Home / Protection
إظهار الرسائل ذات التسميات Protection. إظهار كافة الرسائل
إظهار الرسائل ذات التسميات Protection. إظهار كافة الرسائل
Learn Killer USB capable of destroying any computer!
Internet News Marketing Protection Technology News
There
is no doubt that a lot of things that may seem strange in the digital
world, or as part of a science fiction movies now become a reality, and
as an example that can hackers remote to destroy computer a user, and it
seems that this is no longer impossible after today .
Site
"The Hacker News" pointed out that one of the Russian researchers, who
nicknamed "Dark Purple" has made the discovery of a new and exciting
concept of innovation can Lexar USB "fatal" where it is able to destroy
the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.
Russian
researcher Dark Purple, and in order to accomplish his creation and of
"Killer USB" The request plates electronic circuits specially from China
and succeeded in doing so as the Lexar USB operate simple principle and
is that it passes the electric power exceeding 110 volts, causing the
destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was
designed by the National Security Agency NSA to destroy the property and
sensitive nuclear Iran remotely.
Learn Killer USB capable of destroying any computer!
Internet News Marketing Protection Technology News
There
is no doubt that a lot of things that may seem strange in the digital
world, or as part of a science fiction movies now become a reality, and
as an example that can hackers remote to destroy computer a user, and it
seems that this is no longer impossible after today .
Site
"The Hacker News" pointed out that one of the Russian researchers, who
nicknamed "Dark Purple" has made the discovery of a new and exciting
concept of innovation can Lexar USB "fatal" where it is able to destroy
the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.
Russian
researcher Dark Purple, and in order to accomplish his creation and of
"Killer USB" The request plates electronic circuits specially from China
and succeeded in doing so as the Lexar USB operate simple principle and
is that it passes the electric power exceeding 110 volts, causing the
destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was
designed by the National Security Agency NSA to destroy the property and
sensitive nuclear Iran remotely.
Learn Killer USB capable of destroying any computer!
Internet News Marketing Protection Technology News
There
is no doubt that a lot of things that may seem strange in the digital
world, or as part of a science fiction movies now become a reality, and
as an example that can hackers remote to destroy computer a user, and it
seems that this is no longer impossible after today .
Site
"The Hacker News" pointed out that one of the Russian researchers, who
nicknamed "Dark Purple" has made the discovery of a new and exciting
concept of innovation can Lexar USB "fatal" where it is able to destroy
the user who is connected to a computer, and this researcher works Russian in manufacturing electronics company.
Russian
researcher Dark Purple, and in order to accomplish his creation and of
"Killer USB" The request plates electronic circuits specially from China
and succeeded in doing so as the Lexar USB operate simple principle and
is that it passes the electric power exceeding 110 volts, causing the
destruction of components sensitive computer.
And bring this innovation to mind Stuxnet computer worm, which was
designed by the National Security Agency NSA to destroy the property and
sensitive nuclear Iran remotely.
