb-4taY-4rBL0SPAil6-jdb8fpw/s640/ubuntu-budgie-ultra-minimal-640x360.jpg" width="640" /></a></div>
<br />
Back in November, Many sources have mentioned that Ubuntu Technical Board’s decision that granted budgie-remix an official Ubuntu flavor status. It was also revealed that 17.04 will be the first release of the distro under a new name Ubuntu Budgie.<br />
<i> </i><br />
Now, the Ubuntu Budgie developers have teased something that’ll surely get you excited. A recent tweet has shown an “ultra minimal” version of Ubuntu Budgie that utilizes just “220MB or less of RAM.”<br /><br />While the RAM usage for 64-bit version will be 220MB, the 32-bit release will consume something under 200MB.<br />
<i></i><br />
<i>You can follow the updates on Twitter on <a href="https://twitter.com/UbuntuBudgie">https://twitter.com/UbuntuBudgie</a></i><br />
<br />
<i> </i>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-68032841249399961332016-12-13T20:37:00.002+05:302016-12-13T20:39:06.717+05:30Linux Kernel 4.9 ReleasedBiggest Ever” Linux Kernel 4.9 Released<br />
<br />
<i>Short Bytes: Linus Torvalds has released Linux kernel 4.9. It’s the biggest ever Linux version in terms of commits. A lot of bulk in this release comes due to AMD GPU register definition files and Project Ara’s “greybus.” Torvalds has also announced that Linux kernel 4.10 merge window will be shorter due to Christmas weekend.</i><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcK-gpqT1E_t-zPr6jNg-j_VODyOkhe6VxyJgSrVHAD49yv4mabsTUcckyISFq59m5jmFZ-z74VKt-TKdCy-JiEKq7RtGgXEZ-_Ph7yJDLhfYw3lRAWJDkZxqU3XpO8gFrLWuqkWIUJQ/s1600/kernell_4.9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="202" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcK-gpqT1E_t-zPr6jNg-j_VODyOkhe6VxyJgSrVHAD49yv4mabsTUcckyISFq59m5jmFZ-z74VKt-TKdCy-JiEKq7RtGgXEZ-_Ph7yJDLhfYw3lRAWJDkZxqU3XpO8gFrLWuqkWIUJQ/s400/kernell_4.9.png" width="400" /></a></div>
<br />
Back in October, many sources mentioned that Linux 4.9 is expected to arrive as the biggest ever Linux release in terms of the number of commits. This news was shared by Linus Torvalds with the announcement of Linux 4.9-rc2. Well, the wait is finally over as Linux 4.9 is here in all its glory.<br />
<br />
In the announcement post, once again Torvalds talked about the number of lines of kernel code. This is due to some specific issues like lots of code from AMD GPU register definition files. A lot of lines also comes from “greybus”, the portion of Google Project Ara code that managed to slip into this release.<br />
<br />
Breaking down, two third of Linux 4.9 code consists of drivers. Rest are arch updates, documentation, generic networking, and filesystems<i>.</i><br />
<br />
<b>Brief feature overview — Linux kernel 4.9</b><br />
Apart from a couple of additions mentioned above, the significant features shipping with Linux kernel 4.9 are:<br />
<br />
<ul>
<li> Intel DRM fixes</li>
<li> Better Raspberry Pi Zero support & other 28 ARM devices</li>
<li> Better security, thanks to Vmapped stacks</li>
<li> Memory protection keys implementation</li>
<li> Filesystem improvements</li>
</ul>
<br />
The release of version 4.9 automatically opens the merge window for kernel 4.10. However, due to Christmas weekend, it’ll be shorter than usual. “I will certainly stop pulling on the 23rd at the latest, and if I get roped into xmas food prep, even that date might be questionable,” Torvalds added.<br />
<br />
Read the complete Linux kernel 4.9 release announcement here. Grab the latest release from <a href="https://www.kernel.org/" target="_blank">Kernel.org</a>.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-47022041022826209352016-08-29T14:04:00.000+05:302016-08-29T14:04:03.577+05:30IObit Uninstaller Saves Windows 10 Users<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9uwtSX_sweFl0hdZSqHIiL3vIGE0Lby7MwxiFqSzzMQujKNyg9lUR4Hw_fxG13IZnxqe-79b_XXx9GbYgUMyOz1nQ9XdD4TH5NbD4-5JahQa7wSqM3mkaBuHXnBCqSc9MnwOSno6cqw/s1600/iobituninstaller_2_24_8_16.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="422" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9uwtSX_sweFl0hdZSqHIiL3vIGE0Lby7MwxiFqSzzMQujKNyg9lUR4Hw_fxG13IZnxqe-79b_XXx9GbYgUMyOz1nQ9XdD4TH5NbD4-5JahQa7wSqM3mkaBuHXnBCqSc9MnwOSno6cqw/s640/iobituninstaller_2_24_8_16.png" width="640" /></a></div>
<br />
The rollout of Windows 10 was interesting, to say the least. While a lot of Microsoft devotees eagerly anticipated the new operating system before its launch, the reality of it left a lot of tech users reaching for their torches and pitchforks. They felt arm-twisted into accepting automatic updates and upgrades, while mourning the loss of some of even the most basic features, like good old-fashioned Solitaire.<br /><br />
