Pages

Monday 30 April 2012

How to Save All Tabs When Closing Firefox ?


Follow The Steps Below to Enable This Function.

1. In address bar, type
about:config
 
2. Now click on "i'll be careful, i promise!" button.
 
3. Then in search box type browsshowquitwarninger
 
4. Now double click on that option to change it's value from false to true.

5. Close about:config tab and now you can save all closing tabs.

Note:- It will not work if more than one firefox window opens.

You can also bookmark all open tabs by pressing Ctrl+Shift+d. Now in new message box click "Add Bookmarks" button.
 
 

  

Sunday 29 April 2012

Tumblr President John Maloney Steps Down, Promises “Awesome New Stuff”


Tumblr President John Maloney just posted (on his Tumblr, natch) that he’s stepping down from a day-to-day operational role at the company.
“It’s the right time for me and a good time for Tumblr,” Maloney writes. “We’re in great hands with David and the excellent leadership team we’ve built.”
However, he says he will stay involved in what sounds like an advisory role: “The transition from running ops is effective immediately, but I’m sticking close w/ [founder and CEO David Karp], the team and company. There’s more work to do and I want to help see it thru”.
Maloney became president of Tumblr in 2008, but his history with Karp goes back further — before starting Tumblr, Karp worked at Maloney’s startup UrbanBaby.
Oh, and Maloney also says that “the team will ship some awesome new stuff next week.” He doesn’t say what that will be, but he could be referring to the new paid promotional units that Karpmentioned would launch on May 2. (Random note: A Tumblr spokesperson previously told me that it’s not an “ad unit per se” but rather “a package of native promotion for the Tumblr post.”)

Was your Hotmail account hacked ?

Was your Hotmail account hacked in April? If so, it might have been on a bet. The whitec0de.com blog reports that, for $20, a member of a hacker forum offered to crack any Hotmail account within a minute – and that he kept his word. A critical security hole in Microsoft's email service was posted on a security forum allowing the hacker to change the passwords of Hotmail users.

Numerous users were affected. Some were targeted because they used their accounts to access such services as PayPal. It's alleged that the vulnerability was also used to change ownership of short account names such as ab@hotmail.com and xxx@hotmail.com.

Benjamin Kunz Mejri, a security expert who discovered the hole at around the same time as the incidents described above, has released details about the vulnerability in an advisory. According to the expert, the hole was contained in the "password reset" functionality – during one step, the Hotmail server apparently checked the existence of a token but not its value.

Simply injecting a token such as "+++)-" into requests, the attackers were able to take control of any account. Microsoft was notified by Mejri on April 6th, the problem was fixed on April 21st.

Friday 27 April 2012

Chinese Hackers continued to attack the Philippine government

hacked
Hackers continued to attack the Philippine government's online presence, with at least one agency on Thursday reporting a denial-of-service attack the night before.
The official website of the Department of Budget and Management (DBM) yesterday became the latest victim of a cyber attack by suspected Chinese hackers.The DBM website was defaced at around 2 pm Wednesday and will remain offline until the repairs are complete, according to Budget Secretary Florencio Abad. In a press statement, Abad said the DBM's official website, www.dbm.gov.ph, is currently undergoing a security audit and "may be inaccessible until critical issues are resolved."

The hackers placed a Chinese flag on the DBM website along with a caption announcing it was “Hacked! Owned by Chinese Hackers?!

The webpage also contained a message: “How come a small bitch border country are overconfident? And Challenged to Our Chinese Super Hacker?” A warning was also displayed: “Don’t Trouble Chinese, Don’t Play with Fire.”

The message indicated that those who defaced the DBM website are the same ones who attacked the Vietnamese government's website, gov.vn.

The cyberattacks on Filipino websites began last Sunday when the website of the University of the Philippines was taken down. The hackers claimed that they took down UP's website as an expression of displeasure over Manila's claim that it owns the Scarborough (Panatag) Shoal. In retaliation, groups who identified themselves as Filipino hackers also launched an attack on a number Chinese websites.

The Department of Foreign Affairs has condemned the series of cyberattacks on both Chinese and Filipino websites, saying these attacks would only worsen the tension between Manila and Beijing.

In reaction, Filipino hackers launched a series of attacks on Chinese websites starting Monday. In an operation dubbed "#OpChinaDown," Filipinos attacked the following websites:

http://www.ocex.com.cn
http://www.teawindow.com
http://www.higvod.cn
http://www.lzrk.gov.cn
http://lppm.bigc.edu.cn/Pr1vX.htm
http://xxb.leiyang.gov.cn/Pr1vX.htm
http://en.founder.com.cn
http://dxswl.cn
http://www.cord.cn
http://fmprc.gov.cn
http://www.3322.net.cn
http://wahsangtech.com/index.aspx

The attacks came as the Palace pleaded to both Filipinos and Chinese to stop attacking each other in cyber space in light of the two countries’ current conflict over Panatag Shoal

Monday 23 April 2012

PowerISO v5.1

Description:
PowerISO is a powerful CD/DVD image file processing tool which allows you to open, extract, create, edit, compress, encrypt, split and convert ISO files. Obviously PowerISO is capable of mounting these image files using its own virtual drive. It's able to process almost all CD-ROM image files including ISO and BIN. PowerISO also supports the DAA (Direct-Access-Archive) format, an advanced image format which supports some advanced features like compression, password protection, and splitting to multiple volumes.