Get Wi-Fi signal strong with the help of this applicatio
Android Internet News Protection Technology News TuitionWireless internet through Wi-Fi network has achieved "miracles" in the contemporary human life. You can today use computer, smart phone or tablet computer in any corner of the house, in the room, in the kitchen or even in the bathroom, it's very impressive technology that enables us to surf the Internet and all things related to them from anywhere without the need for wires disturbing. But despite So not everything is fine when it comes to the quality of the signal issued by Altoger.tthbyt router devices in the home can be something very simple, but the problem is where to put the router in the house for the signal reaches all Onhaúh.ama you suffer from a weak signal Wi-Fi I suggest you try this application you will learn it together
Application you speak of is WiFi Solver FDTD, which is Android application enables you to find out the correct and proper place to put the router in your home to signal reaches all places .stlahz that the application is very easy to use and has a very nice interface.But before you use it, the demands of the design of your home (one floor) and identify the walls, as well as open spaces and the other using an image editor such as Photoshop or Gimp Ogerhma .almanm is going to be to save the file on the final shape of the image format PNG
In design, it is necessary to respect the terms of the application, it is enough that you design one floor (where the router) We do not need to Ichml stairs or Alothat.alik also differentiate between the walls, and the application uses a color system. Fallon Red refers to the wood and the blue bricks and the like, and green to the glass and everything is black represents Alvargh.kma spaces that each 1 cm corresponds to one pixel in the application. Clicking on the "open" button Open, you can open images stored on Dropbox, Google Drive or in the smartphone memory
After loading the image into the program, click on the place where the router is located (router), which will be in the form of a red dot. During this process, you can find out whether the device has a single antenna or two and you can determine this is the bottom of the application by choosing "single" instead of "double". Now, click the "Run" Run to start the evaluation process
You can perform an unlimited number of tests that you want, to find and identify the best place to Rutter for a better signal Memkna.alttbaiq found on Google Play, but unfortunately is a paid application for $ 1; but fortunately you can download it for free on the Internet, and you can use Google workers across Search for "WiFi Solver FDTD.apk"
The discovery of serious loophole Freak worry that Apple and Google and threaten millions of users
Internet News Linux Protection Technology News TuitionDiscovered a group of security researchers serious loophole enables hackers from intercepting and cracking the exchange of data between users is encrypted, the serious gap that has recently been discovered that target browsers and both Google and Apple pushed the latter two to rush in order to provide the necessary updates to users
New
loophole discovered bearing the name "Freak" or "Factoring attack on
RSA-EXPORT Keys" and targeting more than one-third of existing sites on
the Internet, even those that use Transport Layer Security and SSL,
which guarantees a high level of security protocols in the hierarchy
system, where hackers managed between the user of the presence in the first
end of the connection between the target and the location in the second
party and thus launch an attack from the type of "attack man-in-the
middle" or "Man-in-servers the-middle attack"
New
discovery is the result of the work of a group of security researchers,
the French and the Americans, and is back for more than 10 years but
remained undetected, and threaten mainly security protocols used in
browsers both Google and Apple, where they can use this loophole to
force the browser to use low encryption levels Then break the encryption in a few hours and then access to the private data of users of the definitions and passwords
Researchers
gung confirms that the gap recently discovered "Freak" untapped yet,
but they pointed out that the main reason for this gap is due to
American policy in the field of IT security as the US government to
prevent the presence of high encryption levels or locked dramatically
and is data encryption systems What began in applied since the end of the nineties, where he became the Information Security Standards currently beating
And announced that each of the two Google and Apple and the two
magnets trouble spots core of this loophole for the availability of a
security update Express during the next week
Android phones batteries can spy on its users!
Android Internet News Marketing Phones Protection Technology News Tuition
It
is known that one of the most important means to determine the geographic
location of the users of smart phones and the most common is "GPS" or
well over Wifi technique, but it seems that there is a way other unexpected and
may be able to as well as to determine the geographic location of the users of
Android phones, this new method is based on energy
consumption for smartphones batteries.
News
moved a number of sites, including the site of British Broadcasting Corporation
(BBC) where indicated that four Android phones batteries can spy on its users!
Summary from Stanford University in the United
States conducted new research revealed through the study of energy consumption
for smartphones engaged by Android may be a way to determine the geographical
location of the user .
And
in order to prove their point of view the four researchers develop an
application "PowerSpy" able to study the energy consumption of the
battery user phone and based on this method can determine the geographical
location without the need for technology and meets or GPS, which unlike them,
this application does not require user consent or
knowledge of what it is to connect automatically.
The
new application only needs to connect the mobile phone network and to enter a
power management in smart phone settings in order to determine the geographical
position of the user accuracy by up to 90 percent.
News moved a number of sites, including the site of British Broadcasting Corporation (BBC) where indicated that four Android phones batteries can spy on its users!
Summary from Stanford University in the United States conducted new research revealed through the study of energy consumption for smartphones engaged by Android may be a way to determine the geographical location of the user .
