Get Rid of/ Remove Asrv-a.akamaihd.net Pop-ups and Speed up the PC
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Remove/ Get Rid of Websearchy.com Virus and Fix Redirects
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Remove/ Delete Trojan Horse Generic36.FGM Virus Completely
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Delete/ Get Rid of W32.runner.amo Virus and Fix Chaos
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Early Notice for Future MATE Releases
I have posted this on my Google+, but just in case you didn't see them, i will copy and paste it here:
Some headsup for future MATE 1.10 release:We (me and Chess Griffin) have decided that we will build future MATE 1.10 for Slackware 14.1 against GTK+2, the same toolkit we used to build MATE 1.8. Although MATE 1.10 will fully support GTK+3, we think it's not a good idea to introduce such as a big change for our users. This is assuming that MATE 1.10 will be released before next Slackware gets released.
However, please note that for next Slackware release, we will build MATE against GTK+3 toolkit. Expect some big changes, mainly in the UI look and feel. Have a look on this blog post by Clasen about what to expect in GTK+3-3.12 dialogs (which i think will be landing in the next Slackware release):
I have discussed it with MATE developers, and they will bump some minimum GTK/GLIB dependencies to the versions that are still available in Slackware 14.1, so we could still bring MATE 1.10 for Slackware 14.1. However, this will cause Slackware 14.0 users unable to build MATE 1.10 on their machine. They will have to stick with MATE 1.8 or upgrade to Slackware 14.1 (or newer).http://blogs.gnome.org/mclasen/2014/03/21/dialogs-in-gtk-3-12/.
I know some of you may like or dislike it, but we will try to keep our policy of bringing MATE desktop on top of latest Slackware release without modifying any core packages.
Stay tune :)
#MSB #Slackware #MATE
Early Notice for Future MATE Releases
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Microsoft includes XP users in Internet Explorer fix
Microsoft has said users of its Windows XP operating system will also get the security update it has issued to fix a flaw in the Internet Explorer browser.
It issued the update on Thursday to fix a bug that let hackers gain access and user rights to computers.
Microsoft ended support for Windows XP earlier this month, ceasing to issue bug fixes or security updates for it.
But the firm said it decided to make an exception as the flaw was discovered just days after the support ended.
"Even though Windows XP is no longer supported by Microsoft and is past the time we normally provide security updates, we've decided to provide an update for all versions of Windows XP," Adrienne Hall, general manager of Trustworthy Computing at Microsoft, said in a blog post.
"We made this exception based on the proximity to the end of support for Windows XP."
The flaw was reported earlier this week and there had been uncertainty over whether XP users would get the update when it was released.
'Tested and ready'The flaw affected Internet Explorer (IE) versions 6 to 11 and Microsoft said it was aware of "limited, targeted attacks" to exploit it.
According to NetMarket Share, the IE versions account for more than 50% of the global web browser market.
Microsoft said that hackers could exploit the flaw by hosting a "specially crafted website" designed to exploit the vulnerability.
If users visited the website, hackers could use it to gain access to their computer and get the same rights as the machine's user.
However, hackers would have needed to convince users to view and interact with the website, and would have had "no way to force users" to view the content otherwise.
On Thursday, Microsoft said its security update fixed the flaw.
"This update is fully tested and ready for release for all affected versions of the browser," the firm said.
"The majority of customers have automatic updates enabled and will not need to take any action because protections will be downloaded and installed automatically."
Microsoft includes XP users in Internet Explorer fix
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
TCP bug in FreeBSD causes crashes, memory leaks
A vulnerability that recently surfaced in FreeBSD puts users at risk of crashes, memory leaks and denial of service attacks.
FreeBSD has issued an advisory about the situation and offered a workaround to mitigate the problem. It said that there is a definite risk of exploitation, and warned users to look out for "carefully crafted attacks" on sockets.
"An attacker who can send a series of specifically crafted packets with a connection could cause a denial of service situation by causing the kernel to crash," it said.
"Additionally, because the undefined on stack memory may be overwritten by other kernel threads, while extremely difficult, it may be possible for an attacker to construct a carefully crafted attack to obtain portion of kernel memory via a connected socket. This may result in the disclosure of sensitive information such as login credentials, etc. before or even without crashing the system."
A workaround is suggested and there is a patch that can be applied. Instructions for application are in the advisory. "It is possible to defend to these attacks by doing traffic normalisation using a firewall," said FreeBSD of its workaround.
