Skip to main content

Posts

Showing posts from September, 2017

Pulse Wave Techniques Allow Cybercriminals to Quickly Ramp Up DDoS Attacks

By Shane Schick

Bigstock What used to be a gradual buildup of botnet traffic in distributed denial-of-service (DDoS) attacks has morphed into a series of pulses that spray at different targets like a water cannon, security experts have learned.
A blog post from security firm Imperva Incapsula looked at attacks that have taken place so far this year. Whereas cybercriminals traditionally use an army of bots to force a website offline, the researchers discovered pulses of activity that seemingly come out of nowhere with peak impact. In other words, rather than switching on the bots and creating a slow but steady wave, threat actors are now keeping them on at all times but distributing them differently. An Instant Crescendo of Malicious Traffic Companies have tried to mitigate the effects of the attacks by shifting traffic from an on-premises environment to a cloud-based failover area, according to Naked Security. But the near instant crescendo of traffic during these attacks means that t…

Researchers Show Danger of DNA Data Paired With Malware-Infected Strand

By Shane Schick Bigstock Security flaws in bioinformatics software have allowed researchers to demonstrate how DNA data could be injected with malicious code to disrupt police forensic investigations or steal intellectual property. Lab Analysis Tools at Risk A group of academics from the University of Washington used the 2017 USENIX Security Symposium to present their findings, which exposed vulnerabilities in the applications that are often used to analyze DNA data after it has been sequenced. In a paper, titled, “Computer Security, Privacy and DNA Sequencing: Compromising Computers With Synthesized DNA, Privacy Leaks and More,” the researchers discussed how they not only made use of a bug in a processing program, but also injected malware directly into a strand of DNA. As Infosecurity Magazine explained, the executable file was launched as the DNA data was being sequenced by the bioinformatics tool, allowing the researchers complete access to the systems running it. The technique is…

Industrial Cobots, Researchers Warn

Bigstock A string of security weaknesses in areas such as default configurations, authentication mechanisms and open source components could enable cybercriminals to easily take over robots used in industrial settings, researchers warned. An analysis of major industrial and collaborative robots, or cobots, by IOActive revealed close to 50 vulnerabilities that, if exploited, could harm the people who work with them. The firm created a series of videos to demonstrate what tampering with cobots could look like, including swinging robotic arms that have had safety features and emergency settings disabled. Industrial Cobots Put Workers at Risk The general public might not be familiar with cobots, but they are far more advanced than you might expect. Companies such as Rethink Robotics, Baxter/Sawyer and Universal Robots have designed cobots to assist human employees with various tasks, using microphones and cameras to see and hear, SecurityWeekreported. That potentially makes them even mor…

Scientists Show How Speech Recognition Software Can Be Compromised via Ultrasounds

By Shane Schick Bigstock Consumers love the convenience of virtual assistants such as Siri, Alexa and Cortana, but a group of researchers has discovered an easy way to compromise the software behind them by using ultrasounds that are inaudible to the human ear. DolphinAttack Experiment Breaches Speech Recognition Software Six scientists from Zhejiang University in China posted a video that showed how these inaudible voice commands can occur. The researchers dubbed their experiment the “DolphinAttack” because of the way dolphins seem to communicate without making noises. By using simple off-the-shelf hardware that costs only $3, they were able to breach speech recognition software from Apple, Google, Amazon and others. Turning voice commands into ultrasound frequencies allowed them to take over smartphones, speakers and even a smart car model from Audi. Although most of what the researchers did was fairly innocuous, such as launching music or video calling applications, malicious actor…

Display Widgets Plug-In Conducted Malware Attack Across 200,000 WordPress Sites

By Shane Schick
Bigstock Approximately 200,000 websites running WordPress have been affected by a malware attack from a plug-in that installed a backdoor, allowing a malicious actor to publish spam, collect IP addresses and more. Wordfence, a security firm that focuses on the popular content management system, said in a blog post that the malware attack has been traced to a plug-in called Display Widgets, which was purportedly designed to manage the way other plug-ins are displayed on WordPress sites. Though it has recently been removed, the threat actor behind the malicious activity did not give up easily. According to SecurityWeek, the original creator of Display Widgets sold it in late June, after which it was almost immediately updated with a backdoor. David Law, a freelance SEO consultant, noticed the initial malware attack and informed Wordfence, which removed it from the WordPress plug-in repository. Just a few days later, however, Display Widgets emerged again, this time with a…

vmware

5A02H-AU243-TZJ49-GTC7K-3C61N1F04Z-6D111-7Z029-AV0Q4-3AEH8GV7R8-03G44-4855Y-7PWEE-NL8DACV79K-8ZD0Q-0807Z-KZQGT-WG8W0YY5M8-89W4P-489FQ-XNNNX-Q2AXAZF55H-ARG0N-M89QY-FZPZZ-ZKRUAGY7EA-66D53-M859P-5FM7Z-QVH96UC3WA-DFE01-M80DQ-AQP7G-PFKEFCC15K-AYF01-H897Q-75Y7E-PU89AZA1RA-82EDM-M8E2P-YGYEZ-PC8EDVF1N2-8DX1K-M8D0P-6FZG9-NVKZ4UV31K-2NG90-089XP-UZP7G-YAHU2CA5MH-6YF0K-480WQ-8YM5V-XLKV4UZ1WH-0LF5K-M884Z-9PMXE-MYUYAFV3TR-4RWEM-4805P-6WYEV-QF292FV30R-DWW1H-08E6P-XDQNC-MC2RFZZ10H-4MGEK-489AY-74WNX-MQ2A4

win keys(only setup )