Changes in PowerISO 5.1 (Apr 23, 2012):
+) Improve user interface.
+) Support online upgrade.
*) Improve Blu-ray disc burning.
*) Some minor bug fixes and enhancements.
 
 

Anontune - New Social Music Platform By #Anonymous


After the launch of AnonBin, alternative of PasteBin now hacktvist group is reportedly putting together a social music platform that will surely ruffle the RIAA's feathers. The project is called Anontune, and is designed to pull songs from third-party sources like YouTube. Users can throw the songs into playlists and share them with friends. The Anontune service relies on executing a Java applet. "Unless you are extremely trusting or using VMWare, you should think very carefully about running code on your machine that was written by members of Anonymous,"

 
 
They insist that Anontune will not host copyrighted material and will not be streaming music or offering downloads of copyrighted material. Instead, they plan to focus on information and they compare the platform to a search engine. "The information can be used to play and centralize pervasive music across the Internet on one platform." It's unclear exactly how this site will operate, but Anonymous seems to think that the law will be on their side this.  "The idea is that if all songs were easily accessible and centralized on one user-friendly platform that it would be possible to hijack all current users of music piracy solutions," Anonymous describes in an Anontune white paper (pdf).

Sunday 22 April 2012

Autodesk 3ds Max 2013


Autodesk 3ds Max and Autodesk 3ds Max Design software provide powerful, integrated 3D modeling, animation, rendering, and compositing tools that enable artists and designers to more quickly ramp up for production. The two versions share core technology and features, but offer differentiated experiences and specialized toolsets for game developers, visual effects artists, and graphic designers on the one hand, and architects, designers, engineers, and visualization specialists on the other. This full-featured 3D modeling, animation, rendering, and effects solution is used to produce top-selling games and award-winning film and video content. Those looking to quickly and efficiently generate convincing characters, seamless CG effects, or jaw-dropping games will want to explore this latest release of the software. Its easy-to-learn environment enables artists to quickly ramp up for production. 3ds Max is the leader in 3D animation for game development, design visualization, visual effects, and education.

Autodesk 3ds Max
Autodesk 3ds Max provides a comprehensive, integrated 3D modeling, animation, and rendering solution for game developers, visual effects artists, and graphic designers.
• Powerful 3D modeling—With an extensive polygon modeling and texture mapping toolset, modelers and texture artists can work more quickly and effectively.
• Advanced character rigging and animation—The fully integrated Character Animation Toolkit (CAT) provides an out-of-the-box advanced rigging and animation system.
• Choice of integrated renderers—Artists can create highly near realistic or stylized looks using the tightly integrated 3ds Max scan line and mental ray® renderers, including mental ray network rendering to help finish rendering faster.
• Extensible pipeline support—Developers can customize, extend, and integrate 3ds Max into their existing pipelines with support for C ++ and .NET.
• FBX Import/Export for Unreal pipelines—Create and animate 3D models in Autodesk 3ds Max and export as Autodesk® FBX® asset exchange technology files, and then import into the Unreal® Editor content creation tool.


Friday 20 April 2012

Pro-Tibetan activists become victim of Spear Phishing

Pro-Tibetan+activists+become+victim+of+Spear+Phishing

Hackers are ramping up their attacks against Tibetan activists and are using increasingly sophisticated techniques to deliver malware An interesting example of such a malicious email has recently been spotted by FireEye researcher Alex Lanstein, who is currently monitoring these spam campaigns.

In the last few of months, several security vendors have reported targeted attacks that distributed malware designed to steal confidential information from people or organizations supporting the Tibetan cause. This tactic recently re-surfaced during our monitoring of Tibetan-leveraging malware campaigns. It came in the form of BKDR_RILER.SVR, a backdoor that arrives infected by PE_SALITY.AC.

A simple Spear Phishing technique was used recently to trick Tibetan activists into opening malicious PDF email attachments, by quoting a legitimate email message sent by FireEye's Lanstein to people who submitted Tibet-related malware samples to the VirusTotal online antivirus scanning service.

According to Trend Micro researcher Ivan Macalintal, by exploiting a vulnerability, the attachment - Next Generation Threats.pdf - drops a malicious JavaScript that in its turn drops a RAT that connects to a IP address located in China. There are a few hints that the people behind the attack are Chinese. The email text was recreated under a key official character set of the People's Republic of China, and in the footer of the decoy PDF file a few Chinese characters can be found.

The said backdoor communicates the following information to the IP address about IM IDs and password, List of drives and files, User account names and passwords.

The social engineering techniques used in these attacks are increasingly sophisticated and the distributed malware is capable of infecting both Windows and Mac OS X computers. On Friday, researchers from antivirus firm Kaspersky Lab reported the discovery of a new Mac OS X backdoor which they named SabPub.

Tibetan activists are on a long hit list uncovered by Trend Micro and dubbed the Luckycat campaign it uses spear-phishing to inject Windows malware, and targets military and other sensitive entities in India and Japan as well as Tibetan activists.