The issue has raised comparisons with the Heartbleed OpenSSL bug and there are questions about whether the FreeBSD bug is worse than the information suggests. Users and commenters on Twitter are advising that patches should be installed as soon as possible, which is always good advice.
Heartbleed made much more of an immediate impact, and that vulnerability in OpenSSL led to a series of announcements, denials and dismissals from websites, software vendors and government agencies.
TCP bug in FreeBSD causes crashes, memory leaks
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5
Anonymous develops secure data over ham radio scheme
Anonymous – or, at least, entities claiming Anonymous affiliation – has put together a secure communications project using the open source ham-radio Fldigi modem controller.
You're not going to get fast communications out of AirChat, since it takes the world back to the days of encoding data over voice channels. The group says “We traded bandwidth for freedom, or to be more exact we traded bandwidth for freedom, simplicity and low cost”.
The aim of its AirChat is to give activists a way to
communicate directly, without using Internet or cellular infrastructure, the project page at github says.
The Anonymous contribution to the world of ham packet radio is twofold, the group says: to anonymise the communication, since ham packet radio doesn't have anonymity built in; and to ignore spectrum and user licensing.
The latter carries a risk, but AirChat's author or authors believe it's justifiable. Beyond the project's rhetoric about “evil organisations like the FCC”, it is reasonable to think that an activist communicating from a trouble spot doesn't have time to obtain a ham radio license before they start communicating (and anyhow, doing so doesn't let you preserve anonymity).
Anonymity
The anonymity scheme is interesting, since over on the Internet, addressing is the always-in-the-clear metadata that makes true anonymity such a tough nut to crack. It's also very simple.
AirChat ignores low-layer addressing, (a transmission is necessarily visible to any receiver within range). So to anonymise communications, the system uses a packet, the Lulzpacket, which handles error correction and encryption.
There are two basic modes of communication: clear-text broadcasts that anybody within range can receive (as the project says, for “for general broadcasting and community discussion”); and asymmetric encryption, for anonymous communication. Everybody can receive an encrypted packet – but only the holder of the private key can decrypt it.
“Each node only cares for what is being received,” the project page states. “No hardware identification, no transmitter plain identification. Only packets matter. Transmissions are anonymous.”
The software is designed to work with any transceiver, which means users should be able to grab a cheap device, choose a frequency, and start transmitting. Of course,El Reg notes that it's best to use unlicensed frequencies if you don't want to attract the attention of your local spectrum authority.
AirChat also includes basic LAN functionality, the group says, so that users can connect a local network to an AirChat transceiver. There's also an Internet gateway with Tor and proxy support.
There's a certain amount of soldering involved in the AirChat example setup, since it uses VOX rather than a “push-to-talk” to make it simple to use.
Four insane radiocommunication facts
If there's any way to get the gadget confused, do something with radios that doesn't involve the words “WiFi”, “cellular”, or “3G / 4G / 5G”.
News of AirChat's advent has sent Motherboard into a complete head-spin, so as a public service, The Register offers this unspinner.
- 1. WiFi is radio“It uses radio waves instead of WiFi” – really, Motherboard? What does WiFi use, carrier pigeons? The “Wi” in “WiFi” stands for “wireless”.
- 2. Radio has transceivers!
“The radio communication works much like a walkie-talkie or CB radio, with the transmitter acting as a sender and receiver—only you’re sending computer commands instead of audio.”
The word Motherboard was looking for was “transceiver”, and really, transceivers are not a rarity in the radio communications world. Trust me here. 3. Radio data communication existed before 1971
“The concept has existed since ALOHAnet was introduced in 1971, a University of Hawaii project that sent data over radio.”
Actually, data – ones and zeroes – over radio have existed practically as long asradio has existed. The first application of radio was to carry pulses – Morse code, which consists of on-and-off, encoded to represent letters.
That's not to say ALOHAnet is insignificant. It's very significant: most informed commentators attribute the genesis of Ethernet – and WiFi – to that project. Really. Look it up.- Here's a quote from ALOHAnet's Wikipedia entry: “In the 1970s ALOHA random access was employed in the widely used Ethernet cable based network[5] and then in the Marisat (now Inmarsat) satellite network.”
4. Packet radio over amateur frequencies isn't new
Look up “packet ham radio” and you'll find this on Wikipedia. In fact, radio hams even made a key suggestion for this project: the choice of Fldigi for modem control was made by people from theregister.co.uk ARES, the Amateur Radio Emergency Services project, part of the American Radio Relay League.
Anonymous develops secure data over ham radio scheme
Reviewed by 0x000216
on
Saturday, May 03, 2014
Rating: 5