Uninstaller 6 helps rid your Windows machine of those additional features that slow things down or chew up space.<br /><br />But here’s the problem: uninstalling built-in programs can leave your system operating at less-than-ideal functionality if you don’t know what you’re doing. That’s why IObit gives you a complete list of programs to remove before you check them off, meaning you’re less likely to delete something critical and end up ruining your operating system.<br /><br />What else is new in version 6?<br />
<br />
Besides the ability to target Microsoft Edge plug-ins and extensions for removal, this version contains a larger database of known malicious and ad-based plug-ins so you can wipe those out, too.<br />
<br />
The uninstaller keeps a close watch for program features that you might not want, then alerts you to their presence so you can take action<br />
<br />
IObit Unisntaller can download <a href="http://www.iobit.com/en/advanceduninstaller.php" target="_blank">here</a><br />
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-5802313856620931712016-06-03T21:40:00.001+05:302016-06-03T21:40:23.680+05:30Google Changes How AdWords WorksGoogle has made the announcement that its AdWords is getting a makeover, and has been rebuilt from the ground up, in order to fully accommodate the fact that for most of us, mobile devices are the way we access the World Wide Web.<br /><br />Essentially, they’ve decided to make a bunch of updates that will make its ad tools more suitable for mobile technology.<br /><br />The major, or most prominent change, is to see a much greater emphasis on location related mobile searches. The new changes were announced at the Google Performance Summit in San Francisco and followed the news that of the trillions of Google searches every year, over half are now made from mobile devices.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg75bkdZkGM_Y30v6Pv2o9HQ57ofb0b8ZnY7HNNrKkkgTuwBECJcFMoJO81Y_7oFtb0DWatAMiyjbuRS4sne1pw07BX8g92bKHg3OglFlrxvmLTGdryjvaTWhBFIFDiJuMORBxNekhszg/s1600/abcs-of-adwords-google-adwords-logo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="402" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg75bkdZkGM_Y30v6Pv2o9HQ57ofb0b8ZnY7HNNrKkkgTuwBECJcFMoJO81Y_7oFtb0DWatAMiyjbuRS4sne1pw07BX8g92bKHg3OglFlrxvmLTGdryjvaTWhBFIFDiJuMORBxNekhszg/s640/abcs-of-adwords-google-adwords-logo.png" width="640" /></a></div>
<br />
Google has claimed that searches made from mobile devices are currently growing 50% faster than in any other area, so this new direction makes sense.<br /><br />Significantly, the move will separate desktop and mobile devices in the way AdWords operates for each type of device.<br /><br />Advertisers will be given the option to make mobile the primary focus of their campaigns, and also allow them to set different bids for desktop, tablet, and mobile devices.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-69903318309398394762016-03-05T10:00:00.002+05:302016-03-05T10:00:48.732+05:30DROWN can crack HTTPS In Less Than A MinuteExpert have warned that Websites could be exposing themselves to an attack that can break and exploit HTTPS encryption protections in less than a minute.<br /><br />Yep, that’s right. There’s another branded exploit out there, and this one is causing more concern than most. More than 33% of servers worldwide are vulnerable to an attack that can decrypt secure HTTPS protocol communications, such as credit card numbers and passwords, in less than a minute.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/03/drown-can-crack-https-in-less-than.html#"><img alt="http://www.geekyharsha.in/2016/03/drown-can-crack-https-in-less-than.html#" border="0" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdWAuCHmLy3NJNtbYuBVsdlkYUn1_eHj1tps9dNdLunHUsAUBq_kSRWemvp50GHUntdMRQg5ZIg1FbcvSiLV435jh2R6NxAiLUSYxQCAYdRUe9bh1A4B2bGClFAJ9rb5x4hMjuDCCNrA/s320/_88539873_88539872.jpg" width="320" /></a></div>
<br />
“DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption, allows an attacker to decrypt intercepted TLS connections by making specially crafted connections to an SSLv2 server that uses the same private key.”<br />
<br />
It works against HTTPS by sending specially crafted packets to a server, or if the certificate is shared on another server, effectively performing a Man-in-the-Middle attack.<br /><br />Unfortunately, there’s little to nothing that end users can do to protect themselves against the effect of a DROWN attack, as the issue is server based in nature.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-3159579457234340392016-03-05T01:07:00.003+05:302016-03-05T01:07:42.990+05:30 eSim and its Affects<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/03/esim-and-its-affects.html#"><img alt="http://www.geekyharsha.in/2016/03/esim-and-its-affects.html#" border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUl1lc-UbUWojfkeb0wb7maZAg1uXR0SW5rDkZJvVqYIWm9nvC4ttcIIsOYrFzSjxLsjH2twqAfEbvaYADX4Iv1-63QsCD9a1nWroKzq5o9Q2qL0kJDmW8jqWHN4AT5hb9obAr6eQcJQ/s640/frontpage-720px.jpg" width="640" /></a></div>
<br />
