code

Wed
11
May
Dennis Faas's picture

Skype Preps Patch For Malicious Mac Infection

Online phone service Skype is preparing to fix a bug in the Mac edition of the system that could allow hackers to take control of a computer remotely. The site that discovered the bug has accused Skype of dragging its heels on the issue. Gordon ... Maddern of purehacking.com says he discovered the bug entirely by mistake. He was talking to a colleague on a Skype connection about some code written for a client. To his surprise he was able to make the code run on his colleague's computer. Upon closer examination, Maddern discovered that the hack only worked where the recipient's computer was a Mac ... (view more)

Fri
15
Apr
Dennis Faas's picture

New Trojan Locks Windows, Racks Up Phone Charges

Windows users are being targeted by a new scam that extorts money through long-distance telephone calls, racking up heavy charges. After a victim mistakenly downloads and installs a Trojan onto their PC, the following message is displayed on a ... Windows PC: "This copy of Windows is locked. You may be a victim of fraud or there may be an internal error". While similar messages have appeared before and related to scareware and ransomware scams, the fact that the Windows operating system will not reboot (either in normal mode or safe mode) adds validity to the alleged crisis situation. Victims ... (view more)

Fri
12
Nov
Dennis Faas's picture

'Code Lobster PHP Edition 3.6.2', and 'HD_Speed 1.7.0.87'

Code Lobster PHP Edition 3.6.2 PHP is a programming language for HTML (hypertext markup language) used on web pages. Codelobster PHP Edition streamlines and simplifies the PHP development process. You don't need to remember the names of functions, ... arguments, tags and their attributes. Instead, CodeLobster has implemented it for you in the autocomplete feature for PHP, HTML, JavaScript and even CSS. Also, you can always get necessary help information by F1 or using special Help control. http://www.codelobster.com HD_Speed 1.7.0.87 HD_Speed measures both sustained and burst data transfer rates ... (view more)

Wed
22
Sep
Dennis Faas's picture

Google Beefs Up Online Security Using Cellphone SMS

With many tech analysts predicting that cloud computing will be an important part of how companies conduct their future business, Google has intervened by clamping down on potential hackers and would-be identity thieves. Second Password Code Sent ... via SMS, Cell Phone Using simple passwords for an online account makes you prone to hackers, and this is especially true for corporate accounts. In response to the call for greater security, Google has implemented an additional (and optional) security measure which requires users enter a random six-digit code after entering their password. The random ... (view more)

Tue
31
Aug
Dennis Faas's picture

All Windows Users at Risk of Quicktime Flaw

Shortly after announcing a severe iTunes flaw that affects over 40 Windows applications just last week, it now appears Apple's popular media player, QuickTime, also includes a flaw that could be exploited by hackers to execute malicious code on PCs ... using the Windows operating system (OS). Even systems running more recent versions of the OS, Windows Vista and Windows 7, are vulnerable. "At present the security vulnerability seems to be with users that run Internet Explorer. Given the relative ease with which [the exploit was demonstrated], the chance for drive-by [download] attacks to ... (view more)

Tue
29
Dec
Dennis Faas's picture

Researchers Crack GSM Cell Phone Security

Hackers could soon be listening to your cellphone call. That's the word from the Chaos Communication Conference in Berlin, an annual get-together for hackers. Cryptographers at the conference say they've been able to crack a code that, on a normal ... day, prevents the interception of mobile phone calls by forcing those phones to consistently change frequencies across a list of about eighty channels. Since those not working for a cellphone company would have an almost impossible time knowing the sequence of this frequency change-up, hackers usually have no way of intercepting more than a few ... (view more)

Mon
21
Dec
Dennis Faas's picture

MS Pulls Plug on Blog Service after Cries of Plagiarism

Microsoft has apologized after a contractor appeared to copy code from a rival company to use in a microblogging service. But Plurk, the company claiming its material was stolen, says it is considering taking the matter to court. Juku, a ... Twitter-style blogging feature on Microsoft's MSN site in China, was taken down this week after the complaints. Plurk's staff had written that Juku's design had involved "blatant theft of code, design, and user interface elements." As Much as 80% of Code Stolen Not only did Plurk staff believe Juku's look and feel was remarkably similar to its own site, but ... (view more)

Wed
27
May
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. The tools are are intended to conceal running processes, files or system data, which allows the intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a Rootkit A rootkit typically hides logins, processes, files, and logs and may include software to ... (view more)

Fri
01
May
Dennis Faas's picture

Release Candidate

Release Candidate (RC) The term release candidate (RC) refers to a software version with the potential to be a final product, ready to be released to the public for final testing. In this stage of product stabilization, all product features have ... been designed, coded and tested through one or more Beta cycles with no known software bugs (defects). During the 1990s, Apple Inc. used the term "golden master" for its release candidates, and the final golden master was the general availability release. Gamma, Delta, Omega, Zenith Release Candidates Other terms include gamma (and occasionally also ... (view more)

Mon
16
Feb
Dennis Faas's picture

New Malware 'Virux' Spreading Rampant in US

A new strain of malware that can spread rapidly from machine to machine using a variety of infection techniques, including the poisoning of web servers which then go on to contaminate visitors, has reportedly been identified by Security Researchers. ... (Source: theregister.co.uk ) The malware, dubbed VIRUX by security researchers at Trend Micro, is spreading around the globe, but seems to be propagating faster in the U.S. than anywhere else. (Source: trendmicro.com ) VIRUX appears to be more complex than its cousin VIRUT and has the ability to circumvent Microsoft's Windows Firewall security ... (view more)

Pages

Subscribe to RSS - code