Microsoft says, no free Windows 10 for pirates, beta tester

Microsoft announced that there will be no free Windows 10 for pirates, beta tester Microsoft again backtracked on who’ll get Windows 10 for free and who won’t. On Friday, it announced that any user who is registered with Microsoft’s Insiders Beta Version of Windows 10 will get a free version of it. Later, the blog…

Facebook working with Kaspersky to improve the online security of its users

Facebook working with Kaspersky, F-Secure, ESET and Trend Micro to detect and clean the malware from its user’s machine. Facebook announced today that its working with Kaspersky and other security firms like ESET, F-Secure and Trend Micro to detect and remove malware from Facebook users’ computers. Trevor Pottinger, a Facebook security engineer said: Thanks to…

Google Admin Console has a Security Flaw

Summary: Google Admin Console has a Security Flaw which can be used by attackers to claim domains and send out spoof emails. As reported by Security Week, Patrik Fehrenbach and Behrouz Sadeghipour found a security flaw in Google Admin Console to gain temporary ownership of any domain. Google Admin Console is actually a web platform…

Lenovo installing Adware – Superfish – on new Computers and Laptops

Lenovo installing adware

Lenovo has been installing an adware named Superfish onto new computers. The adware gets installed automatically when the computer is started for the first time. The adware injects third-party ads on Google searches and websites without the user’s permission.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

Facebook Legacy Contact – Facebook is including an alternate option for its users which they can choose before they die

Facebook is accommodating its customers control over what happens to their Facebook accounts when they pass away. Until now, Facebook allowed people to change the profiles of their loved one into “memorialized” accounts after Facebook affirms that individual has passed on, meaning that the record could be seen however not be administered or modified. But Facebook is…

Microsoft patches 15-year old Vulnerability – JASBUG

Microsoft recently issued a basic patch to settle a 15-year-old defenselessness that could be abused by programmers to remotely seize clients’ PCs running all backed forms of Windows working framework.

The basic defenselessness — named “JASBUG” by the specialist who reported the imperfection — is because of a defect in the key configuration of Windows that took Microsoft more than 12 months to discharge a fix. In any case, the defect is still unpatched in Windows Server 2003, leaving the adaptation totally open to the programmers for the staying five months.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

6 Mobile Apps you can use to live a Healthy Life

Instead of buying an expensive gym memberships, signing up for a diet programs or paying for weight loss experts, why not turn to the world of technology and use your mobile phone to help with your weight loss goals?

These six lesser-known mobile apps will not only help you track your food and activity, they’ll also hold you accountable for the goals you set and help create healthy, long-lasting habits.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

IPv6 Information and Security Issues

IPv6 Information and Security Issues

Abstract
Internet Protocol IP version 6 (IPv6) was developed to address the growing depletion of IP version 4 addresses (IPv4). IPv6 also provides richer feature set and better security than IPv4. However, the adoption of the new protocol in organizations has been slowed down by inherent security issues. The transition from IPv4 to IPv6 is faced with many security challenges as well. These issues threaten the mainstream adoption of the protocol. The paper seeks to explore the security issues of IPv6 and the research community’s response to those challenges.

Introduction
The rapid adoption of the Internet in the global economy has resulted in a rapid exhaustion of IP addresses. Also contribution to this exhaustion of the IP addresses is the range of devices that are now using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for communication. These devices include cell phones, home appliances, wireless gadgets, vehicles, and gaming devices. There is many developing countries and China who report that lack of adequate IP addresses is hampering their development. Other concerns with IPv4 are that its configuration nature is leading to problem where router table entries were getting too large, and that the protocol has limited security. In response to the growing need for more IP addresses the Internet Engineering Task Force (IETF) established IP version 6 (IPv6) to provide a bigger address space.

I just love to learn new things and experiment with it. Learn, Experiment, Share, Grow. I am a Computer Engineer since 2007 having MCP, MCSA, CCNSP and MCTS certifications.

Free Email Updates
Get the latest content first.
100% Privacy Guaranteed. We don't spam.