And in order to prove their point of view the four researchers develop an application "PowerSpy" able to study the energy consumption of the battery user phone and based on this method can determine the geographical location without the need for technology and meets or GPS, which unlike them, this application does not require user consent or knowledge of what it is to connect automatically.
The new application only needs to connect the mobile phone network and to enter a power management in smart phone settings in order to determine the geographical position of the user accuracy by up to 90 percent.
The Israeli army is "hackers" at the top of the pyramid of Moroccans enemies
Internet News Linux Protection Technology News
Zionist
army put hackers Moroccans in the top of his enemies cyber according to
the results of an Israeli investigation in cooperation with the US Air
Force reached through Israel to the fact that Moroccan pirates backed by
pirates from Egypt and Palestine has caused much damage to Israel after
their attempts intensified during 2013 and during the recent aggression
on Gaza Gaza.
According
to sources, the newspaper "Harters" Israeli published by the newspaper
"Hesberas" reveal that the Moroccan pirates in the World Wide Web drove
along hackers from Egypt and the Gaza Strip, Palestine, attacks pitched
launched in the month of January 2013 affected the information systems
of many Israeli institutions, and the main objective of the these attacks is a painful blow to the Israeli army.
The
investigation revealed that the "hackers" sent e-mails from Morocco,
for piracy information systems and financial and military Israeli
institutions, not the Israeli government has been unable to determine
the identity of the owners of these e-mails, and data Qrsnoha of Hebrew
government site size, and also be able to determine the movement of the
attacks Are were individually or collectively? Especially that hackers Moroccans support both Egyptians and
Palestinians colleagues have simultaneous operations and regular
professional rely same method.
Israel and know every year tens of thousands of attacks led by
hackers "Anonymous" Arabs and Muslims, according to the Israeli
newspaper, the prompting of the Zionist entity for the investigation of
this matter is that hackers Moroccans together with their fellow
Palestinians and Egyptians had attacked government positions and
security positions of the Israeli army.
Reload this very important program Defender done by Microsoft to protect Windows users.
Internet News Programs Protection Technology News
Microsoft released a new update for the program "Windows Defender" on anti-virus and malicious software on a Windows computer.This is necessary to update the program Defender comes to combat
malicious software known as "Super Fish" Super Fish, the same code that
found previously Mtbuth on multiple computers for the company, "Lenovo".This malicious software ("Super Fish") called "hacker friend" name so
that it was able to spy on users and have negative effects allow pirates
to facilitate the work of the hack.It is also the fact that the negative effects of software "Super Fish"
accessories that are added to the Internet browsers allow showing ads
automatically in any location and this is what bothers a lot of users
and expose them in many cases to spy on them or attempted penetration
into.
And
works of the new Windows Update to reduce the effects of software
"Super Fish", and off and delete any certificate of authenticity
recorded by the system, and as a comment from the CEO of security "Firm
Errata" in the United States, "Robert Graham": "Super Fish program
generates many of malware, and opens the encrypted paving the way to pirate their games in order to exercise their communications. "Microsoft
and was told that all users can Tthbyt new selection program through
Windows Defender downloaded from its official website: windows.microsoft.com or work an automatic update of the program on the
computer.
Sites, programs and tools useful [37] (site to receive SMS messages online US and Canadian numbers, another site to browse any site that is not available online ..)
Internet News Marketing Programs Protection Technology NewsThe number of new series "programs, sites and tools useful" and another week Taatarafon where a group of sites and services, as well as some programs and additions to the browser, as well as the addition of some high-res backgrounds.
cachedview
Maybe sometimes surprised by the lack of a page in a site for technical reasons or otherwise, Google has a content service cache that lets the possibility browse any site or page even if it has been deleted, but of course Google is not a single platform that provides caching of web pages. This is also the site you can use it, but it also enables you to browse sites in the old copy.