<span style="font-size: large;"><b>What is an eSIM?</b></span><br />When the eSIM becomes available, it’s going to be an electronic SIM card that is not going to depend on the old method of introducing it to a device to work; it will already come built into the device. It’s a new standard from the GSMA, and the information it has is going to be rewritable or submissive by all operators.<br />
<br /><b><span style="font-size: large;">Advantages of the eSIM</span></b><br />The advantages that the eSIM is going to offer users is that it is going to make things a lot easier when we want to switch carriers or data plans within our current carrier. You will also save a lot of time if you ever wish to change your carrier since it can be done with a simple phone call.<br />
<br />
Upgrading devices is also going to be a lot easier. For example, let’s say that your current device uses micro SIM, but the device you want to get uses nano SIM. In this situation switching devices and info can be a real fuss. With eSIM all you have to do is register the new device, and you’re done!<br /><br /><b><span style="font-size: large;">Telco Profiles in the eSIM</span></b><br />The eSIM is going to hold the profiles of all of the associated companies, but only the ones you are using will be activated. Each profile will be a different company, just like every traditional SIM has its own carrier. It’s these profiles that are going to allow you to also have lines from a different carrier, just like you would in a device with two or even three SIM cards in the same device. For now, you can only have one profile activated, but the idea is to have multiple profiles running simultaneously.<br /><br /><b><span style="font-size: large;">The End of Roaming</span></b><br />You can also say goodbye to roaming because once you land in a foreign country, you can easily get a local line while still having the line you’ve always had back home.<br />
<br />
The eSIM craze is going to have two parts. The first part is going to affect the wearables, tablets, and other devices, while the second part is going to be exclusively for the smartphones. Thanks to the eSIM, you are going to be able to connect multiple devices to a single plan with the carrier you have chosen. We still have to wait and see when the second part starts, but some say that it will start in June while others say that it will begin by the end of 2017.<br />
<br />
<br />
<span style="font-size: small;"><b>Conclusion</b></span><br />Everything seems to indicate that the eSIM is something that is going to benefit us all, but only time will tell if there is something to fear about it. Do you think that the eSIM is something that will make things easier, or do you think it’s all part of an evil plan to keep us under control? Let us know in the comments.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-44420075828968596702016-02-21T22:55:00.001+05:302016-02-21T23:01:27.917+05:30How to Enable the Hidden Chess Game in Facebook Messenger<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#"><img alt="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#" border="0" height="274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt0WOBzQVprxq2bYkdcK6jZhiTEg9UoFhH9PwuvrB9hDFNpFO8Nk3KuEbbBEN5zYTxdz9_-K2u26UWAcxz-EmcJaqoOjhKR1Zoy5V_Ws3miY9yWt8F7OC-pYRxllXw_FbgCWHnhF55uw/s640/fbchess-featured.png" width="640" /></a></div>
<br />
<br />
You do not need a third-party app or anything like that to unhide the game; all you need to do is fire-up a command, and it will activate the game for you.<br />
<br />
1. Launch a conversation with a friend you would like to play the game with.<br />
<br />
2. When the conversation panel opens, send them a message that says <b>“@fbchess play”</b> (without quotes), and the game of chess will begin.<br />
<br />
3. As soon as you send the above message to your friend, the conversation window will immediately show you the chess board to play the game.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#"><img alt="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#" border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-eO9q4-44jULaM_Mq-VffYQurWpZpJL2HFME_ZYpn82bqtKR4ZuaNIKnm0sKaoZxdV-jpGFuY70C4oOJTD0l7BUiNUC23wQJ9jrC3ZYfChtRaZFPoVEdQ-77_3ZpoJH-M2mVy8s6KhQ/s640/Capture.PNG" width="496" /><span id="goog_909886111"></span></a><span id="goog_909886112"></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
It will also tell you whose move it is; making a move is not as difficult as you may think. For instance, if you wish to move the Queen, simply use the letter Q, and the tile where you want to move it to. To move the Queen to B4 tile, use the following command: <b>" @fbchess Qb4 " </b><br />
<br />
Similarly, you can move the other pieces you wish by using the first letter of the piece’s name and the location of the tile you want to move them to.<br />
<br />
