‏إظهار الرسائل ذات التسميات Protection. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Protection. إظهار كافة الرسائل

Learn Killer USB capable of destroying any computer!

تعرف على Killer USB القادرة على تدمير أي حاسوب !

There is no doubt that a lot of things that may seem strange in the digital world, or as part of a science fiction movies now become a reality, and as an example that can hackers remote to destroy computer a user, and it seems that this is no longer impossible after today .
Site "The Hacker News" pointed out that one of the Russian researchers, who nicknamed "Dark Purple" has made the discovery of a new and exciting concept of innovation can Lexar USB "fatal" where it is able to destroy the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.

 

 Russian researcher Dark Purple, and in order to accomplish his creation and of "Killer USB" The request plates electronic circuits specially from China and succeeded in doing so as the Lexar USB operate simple principle and is that it passes the electric power exceeding 110 volts, causing the destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was designed by the National Security Agency NSA to destroy the property and sensitive nuclear Iran remotely.

Learn Killer USB capable of destroying any computer!

تعرف على Killer USB القادرة على تدمير أي حاسوب !

There is no doubt that a lot of things that may seem strange in the digital world, or as part of a science fiction movies now become a reality, and as an example that can hackers remote to destroy computer a user, and it seems that this is no longer impossible after today .
Site "The Hacker News" pointed out that one of the Russian researchers, who nicknamed "Dark Purple" has made the discovery of a new and exciting concept of innovation can Lexar USB "fatal" where it is able to destroy the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.

 

 Russian researcher Dark Purple, and in order to accomplish his creation and of "Killer USB" The request plates electronic circuits specially from China and succeeded in doing so as the Lexar USB operate simple principle and is that it passes the electric power exceeding 110 volts, causing the destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was designed by the National Security Agency NSA to destroy the property and sensitive nuclear Iran remotely.

Learn Killer USB capable of destroying any computer!

تعرف على Killer USB القادرة على تدمير أي حاسوب !

There is no doubt that a lot of things that may seem strange in the digital world, or as part of a science fiction movies now become a reality, and as an example that can hackers remote to destroy computer a user, and it seems that this is no longer impossible after today .
Site "The Hacker News" pointed out that one of the Russian researchers, who nicknamed "Dark Purple" has made the discovery of a new and exciting concept of innovation can Lexar USB "fatal" where it is able to destroy the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.

 

 Russian researcher Dark Purple, and in order to accomplish his creation and of "Killer USB" The request plates electronic circuits specially from China and succeeded in doing so as the Lexar USB operate simple principle and is that it passes the electric power exceeding 110 volts, causing the destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was designed by the National Security Agency NSA to destroy the property and sensitive nuclear Iran remotely.

Learn Killer USB capable of destroying any computer!

تعرف على Killer USB القادرة على تدمير أي حاسوب !

There is no doubt that a lot of things that may seem strange in the digital world, or as part of a science fiction movies now become a reality, and as an example that can hackers remote to destroy computer a user, and it seems that this is no longer impossible after today .
Site "The Hacker News" pointed out that one of the Russian researchers, who nicknamed "Dark Purple" has made the discovery of a new and exciting concept of innovation can Lexar USB "fatal" where it is able to destroy the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.

 

 Russian researcher Dark Purple, and in order to accomplish his creation and of "Killer USB" The request plates electronic circuits specially from China and succeeded in doing so as the Lexar USB operate simple principle and is that it passes the electric power exceeding 110 volts, causing the destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was designed by the National Security Agency NSA to destroy the property and sensitive nuclear Iran remotely.

Get Wi-Fi signal strong with the help of this applicatio

Wireless internet through Wi-Fi network has achieved "miracles" in the contemporary human life. You can today use computer, smart phone or tablet computer in any corner of the house, in the room, in the kitchen or even in the bathroom, it's very impressive technology that enables us to surf the Internet and all things related to them from anywhere without the need for wires disturbing. But despite So not everything is fine when it comes to the quality of the signal issued by Altoger.tthbyt router devices in the home can be something very simple, but the problem is where to put the router in the house for the signal reaches all Onhaúh.ama you suffer from a weak signal Wi-Fi I suggest you try this application you will learn it together

 
 Get Wi-Fi signal strong with the help of this applicatio 

Application you speak of is WiFi Solver FDTD, which is Android application enables you to find out the correct and proper place to put the router in your home to signal reaches all places .stlahz that the application is very easy to use and has a very nice interface.But before you use it, the demands of the design of your home (one floor) and identify the walls, as well as open spaces and the other using an image editor such as Photoshop or Gimp Ogerhma .almanm is going to be to save the file on the final shape of the image format PNG