creddle
If you're looking for work, the first things that you should do is to create a distinctive biography. Of course in the Internet there are a social network, a specialized Linkedin for professionals, through which you can create a CV online and carry all your information including education, experience, skills and other Altfasil.lzlk this site you can convert your file in this network to the biography elegant and tidy
maildrop
There are times when you want to download software or register at the site over the Internet, and are always demands typing your email address to send the activation link, or simply to gain access to a product that Thtajh.lkn you do not want to share your email with these sites or services, especially if you use them only once, for this you can use this site to create a temporary email.
papaly
Is an excellent service for the management of all the pages and sites, the links that you visit in the day or week, where this service to store all this in one place. What makes this an excellent tool is that you can save links the way you want, because you can be classified into categories, and you can set the colors of them for quick access to them, in addition to a host of other features that can be detected.
namecheckr
This site lets you search for your name or any other name you want to make sure that the services provided by the various sites on the Internet, this is the service you search for your name in all the famous sites, as well as you can be exploited to search for the expense of anyone else.
recibirsms
There are a lot of services on the Internet that you need to provide a phone number US to activate your account by CODE one who is sent via SMS to this number, so the oldest such site that provides you with different numbers (one Canadian and the other American) to receive these messages via the Internet .
Hacker Vision
Is the addition of the Google Chrome browser that allows you to surf the sites offer the advantage of the night, which reduces the brightness of the display light at night, in order to keep the eye from damage caused and the potential of high light emitted from a computer screen.
X-notifier
A beautiful addition to Firefox lets you access your email messages in all your accounts in various services such as beautiful, Outlook, etc in one place, as well as beautiful that you can receive alerts for new messages received for one of your accounts directly from your browser.
Cl1ckClock
Very nice and neat program works as ad-hoc shut your computer according to the time you specify, beautiful in the program is the ease and Tsamal wonderful .ikva that you select a time interval that you want to be amortized computer automatically according to him, so you can listen to music and relax or sleep without having to worry about computer in the business of survival throughout the night.
VeraCrypt
Is one of the most important and the best software to encrypt files on Linux, which of course the best alternative to the famous Windows "TrueCrypt" program .bl case you can consider the latest version of the latter.
Beautiful backgrounds for this week
Occasum
tiger
How to Engage whatsApp Firefox
Internet News Protection Technology News TuitionWe've all heard the launch platform for Web application whatsApp web. Where it has become possible to access and chat with contacts from the use of Google Chrome browser, but unfortunately it if you try to use the web version of the application on August Alwats Vaaverwox they are to learn. But thank God that he was launching a new add-on Firefox unofficial name Enable WhatsApp Web 0.1.2 to run the Web version of the Watts August on Firefox. All you need to do is download the tool from Firefox shop applications from here:Enable
WhatsApp Web 0.1.3 .And press the yellow button Add to Firefox in order to add the addendum to the Firefox browser.
And enjoy using copy Watts August on Firefox. As it did in the picture above!
الاشتراك في:
الرسائل (Atom)
Popular Posts
-
Hello to the new offer for a free VPN for a year :) Perhaps this season is full of deals that belong to obtain a free VPN also that ma...
-
Were detected during the last few hours on the technical specifications Accountants Allohieddin new model of Samsung Galaxy Tab S2, Al...
-
The site yts of famous sites in the presentation of the latest download movies via torrent. The site also provides all the high-quality fi...
-
Without a doubt , a large number of those who follow the new wearable devices technology and smart glasses especially , they ...
-
The site yts of famous sites in the presentation of the latest download movies via torrent. The site also provides all the high-quality fi...
-
Do you suffer from the problem of not being able to write quickly on your android because of the many buttons as well as the small siz...
-
The site yts of famous sites in the presentation of the latest download movies via torrent. The site also provides all the high-quality fi...
-
$ 3.5 million !! This nearly 33 million dirhams !! Is the price reached by phone iPhone 6 posed Goldegenie Company Xswoa...
-
Yes, the words "sex", "porn", "hot" and explicit photos "are more words that are excavated in the f...
-
Less than a week for the Taiwanese company HTC revealed in the March 1 next for new smart phone "HTC One M9" on the sideline...