If you would like to maximize the chess board, then you can do so by clicking on the Settings icon in the chat window and selecting the “See Full Conversation” option. That should help you get a little larger view of the game.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#"><img alt="http://www.geekyharsha.in/2016/02/how-to-enable-hidden-chess-game-in.html#" border="0" height="368" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPza7VC9DUVZT8AD4mUgj-0wcxPqXtgyNorHskszaNDjtrMad2DQJjoND4YgSO8toL9VnfqBv8H2A-9lbiFu6pbEzrq6uPPa3TTA75u-FnVfUX6jjeCa7ZSafDpgi0_1n9dLeNLRea2A/s640/fbchess-largeview.png" width="640" /></a></div>
While many of us may not be experts in making a chess move, Facebook also helps you with that by letting you view the full information about how you can make a move. You can get access to that helpful information by typing in the command <b>“@fbchess help”</b> (again, without quotes), and that should show you all the related information about the secret game you are playing.<br />
<br />
If things are not working well and you wish to offer a draw, you can do so by sending in the command <b>“@fbchess draw offer”</b> and the opponent will receive your request. Lastly, if you do not want to play the game anymore and wish to resign, then send in the command <b>“@fbchess resign.”</b>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-54305697797240973112016-02-19T08:31:00.004+05:302016-02-19T08:31:37.685+05:30Are Hackers Taking Over Your Phone?BBC has a report on a bug in VoIP phone software that lets hackers in with just a few lines of code. They can then use the phone system to make expensive calls, and even listen in on your phone conversations.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/02/are-hackers-taking-over-your-phone.html#"><img alt="http://www.geekyharsha.in/2016/02/are-hackers-taking-over-your-phone.html#" border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWN27q72nFxsH-XkH2ZdcW0VuWoL4N5LVnrhRoY8UyRLfchM1C5u_jq0gRTNUwwW5OBtBjXk_NCM864jEoeBIemgPv7_cXymQco3U7DuZaAAH7FzP-lS1YC2cmSnSHcTkGKtiQgKJstQ/s640/maxresdefault.jpg" width="640" /></a></div>
<br />
The mechanism is frighteningly simple: VoIP users–whether they’re residential or commercial–typically use the same internet connection to run their computers and their phones. By finding some specific lines of code in a site that the user has visited via the computer, the hackers can then apply those lines of code to the software running the phone. This is a massive oversimplification of the process, but never fear, scammers have it down pat.<br /><br />Then, one of two processes occurs, both if you’re extremely unlucky. The hackers can eavesdrop on your phone conversations, and they’re able to rack up phone charges to charge-per-minute phone numbers. In an even funnier twist, the premium phone services can hire hackers to break into your VoIP phone system and quietly make these calls, thereby lining the premium service’s pockets and leaving you or your company to foot the bill. This becomes a lot less humorous when you factor in a company’s potential response to finding out your desk phone was used to make thousands of dollars’ worth of phone sex calls.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-43636394937169848402016-02-05T19:47:00.002+05:302016-02-05T19:48:15.393+05:30Apple Trade-in Program Will Replace Broken iPhones with New Ones iPhones are delicate and it’s no big secret. But if you are an iPhone user, you are not alone in worrying about the safety of your device. Clearly Apple has been giving it some thought and seems to have come up with a solution. According to reports, Apple is about to launch a program that would allow customers to exchange their broken iPhones in return for credit to but a new one.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/02/apple-trade-in-program-will-replace.html#"><img alt="http://www.geekyharsha.in/2016/02/apple-trade-in-program-will-replace.html#" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigPt7Lx5oSpqUSrxeIi-wCrPePaXg7omQyITsbIdb1DXJhy2Pn0WG-2CG_S35WiB_XxLG2cMX0qlOK-ehG84hTxq42vgcjGk6FcHIazfZ4vNWT76SL1Nqc0pikCHQVStlIlyShUgI3YA/s640/broken-iphone.jpg" width="640" /></a></div>
<br />
The models to be made part of this scheme include iPhone 5s, iPhone 6 and iPhone 6 Plus, as of now. Older models won’t be able to get their devices exchanged. The company would offer $50 against 5s and about $200 and $250. This trade-in program includes broken screens, buttons and cameras.<br />
<br />
The trade-in program would be rolled out in the US soon, but no news on
when it would be made available in India. We can expect it here in the
next couple of months though, before the end of 2016.<br />
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-12168360328565488082016-01-10T08:59:00.003+05:302016-01-10T09:01:06.813+05:30How to Find Your Lost Computer with Windows 10<div class="separator" style="clear: both; text-align: left;">
Before you get started, make sure that your computer has Windows 10 version 1511 or higher, let Microsoft record your device’s regular intervals and make sure that you are the administrator on your device. </div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