Thursday 19 April 2012

Austria arrests "County's youngest hacker"

A 15 year old hacker has been arrested by the Austrian Federal Police after he went on a three month hacking spree. Allegedly, he cracked the servers of 259 companies. Those companies were both in Austria as well as internationally located. Using hacker tools, he defaced web sites and boasted of his actions on both Twitter as well as posting links to data dumps of stolen confidential info and user data. As soon as he was arrested, he confessed to the hacking. 


The Austrian Ministry of the Interior called him the country's youngest hacker and listed a wide variety of targets, which included sports equipment manufacturers to search engines, porn sites and public institutions. Operating under the pseudonym of ACK!3STX, he apparently joined a hacking forum and after finding out the site awarded points for successful hacks, he started raising through the ranks until he was among the top 50 hackers on the 2000 member site. Receiving multiple complaints from companies, the Austrian Federal police Cyber Crime Centre took over the investigation. 

Using anonymising software to hide his tracks, he eventually slipped up, which allowed the Cyber Crimes unit to track his IP address and locate his physical location in the state of Lower Austria. The investigation is ongoing, with Europol being involved because of the international nature of the attacks. The exact amount of damage done is yet to be determined.

How to fix the Windows 7 MBR for 64-Bit

WARNING 

MBR infections are only worsening and sometimes (rarely) can make computer unbootable after attempting to repair the infection. We recommend that you back up your data before hand and then continue with the below if you wish to attempt to remove this infection: 

Do you have your Windows 7 DVD? We need it to restore a clean MBR. 

[*] If your PC is not configured to automatically boot from a CD/DVD, you may need to make changes to your BIOS to change the boot order boot from CD first. Or the may be an option to automatically get to a Boot Menu at startup from which you can chose to boot from CD. 
[*] Reboot your computer. 
[*] You'll hear the DVD spinning up, be ready to press ANY key when you see the following message: 

 

[*] This takes a while to load (30-45 seconds) 
[*] When the below screen appears: 

 

[*] Select your language and click Next. 

 

[*] Click the button for "Use recovery tools". 

 

[*] Then select "Command Prompt". 

 

[*]When open, the command prompt will look like this: 

 

[*] Type in [COLOR=black]bootrec /fixmbr and press ENTER 

Note: There is only a SPACE after bootrec 

[*] You should see: 

 

[*] Type exit and press ENTER 
[*] Now restart your computer WITHOUT booting off the DVD again (don't press a key when it says... "press any key to boot from cd/dvd...") 

Now rerun MBRCheck and attach its latest log if you need help on the forums.

How to fix the Windows 7 MBR for 32-Bit

WARNING: 

MBR infections are only worsening and sometimes (rarely) can make computer unbootable after attempting to repair the infection. We recommend that you back up your data before hand and then continue with the below if you wish to attempt to remove this infection:
 

Do you have your Windows 7 DVD? We need it to restore a clean MBR. 

[*] If your PC is not configured to automatically boot from a CD/DVD, you may need to make changes to your BIOS to change the boot order boot from CD first. Or the may be an option to automatically get to a Boot Menu at startup from which you can chose to boot from CD. 
[*] Reboot your computer. 
[*] You'll hear the DVD spinning up, be ready to press ANY key when you see the following message: 

 

[*] This takes a while to load (30-45 seconds) 
[*] When the below screen appears: 

 

[*] Select your language and click Next. 

 

[*] Click the button for "Use recovery tools". 

 

[*] Then select "Command Prompt". 

 

[*] When open, the command prompt will look like this: 

 

[*] Type in bootrec /fixmbr and press ENTER 
Note: There is only a SPACE after bootrec 
[*] You should see: 

 

[*] Type exit and press ENTER 
[*] Now restart your computer WITHOUT booting off the DVD again (don't press a key when it says... "press any key to boot from cd/dvd...") 

Now rerun MBRCheck and attach its latest log if you need help on the forums.

Friday 13 April 2012

tinySpell Free Edition 1.9.43


Occasionally you need to check the spelling of words in an application that does not include a spelling checker and you don't want to launch your word processor just for that. This is when tinySpell becomes handy.tinySpell is a useful utility that lets you to easily and quickly verify the spelling of words in any Windows application. tinySpell monitors your typing on the fly and alerts you whenever it detects a misspelled word. It also checks the spelling of every word you copy to the clipboard.tinySpell installs itself in the system tray for easy access. It comes with an American-English dictionary containing more than 110,000 words.

Features:
Checks spelling in any Windows application
Checks spelling on-the-fly (alerts if the last typed word was misspelled)
Checks spelling of text that is copied to the clipboard
Allows you to specify applications for which tinySpell is disabled or enabled
Optionally beeps on error (beep sound can be easily set to any wav file)
Optionally displays a spelling tip
Opens replacements list with a simple mouse click or a hot-key
Optionally copies the selected replacement word to the clipboard
Optionally inserts the selected replacement word into the document
Allows you to add words to the dictionary
Easy Enable/Disable
Uses little system resources


Disqus

Please Comment Here