Windows 10 HomeTX9XD-98N7V-6WMQ6-BX7FG-H8Q99WNCQP-HKJCQ-TPYT6-KWQ93-C37X7Windows 10 Home Single Language7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFHWindows 10 Home Country Specific (CN)PVMJN-6DFY6-9CCP6-7BKTT-D3WVRWindows 10 Home N3KHY7-WNT83-DGQKR-F7HPR-844BMWindows 10 ProfessionalW269N-WFGWX-YVC9B-4J6C9-T83GXVK7JG-NPHTM-C97JM-9MPGT-3V66T8N67H-M3CY9-QT7C4-2TR7M-TXYCVR7VPR-RNR68-DD9GD-DH4HX-XKX2PWindows 10 Professional NMH37W-N47XK-V7XM9-C7227-GCQG92B87N-8KFHP-DKV6R-Y2C8J-PKCKTWindows 10 EnterpriseNPPR9-FWDCX-D2C8J-H872K-2YT43XGVPP-NMH47-7TTHJ-W3FW7-8HV2CCKFK9-QNGF2-D34FM-99QX3-8XC4KWindows 10 Enterprise NDPH

vs keys

Visual Studio 2017201715.0Professional:
KBJFW-NXHK6-W4WJM-CRMQB-G3CDHEnterprise: NJVYC-BMHX2-G77MM-4XJMR-6Q8QF Visual Studio 2015201514.0Professional:
HMGNV-WCYXV-X7G9W-YCX63-B98R2Enterprise: HM6NR-QXX7C-DFW2Y-8B82K-WTYJV2XNFG-KFHR8-QV3CP-3W6HT-683CHTeam Foundation Server: PTBNK-HVGCM-HB2GW-MXWMH-T3BJQ Visual Studio 2013201312.0Professional:
XDM3T-W3T3V-MGJWK-8BFVD-GVPKYPremium: FBJVC-3CMTX-D8DVP-RTQCT-92494Ultimate: BWG7X-J98B3-W34RT-33B3R-JVYW9Team Foundation Server: MHG9J-HHHX9-WWPQP-D8T7H-7KCQG Visual Studio 2012201211.0Professional:
4D974-9QX42-9Y43G-YJ7JG-JDYBPPremium: MH2FR-BC9R2-84433-47M63-KQVWCUltimate:

Introduction to Poetry

I ask them to take a poem and hold it up to the light like a color slide or press an ear against its hive. I say drop a mouse into a poem and watch him probe his way out, or walk inside the poem's room and feel the walls for a light switch. I want them to waterski across the surface of a poem waving at the author's name on the shore. But all they want to do is tie the poem to a chair with rope and torture a confession out of it. They begin beating it with a hose to find out what it really means. —Billy Collins src:http://www.loc.gov/poetry/180/001.html
change /001-180 to read other poems

The Summer Day

The Summer DayWho made the world? Who made the swan, and the black bear? Who made the grasshopper? This grasshopper, I mean- the one who has flung herself out of the grass, the one who is eating sugar out of my hand, who is moving her jaws back and forth instead of up and down- who is gazing around with her enormous and complicated eyes. Now she lifts her pale forearms and thoroughly washes her face. Now she snaps her wings open, and floats away. I don't know exactly what a prayer is. I do know how to pay attention, how to fall down into the grass, how to kneel down in the grass, how to be idle and blessed, how to stroll through the fields, which is what I have been doing all day. Tell me, what else should I have done? Doesn't everything die at last, and too soon? Tell me, what is it you plan to do with your one wild and precious life? —Mary Oliver



source =http://www.loc.gov/poetry/180/133.html

wifi driver rtl8192 fix ubuntu

First step

You need to get a few things installed. Those are:
  kernel headers
  build tools (gcc, make, etc)
  dkms
  git

You can obtain them by executing following commands:

For Debian/Ubuntu (and other systems equipped with apt tool)

apt-get install --reinstall linux-headers-$(uname -r) linux-headers-generic build-essential dkms git

For Fedora (and other systems equipped with yum tool)

yum install kernel-devel gcc dkms git

For Fedora versions from 23 up, use the following command
dnf install kernel-devel gcc dkms git

Second step

Obtain the fixed drivers:

git clone https://github.com/pvaret/rtl8192cu-fixes.git

Third step

Build and install a DKMS module. Execute this command without leaving the current directory!

dkms add ./rtl8192cu-fixes && dkms install 8192cu/1.10 && depmod -a

Fourth step

Block the native (and broken) drivers:

cp ./rtl8192cu-fixes/blacklist-native-rtl8192.conf /etc/modprobe.d/

Fifth step

The last step is to execute following command and enjoy your…