<a href="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#"><img alt="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#" border="0" height="310" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaMsCmsk3OQ8RzEjk8xaDoIa514Amc3ppSimR108yVRpejdD8Eu57isUJUXxcPZgquPhA8QfZ-l15kugbHsZ9XgxaZ8l3CTRtT-jCHISF6d9wRGh2lQAMVGagB8njHzKi6B2Jn0KjA1Q/s640/blog-locate-my-pc.jpg" width="640" /></a></div>
<span style="font-size: large;">How Finding Your Lost Computer Works</span><br />
<br />
This feature is very easy to use, and what it does is that it sends your exact location from time to time to your Microsoft account. For this to work you will need to sign in with your Microsoft account. If you don’t have one you will be given the option to set one up since you need one to use the feature. To gain access to this feature you need to follow the below steps.<br />
<br />
1. Go to “Settings.”<br />
<br />
2. Go to “Update and Security.”<br />
<br />
3. In the menu on the left, find and select “Find My Device.” Windows 10 doesn’t save your device’s location on a regular basis. To change this you will need to click on the “Change” button that is located in the “Find my Device” section.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#"><img alt="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicVXm3otI2qjY2HRMzwBVZStzvXtEy32o4KLjVKuMD2-xzJZLF86oEVq-5DQ9g_ujSMnzijS6WG6LCwK6MsSz6Y0fM0mq2E71LzWFXIwRhobjjl4UQLSCSLlzpMGfvRT3_UqWN7btbWg/s640/W10_Lost_Device_Find.jpg" width="640" /></a></div>
<br />
4. After clicking on the Change button, turn on “Save my device’s location periodically.” Once you have completed this the feature has been turned on.<br />
Finding Your Device with Windows 10<br />
<br />
If you ever need to find your device, the first site you will want to visit is the Device page on Microsoft’s official site. Remember to use the same login credentials that you are using on the device you are looking for.<br />
<br />
Find your Windows 10 device in the listing of the devices that you have registered to your account, and select “Find my Device” located right next to the device you are looking for.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#"><img alt="http://www.geekyharsha.in/2016/01/how-to-find-your-lost-computer-with.html#" border="0" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiu3rPa1nVilw6lRwoe6W8dxRc6VdybYRU4r5f_QCafqskxQHH1kZf9Ipa9Qo-in1fiDhF33SMay5yOZRDfd64MdbkXkOhqqYGaDYD4qjSRhKy39ZkKlot7_jVr_icMtXf3toYWDIh2sQ/s640/W10_Lost_Device_Find2.jpg" width="640" /></a></div>
After a moment you will receive the information about the last location of your device, and it will also provide you with a map. That obviously makes finding the device a whole lot easier. Keep in mind that the location may not be exact if your lost device does not have a built-in GPS.<br />
Conclusion<br />
<br />
Windows 10 has its pros and its cons, but this features that allows us to find our devices is definitely a good one. This feature will help many users find their lost or stolen devices and give them a happy ending to their story. If you found this information useful, don’t forget to give it a share, and let us know in the comments if you plan on activating this feature on your Windows 10 computer.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-87895293512000504232016-01-10T08:50:00.002+05:302016-01-10T08:50:35.415+05:30Microsoft plans to launch own SIM Card<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2016/01/microsoft-plans-to-launch-own-sim-card.html#"><img alt="http://www.geekyharsha.in/2016/01/microsoft-plans-to-launch-own-sim-card.html#" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYPjj5tZbx3vMB9YChhRhKVyKDFBd3yMlP8UoXKxtclEG29of1Ybst1jxsB0nSCknP3E4GuUb7N8rCXFPeJ-tfyeSas-L4CYWxPn3iUssWmy1NylojY2rZncG5s9Z4HNw0k1QX45UaMw/s640/174779502.jpg" width="640" /></a></div>
<br />The software giant Microsoft is soon going to launch its own SIM card. The SIM card can be used only on Microsoft devices that have a SIM slot, which will allow the user to connect to various mobile networks through the app from Microsoft store without any contract. The project is currently under testing. The app is being designed to work on operating system ‘Windows 10’ and requires a Microsoft SIM Card. The user should have a Microsoft account to enable this feature.<br /><br />It is not known which market the company has focused on and the pricings are yet to be revealed. It is said that Microsoft is planning to launch its own virtual mobile network to allow its users to connect to partner carriers. Though the app is currently available in the store, it will be of no use without the upcoming ‘Microsoft SIM Card’. So the company will soon come up with the updates.<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-62146327833938896802015-12-08T20:36:00.000+05:302015-12-08T20:36:02.957+05:30Ford Updates 5M Cars With SiriThis ain’t your granddaddy’s Ford… In software-related vehicle news that mercifully has nothing to do with Volkswagen destroying the planet on purpose while reaping profits, US automaker Ford has announced that as many as five million of its vehicles are compatible with an update that will enable the autos to run Siri, Apple’s popular virtual assistant.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2015/12/ford-updates-5m-cars-with-siri.html#"><img alt="http://www.geekyharsha.in/2015/12/ford-updates-5m-cars-with-siri.html#" border="0" height="372" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHi0KnjQootk2MemPD4GxEpbODJFmtHGgd8HKgyFv6ummFW1h_F86fdmG2qgkrf8noXXiVsO0ANyqBFE-aU7Ywsc54-6zUfyalxIgqG1H_71Lo3ebkvyIvIgUqZLWjRkrHQWs_BQHv5A/s640/puEXAkrB.jpeg" width="640" /></a></div>