In design, it is necessary to respect the terms of the application, it is enough that you design one floor (where the router) We do not need to Ichml stairs or Alothat.alik also differentiate between the walls, and the application uses a color system. Fallon Red refers to the wood and the blue bricks and the like, and green to the glass and everything is black represents Alvargh.kma spaces that each 1 cm corresponds to one pixel in the application. Clicking on the "open" button Open, you can open images stored on Dropbox, Google Drive or in the smartphone memory


 Get Wi-Fi signal strong with the help of this applicatio

After loading the image into the program, click on the place where the router is located (router), which will be in the form of a red dot. During this process, you can find out whether the device has a single antenna or two and you can determine this is the bottom of the application by choosing "single" instead of "double". Now, click the "Run" Run to start the evaluation process


 Get Wi-Fi signal strong with the help of this applicatio 

You can perform an unlimited number of tests that you want, to find and identify the best place to Rutter for a better signal Memkna.alttbaiq found on Google Play, but unfortunately is a paid application for $ 1; but fortunately you can download it for free on the Internet, and you can use Google workers across Search for "WiFi Solver FDTD.apk"

The discovery of serious loophole Freak worry that Apple and Google and threaten millions of users

The discovery of serious loophole Freak worry that Apple and Google and threaten millions of users

Discovered a group of security researchers serious loophole enables hackers from intercepting and cracking the exchange of data between users is encrypted, the serious gap that has recently been discovered that target browsers and both Google and Apple pushed the latter two to rush in order to provide the necessary updates to users 

New loophole discovered bearing the name "Freak" or "Factoring attack on RSA-EXPORT Keys" and targeting more than one-third of existing sites on the Internet, even those that use Transport Layer Security and SSL, which guarantees a high level of security protocols in the hierarchy system, where hackers managed between the user of the presence in the first end of the connection between the target and the location in the second party and thus launch an attack from the type of "attack man-in-the middle" or "Man-in-servers the-middle attack"
New discovery is the result of the work of a group of security researchers, the French and the Americans, and is back for more than 10 years but remained undetected, and threaten mainly security protocols used in browsers both Google and Apple, where they can use this loophole to force the browser to use low encryption levels Then break the encryption in a few hours and then access to the private data of users of the definitions and passwords


Researchers gung confirms that the gap recently discovered "Freak" untapped yet, but they pointed out that the main reason for this gap is due to American policy in the field of IT security as the US government to prevent the presence of high encryption levels or locked dramatically and is data encryption systems What began in applied since the end of the nineties, where he became the Information Security Standards currently beating


And announced that each of the two Google and Apple and the two magnets trouble spots core of this loophole for the availability of a security update Express during the next week

Android phones batteries can spy on its users!

بطاريات هواتف أندرويد تستطيع التجسس على مستخدميها !

It is known that one of the most important means to determine the geographic location of the users of smart phones and the most common is "GPS" or well over Wifi technique, but it seems that there is a way other unexpected and may be able to as well as to determine the geographic location of the users of Android phones, this new method is based on energy consumption for smartphones batteries.

News moved a number of sites, including the site of British Broadcasting Corporation (BBC) where indicated that four Android phones batteries can spy on its users!

Summary
from Stanford University in the United States conducted new research revealed through the study of energy consumption for smartphones engaged by Android may be a way to determine the geographical location of the user
.

And in order to prove their point of view the four researchers develop an application "PowerSpy" able to study the energy consumption of the battery user phone and based on this method can determine the geographical location without the need for technology and meets or GPS, which unlike them, this application does not require user consent or knowledge of what it is to connect automatically.

The new application only needs to connect the mobile phone network and to enter a power management in smart phone settings in order to determine the geographical position of the user accuracy by up to 90 percent.

The Israeli army is "hackers" at the top of the pyramid of Moroccans enemies

Zionist army put hackers Moroccans in the top of his enemies cyber according to the results of an Israeli investigation in cooperation with the US Air Force reached through Israel to the fact that Moroccan pirates backed by pirates from Egypt and Palestine has caused much damage to Israel after their attempts intensified during 2013 and during the recent aggression on Gaza Gaza.
According to sources, the newspaper "Harters" Israeli published by the newspaper "Hesberas" reveal that the Moroccan pirates in the World Wide Web drove along hackers from Egypt and the Gaza Strip, Palestine, attacks pitched launched in the month of January 2013 affected the information systems of many Israeli institutions, and the main objective of the these attacks is a painful blow to the Israeli army.
The investigation revealed that the "hackers" sent e-mails from Morocco, for piracy information systems and financial and military Israeli institutions, not the Israeli government has been unable to determine the identity of the owners of these e-mails, and data Qrsnoha of Hebrew government site size, and also be able to determine the movement of the attacks Are were individually or collectively? Especially that hackers Moroccans support both Egyptians and Palestinians colleagues have simultaneous operations and regular professional rely same method.
Israel and know every year tens of thousands of attacks led by hackers "Anonymous" Arabs and Muslims, according to the Israeli newspaper, the prompting of the Zionist entity for the investigation of this matter is that hackers Moroccans together with their fellow Palestinians and Egyptians had attacked government positions and security positions of the Israeli army.

