Sudo on Windows is not as good as it claims to be.
The new sudo command on Windows is not as good as it seems, not compared to Linux.
The new sudo command on Windows is not as good as it seems, not compared to Linux.
There is an exploit that has been found in Linux that can overwrite the /etc/shadow file with a new password for root. But this requires the setuid root bit for Xorg and to be run from a text console that is not already running Xorg. So this will only work on an older Linux system. … Read more
This image is a photograph of an ATM machine that has Windows 7 installed, this machine requires Windows 7 activation… This is an Ethernet connection that is over 231 meters long. Far too long for a standard Ethernet connection. The maximum range of a cable is 100 meters according to Cisco CCNA for 100Base-TX cable. … Read more
This is the beginning of the end for the Internet if the Attorney-General George Brandis gets his way. There are a large number of people downloading the latest episodes of Game Of Thrones, but this is a massively popular TV show. The battle at the wall was well worth watching. People want the episodes as … Read more
Epic failure computer consultant. Put the captions on as this video is in Hebrew.
The Iron man 3 movie shows Tony Stark using a computer with IP addresses that have numbers greater than 255. This is not possible; the largest number you can have is 255.255.255.0 There is another scene where he is using Speedtest.net. This is a strange thing for a defense login screen to have. The main … Read more
Hack Tuesday April 9 2013: http://mpegmedia.abc.net.au/triplej/hack/daily/hack_tue_2013_4_9.mp3. Listen to this recording of the ABC TripleJ radio show Hack and hear what Malcom Turnbull is planning if the Liberals get into power in 2013. A broadband network using copper wires instead of the Labour proposed fibre to the node that would use a network capable of 100 … Read more
There is a new short film out now that has a scene where a character is using an Apple Macintosh computer, yet the terminal window has a Windows command prompt in it? The character is using the Aircrack-ng WIFI cracking utility to crack the passkey for a WIFI network, but they are using the Windows … Read more
Quoted from the website. These body scanners are an invasion of privacy and nothing more, they just want to expose people to dangerous radiation and provide an illusion of security. This video is here to demonstrate that the TSA’s insistence that the nude body scanner program is effective and necessary is nothing but a fraud, … Read more
Dick Smith Electronics, a major Australian retailer have been accused of selling used and malware infected hard drives as new, endangering the computers owned by consumers. In one instance a preacher bought an external hard drive and when he plugged it in he was greeted by a pornographic video. You would think they would be … Read more
Sony corporation has been hit by another Cyber Attack, with the accounts of 93,000 users compromised and Credit Card data possibly used to fleece the owners. This after Sony suffered the first embarrassing attack that compromised countless accounts. A Sony representative has advised that users accounts were locked down and anyone whose credit card date … Read more
This is the UNIX operating system that the computer in TRON legacy is running, it appears to be an operating system that is created by Sun Microsystems, like Solaris. The name of this operating system which is a play on the name of the Solaris UNIX operating system. The user flynn is trying to login … Read more
http://contacthelp.com/comment_list.php?listing=287 The Hotmail service has gone through a rough patch at the moment, the service is now unavailable and will be for some time for many users. This is not a good thing if you had Ebay and other services linked to this account and you can not log in at all, there are many … Read more
It is not surprising that so many Facebook accounts get cracked into and the data used for evil purposes. The users need to wake up and pay more attention to security. I have a very complex password on my site and everyone on Facebook or Friendface or whatever site you use should have a good … Read more
The computers belonging to the Prime Minister Julia Gillard have been compromised in a coordinated cyber-attack by Chinese terrorist hackers. This on top of the incident where all Internet traffic for a time was re-routed through China allowing Chinese authorities to sort through sensitive western data. The computers that were cracked into had very simple … Read more