<br />
The vehicles, manufactured after 2010 and running the SYNC entertainment system, can receive a software update (yeah, explain that to your grandfather) that will allow drivers to activate Siri using the voice recognition button on the steering wheel. An active Apple phone synced to the vehicle’s system is required, and advanced features of the car’s SYNC software also require a subscription.<br /><br />This update has been a long-time coming for some vehicle owners, who want the convenience and safety of an eyes-off Siri experience. Now, Ford owners whose cars are between 2011 and 2016 can simply go to the SYNC website to update their vehicles’ software in order to type and send text messages, get turn-by-turn directions from Apple Maps, play music from their Apple Music accounts, and of course, make phone calls. “Siri Eyes-Free is another great voice-activated feature that not only adds convenience but helps our customers keep their eyes on the road and hands on the wheel.”<br /><br />While the idea of updating the software in your car just like you do for your smartphone or web browser might seem foreign to some drivers, it’s actually part of a movement to keep drivers connected to their pre-purchased vehicles for longer spans of time. While consumers have been known to upgrade or make a switch–even on very high-dollar items–over the “extra touch”-type of features, the ability to innovate on a current model car means less interest in leaving behind a fully functioning car.Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-16286248357768588132015-12-02T08:58:00.003+05:302015-12-02T08:58:44.126+05:30Software Pirate ‘Jakub F’ has got 400,000 hits on Youtube!Convicted software pirate, ‘Jakub F,’ has been given one of the weirdest punishments ever seen in a copyright infringement case<br />
<br />
The man, named only as Jakub F, was told he would be spared having to pay hefty damages as long as a film denouncing piracy he was made to produce got 200,000 views.<br /><br />He reached his target within days, and now has over 400,000 hits on YouTube.<br /><br />He came to the out-of-court settlement with a host of firms whose software he pirated after being convicted by a Czech court.<br /><br />In return, they agreed not to sue him.<br /><br />The 30-year-old was also given a three-year suspended sentence.<br /><br />The criminal court decided that any financial penalty would have to be decided either in civil proceedings or out of court.<br /><br />The firms, which included Microsoft, HBO Europe, Sony Music and 20th Century Fox, estimated that the financial damage amounted to thousands of pounds, with Microsoft alone valuing its losses at 5.7m Czech Crowns (£148,000).<br /><br />But the Business Software Alliance (BSA), which represented Microsoft, acknowledged that Jakub could not pay that sum.<br /><br />Instead, the companies said they would be happy to receive only a small payment and his co-operation in the production of the video.e.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2015/12/software-pirate-jakub-f-has-got-400000.html#"><img alt="http://www.geekyharsha.in/2015/12/software-pirate-jakub-f-has-got-400000.html#" border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RDKsAuXaS8p1pepILABPpymKqgH-3HtuxK4Zq_yILEgmVLduM7RBMjsidwcFAeJpf4d80zFqtGn9XX2a8PdJgSVtMt2RIF40d04pXSGy3ZFoxupsZrSzfgiY6_bty5uKAwO1L6Xwtg/s640/_86892724_jakub2.jpg" width="640" /></a></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-51725648536448510922015-12-01T07:38:00.002+05:302015-12-01T07:38:50.133+05:30Windows 10 November Update build 10586Microsoft has come clean about the action it recently took to pull the eagerly anticipated first major Windows 10 Update<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2015/12/windows-10-november-update-build-10586.html#"><img alt="http://www.geekyharsha.in/2015/12/microsoft-has-come-clean-about-action.html#" border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtX83dtWjN3yZiS2JwZZyO_Bx6AOQFbG-fmYAaBAraZ1tqle5c7PHjqPjEGczP0-g3PG0vdcz5a2nd9Y6rj_xC8VYWr0DNIfvXTn0X9iYDIZSuicZDpT61nKKJWMqm-fADYsD8fWQ3QQ/s640/w10-update.jpg" width="640" /></a></div>
<br />
