Visitors: 112578
Today: 77
5 Visitors, 0 Member, 0 Moderator, 0 Administrator online.

5 online
Total : 5
Guest Book

By Visitor

【受#第1號颱風尼伯特# 影響,鼓浪嶼恢復寧&# [Read more...]

Guest Book
Syndication Welcome on the site!
Welcome on the site!
Each member can contribute, post news. All you need is to log in in the site and go to the panel contribution. We accept contributions on computer science, electronics and telecommunications.
If you want to see your news here, you have to submit it here and put a link to your web site

Orbit Downloader by Innoshock is a popular file downloading add-on for web browsers, used not only to speed up the transfer of files over the Internet but also for its ability to download embedded videos from popular streaming video sites like YouTube.

Orbit Downloader has been around since at least 2006, and like many programs these days, is available for free. The developer, Innoshock, generates its revenue from bundled offers, such as OpenCandy, which is used to install third-party software as well as to display advertisements in order to generate revenue.

This type of advertising arrangement is normal behavior these days and one of the things that ESET’s researchers regularly look at when determining whether or not a program is to be classified as a Potentially Unwanted Application (PUA). While that process is likewise fairly routine for ESET’s researchers, it is one which requires careful examination because the reasons for which programs may be classified as a PUA vary on a case-by-case basis.

Criminals understand that computer users want to download files and streamed videos and have already begun to take advantage of the situation, as computer security researcher Graham Cluley noted in a post on his blog, “Is that YouTube Video Downloader browser plugin safe? Beware!“

[Read the continuation...]

said, The: 08/26/13
There is currently a significant attack being launched at a large number of WordPress blogs across the Internet. The attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords. It appears a botnet is being used to launch the attack and more than tens of thousands of unique IP addresses have been recorded attempting to hack WordPress installs.
One of the concerns of an attack like this is that the attacker is using a relatively weak botnet of home PCs in order to build a much larger botnet of beefy servers in preparation for a future attack. These larger machines can cause much more damage in DDoS attacks because the servers have large network connections and are capable of generating significant amounts of traffic. This is a similar tactic that was used to build the so-called itsoknoproblembro/Brobot botnet which, in the Fall of 2012, was behind the large attacks on US financial institutions.
t the attack back to partners who are interested in hardening their internal defenses for customers who are not yet on CloudFlare.

[Read the continuation...]

said, The: 04/13/13
Samsung has unveiled the biggest smartphone to date - the Galaxy Mega, which features a 6.3in (16cm) screen.

The firm suggested its size made it ideal for watching videos or running two apps alongside each other.

Samsung helped popularise the so-called "phablet" category - in which phones approach tablet dimensions - with its original 5.3in Galaxy Note in 2011.

That proved more popular than many expected, but one analyst suggested the latest device might be a step too far.

Samsung is marketing the Android-powered handset as having a high-definition screen - however, a spokesman was unable to confirm whether it supported 720p or the "full HD" 1080p resolution.

Another South Korean firm, Pantech, currently lays claim to offering the biggest "full HD" smartphone with its 5.9in Vega No 6 which was announced in January.

China's Huawei had previously boasted having the biggest largest-screened 720p smartphone with its 6.1in Ascend Mate.
'Too cumbersome'

[Read the continuation...]

said, The: 04/11/13
Dan Goodin, editor at Ars Technica, has been tracking and compiling info on an elusive series of website compromises that could be impacting tens of thousands of otherwise perfectly legitimate sites. While various researchers have reported various segments of the attacks, until Dan’s article, no one had connected the dots and linked them all together.

Dubbed “Darkleech,” thousands of Web servers across the globe running Apache 2.2.2 and above are infected with an SSHD backdoor that allows remote attackers to upload and configure malicious Apache modules. These modules are then used to turn hosted sites into attack sites, dynamically injecting iframes in real-time, only at the moment of visit.

Because the iframes are dynamically injected only when the pages are accessed, this makes discovery and remediation particularly difficult. Further, the attackers employ a sophisticated array of conditional criteria to avoid detection:

[Read the continuation...]

said, The: 04/10/13