Reload this very important program Defender done by Microsoft to protect Windows users.

Microsoft released a new update for the program "Windows Defender" on anti-virus and malicious software on a Windows computer.This is necessary to update the program Defender comes to combat malicious software known as "Super Fish" Super Fish, the same code that found previously Mtbuth on multiple computers for the company, "Lenovo".This malicious software ("Super Fish") called "hacker friend" name so that it was able to spy on users and have negative effects allow pirates to facilitate the work of the hack.It is also the fact that the negative effects of software "Super Fish" accessories that are added to the Internet browsers allow showing ads automatically in any location and this is what bothers a lot of users and expose them in many cases to spy on them or attempted penetration into.
And works of the new Windows Update to reduce the effects of software "Super Fish", and off and delete any certificate of authenticity recorded by the system, and as a comment from the CEO of security "Firm Errata" in the United States, "Robert Graham": "Super Fish program generates many of malware, and opens the encrypted paving the way to pirate their games in order to exercise their communications. "Microsoft and was told that all users can Tthbyt new selection program through Windows Defender downloaded from its official website:
windows.microsoft.com or work an automatic update of the program on the computer.

Sites, programs and tools useful [37] (site to receive SMS messages online US and Canadian numbers, another site to browse any site that is not available online ..)

The number of new series "programs, sites and tools useful" and another week Taatarafon where a group of sites and services, as well as some programs and additions to the browser, as well as the addition of some high-res backgrounds.

 

 cachedview

 

 Maybe sometimes surprised by the lack of a page in a site for technical reasons or otherwise, Google has a content service cache that lets the possibility browse any site or page even if it has been deleted, but of course Google is not a single platform that provides caching of web pages. This is also the site you can use it, but it also enables you to browse sites in the old copy.

 creddle

If you're looking for work, the first things that you should do is to create a distinctive biography. Of course in the Internet there are a social network, a specialized Linkedin for professionals, through which you can create a CV online and carry all your information including education, experience, skills and other Altfasil.lzlk this site you can convert your file in this network to the biography elegant and tidy

 maildrop

 

There are times when you want to download software or register at the site over the Internet, and are always demands typing your email address to send the activation link, or simply to gain access to a product that Thtajh.lkn you do not want to share your email with these sites or services, especially if you use them only once, for this you can use this site to create a temporary email.

 papaly

 

 Is an excellent service for the management of all the pages and sites, the links that you visit in the day or week, where this service to store all this in one place. What makes this an excellent tool is that you can save links the way you want, because you can be classified into categories, and you can set the colors of them for quick access to them, in addition to a host of other features that can be detected.

namecheckr

This site lets you search for your name or any other name you want to make sure that the services provided by the various sites on the Internet, this is the service you search for your name in all the famous sites, as well as you can be exploited to search for the expense of anyone else.

 recibirsms

 

There are a lot of services on the Internet that you need to provide a phone number US to activate your account by CODE one who is sent via SMS to this number, so the oldest such site that provides you with different numbers (one Canadian and the other American) to receive these messages via the Internet .

  Hacker Vision

 

Is the addition of the Google Chrome browser that allows you to surf the sites offer the advantage of the night, which reduces the brightness of the display light at night, in order to keep the eye from damage caused and the potential of high light emitted from a computer screen.

  X-notifier

 

 A beautiful addition to Firefox lets you access your email messages in all your accounts in various services such as beautiful, Outlook, etc in one place, as well as beautiful that you can receive alerts for new messages received for one of your accounts directly from your browser.

 Cl1ckClock

 


Very nice and neat program works as ad-hoc shut your computer according to the time you specify, beautiful in the program is the ease and Tsamal wonderful .ikva that you select a time interval that you want to be amortized computer automatically according to him, so you can listen to music and relax or sleep without having to worry about computer in the business of survival throughout the night.

 VeraCrypt

 

Is one of the most important and the best software to encrypt files on Linux, which of course the best alternative to the famous Windows "TrueCrypt" program .bl case you can consider the latest version of the latter.

 Beautiful backgrounds for this week

Occasum



tiger

How to Engage whatsApp Firefox

كيف تشغل whatssApp  على Firefox

We've all heard the launch platform for Web application whatsApp web. Where it has become possible to access and chat with contacts from the use of Google Chrome browser, but unfortunately it if you try to use the web version of the application on August Alwats Vaaverwox they are to learn. But thank God that he was launching a new add-on Firefox unofficial name Enable WhatsApp Web 0.1.2 to run the Web version of the Watts August on Firefox. All you need to do is download the tool from Firefox shop applications from here:Enable

 WhatsApp Web 0.1.3 .And press the yellow button Add to Firefox in order to add the addendum to the Firefox browser.

And enjoy using copy Watts August on Firefox. As it did in the picture above!