According to Microsoft, the Windows 10 Update for November in its original form might have reset four important privacy settings back their original default settings, but without informing the user the changed had been applied<br /><br />Concerns were raised when Microsoft initially de-listed the November update from the Media Creation Tool (MCT).<br /><br />The MCT is one of the fastest and easiest ways to do perform a completely clean install of Windows 10 with the latest Windows 10 Updates already applied. Using the MCT to install Windows 10 also removed the sometime cumbersome and time consuming process of of having to download Windows 10 Updates after installing Windows 10.<br />
<br />
Many Windows 10 users already circumspect of what Microsoft does and doesn’t in regards to user privacy, Microsoft are also keenly aware that any changes they make to privacy settings are being closely watched. Pulling the the Windows 10 November Update was probably a really smart move on their part.<br />
<br />
The Windows 10 update has now been fully restored and users should now have had these particular privacy concerns firmly put to bed.<br /><br />For those who are interested, the four settings in question were:<br />
<ul>
<li> Let apps use my advertising ID,</li>
<li> Turn on SmartScreen Filter for web content,</li>
<li> Let apps run in the background and,</li>
<li> Sync with devices.</li>
</ul>
And for those people who may have already installed the November update (Version 1511), before it got yanked, can check whether their privacy settings have been altered by going to Settings, Privacy and then changing the following options:<br /><br />
<ul>
<li> Select General to adjust the advertising ID and SmartScreen Filter.</li>
<li> Select Other devices to adjust your Sync with devices settings.</li>
<li> Select Background apps to review the applications set to run in the background.</li>
</ul>
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-4738192840720197342015-11-30T21:38:00.004+05:302015-11-30T21:45:13.031+05:30Looking at Cinnamon 2.8<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2015/11/looking-at-cinnamon-28.html#"><img alt="http://www.geekyharsha.in/2015/11/looking-at-cinnamon-28.html#" border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqohUdZhWOzItaUtXxHRHbv2_WykmomMQ1u-gTMlI5E-EMnoTMcd7jCeVZkgXa2kkVzE_dPkTqTkw3X5iK-sx4pYmDh1lSeQB0Sd5WnKN-kmwW0oBHWNUVtzfN_J8sy6Yr6XBu_0VFoQ/s640/cinnamon-2-8-is-a-massive-update-with-over-200-changes-supports-indicators-494960-2.jpg" width="640" /></a></div>
<br />
Other than Gnome and KDE, Cinnamon is another desktop environment that is used by many people. It is made by the same team that produces Linux Mint (and ships with Linux Mint) and can also be installed on several other distributions. The latest version of this DE – Cinnamon 2.8 – was released earlier this month, and it brings a host of bug fixes and improvements as well as some new features.<br />
<a name='more'></a>I’m going to go over the major improvements made in this release as well as how to update to Cinnamon 2.8 or install it for the first time.<br />
<br />
<b>Improvements to Applets</b> : There are several improvements to already existing applets for the panel.<br />
<br />
<b>Sound Applet</b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihuhWe-8DMmF_jZSxfLiVF_RbYvrWZjOoSwfXJ8MPqQ_urBOCoNfISIbnBOLbrIUSzBWQ8ZWsl2melZR-zeT0abdw2Ol2YM5qXDCtkp-zTDkulGwVYco_E2JEhZHWHCw5u8mS8K7tQSg/s1600/1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihuhWe-8DMmF_jZSxfLiVF_RbYvrWZjOoSwfXJ8MPqQ_urBOCoNfISIbnBOLbrIUSzBWQ8ZWsl2melZR-zeT0abdw2Ol2YM5qXDCtkp-zTDkulGwVYco_E2JEhZHWHCw5u8mS8K7tQSg/s400/1.jpg" width="267" /></a></div>
<br />
The Sound applet was revamped and now displays track information as well as the media controls on top of the cover art of the audio file. For music players with seeking support (such as Banshee), a progress bar will be displayed in the same region which you can use to change the position of the audio track. Right-clicking on the applet in the panel will display the options to mute input and output devices.<br />
<br />
<b>Power Applet</b><br />
<br />
The Power applet now displays the status of each of the connected batteries and devices using the manufacturer’s data instead of generic names.<br />
<b><br />Window Thumbnails</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqqxctLiWc5nkBKU45_M7HzmKGSlRKkIca5wB4df_t0Cp3i_59YexhrH8i_LT0yjBpzqpP-z2dppHMkrsPgAomSMdlf1Mq6ILB-iDDZoI-U08s069vLUQVOzksLkFP8g8ni0rAPeZ6g/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="316" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqqxctLiWc5nkBKU45_M7HzmKGSlRKkIca5wB4df_t0Cp3i_59YexhrH8i_LT0yjBpzqpP-z2dppHMkrsPgAomSMdlf1Mq6ILB-iDDZoI-U08s069vLUQVOzksLkFP8g8ni0rAPeZ6g/s400/2.png" width="400" /></a></div>
<br />
Cinnamon 2.8 brings the option to show window thumbnails when hovering over the window list in the panel. You can turn it off if you don’t like it, though.<br />
<br />
<b>Workspace Switcher Applet</b><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp_HqxyJEtOuFdYes6Qa_KTNRzk1tG50t-bavVd8Rq8-cSeFyKHEJdU6gkLgKbNCbLQEVslNQgQS6zHv9llYxTtjv-4HaoOGUaokQZ4eIxCO3g4k6QWbJ0ypUsLG05fkb7bs5ZaKoyYg/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="103" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp_HqxyJEtOuFdYes6Qa_KTNRzk1tG50t-bavVd8Rq8-cSeFyKHEJdU6gkLgKbNCbLQEVslNQgQS6zHv9llYxTtjv-4HaoOGUaokQZ4eIxCO3g4k6QWbJ0ypUsLG05fkb7bs5ZaKoyYg/s400/3.png" width="400" /></a></div>
Adding the Workspace switcher applet to your panel will show you a visual representation of your workspaces with little rectangles embedded inside to show the position of your windows.<br />
<br />
<b>System Tray</b><br />
Cinnamon 2.8 brings support for app indicators in the system tray. You can easily disable this in the settings which will force affected apps to fall back to using status icons instead.<br />
Visual Improvements<br />
<br />
A host of visual improvements were made in Cinnamon 2.8. The classic and preview Alt + Tab switchers were polished with noticeable improvements, while the Alt + F2 dialog received bug fixes and better auto completion for commands.<br />
<br />
Also, the issue with the traditional animation effect for minimizing windows is now sorted and works with multiple panels.<br />
<br />
<b>Nemo Improvements</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBHEa0gbYX1__Zl7u_2dd5WkkpVyVch1Ck8uAu6mKriideivWG30aVCbtHk0t6nP9FUZgWZx8vbpz5tk4YrUbix11G-zbtMNCwlgD6PAadni0XdlY_RpyPn96h3K9jAquYPYKT9KMtg/s1600/4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQBHEa0gbYX1__Zl7u_2dd5WkkpVyVch1Ck8uAu6mKriideivWG30aVCbtHk0t6nP9FUZgWZx8vbpz5tk4YrUbix11G-zbtMNCwlgD6PAadni0XdlY_RpyPn96h3K9jAquYPYKT9KMtg/s640/4.jpg" width="640" /></a></div>
<br />
The default file manager for Cinnamon also received several bug fixes and has a new “Quick-rename” feature for renaming files and directories. This works by clicking the file or directory twice with a short pause in between to rename the files.<br />
<br />
Nemo also detects issues with thumbnails automatically and prompts you to quickly fix them.<br />
Other Notable improvements<br />
<br />
Applets now reload themselves automatically once they are updated.<br />
Support for multiple monitors was improved significantly.<br />
Dialog windows have been improved and now attach themselves to their parent windows.<br />
HiDPI dectection has been improved.<br />
QT5 applications now look more native and use the default GTK theme.<br />
Window management and rendering performance has been improved.<br />
There are various bugfixes.<br />
<br />
<b>How to Get Cinnamon 2.8</b><br />
<br />
If you’re running Linux Mint you will get Cinnamon 2.8 as part of the upgrade to Linux Mint 17.3 “Rosa” Cinnamon Edition. The BETA release is already out, so you can grab that if you’d like to get your hands on the new software immediately.<br />
<br />
For Arch users, Cinnamon 2.8 is already in the official Arch repositories, so you can just update your packages and do a system-wide upgrade to get the latest version.<br />
<br />
Finally, for Ubuntu users, you can install or upgrade to Cinnamon 2.8 by running in turn the following commands:<br />
<blockquote class="tr_bq">
<span style="font-family: "courier new" , "courier" , monospace;"><br /></span>
<span style="font-family: "courier new" , "courier" , monospace;">sudo add-apt-repository -y ppa:moorkai/cinnamon</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">sudo apt-get update</span><br />
<span style="font-family: "courier new" , "courier" , monospace;">sudo apt-get install cinnamon</span></blockquote>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Have you tried Cinnamon 2.8? What do you think of it?Unknownnoreply@blogger.comtag:blogger.com,1999:blog-5396620554100078740.post-85994633088658714432015-11-29T15:40:00.000+05:302015-11-29T15:40:02.651+05:30How to Know Who Unfollowed You on Twitter<a href="https://unfollowers.com/" target="_blank"><b>UnFollowers</b></a><br />
<br />
UnFollowers allows you to see not only who unfollowed you on Twitter but also on Instagram. After signing in with your Twitter account, you can see who unfollowed you in the column on the left side.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.geekyharsha.in/2015/11/how-to-know-who-unfollowed-you-on.html#"><img alt="http://www.geekyharsha.in/2015/11/how-to-know-who-unfollowed-you-on.html#" border="0" height="372" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2z1uCJKWtw3E2Yi6OIrG7Hv8je_yfESrXCD1BMPQChO_onnG2E00J5L-hMDH0SVJs5nuXTI8dAzgNrWU2ivmzcWyooGZnUqVi8_CxmfkEYMv11TEVn-SwOCvD7n5qt0unwJzzpP3MDw/s640/find-unfollowers-on-twitter.jpg" width="640" /></a></div>
<br />
In that column you can see info such as who is not following you back, who recently unfollowed you, who recently followed you and more.<br />
<br />
There are other alternatives like <b>Crowdfire for Twitter</b>, <b>Who Unfollowed Me, Friend or Follow, Manage Filter </b>that helps you track unfollowers!<br />
<br />Unknownnoreply@blogger.com