Skip to main content


Showing posts from August, 2014

Mega Hack Discovered

A huge attack on US systems was discovered by security outfits, which has supposedly stolen 1.2 billion user name and password combinations plus over 500 million email addresses.The intrusion was discovered by a company called Hold Security and was alleged to include confidential content collected from 420,000 websites, including household names and small sites. The security outfit has a record of uncovering huge hacks – for instance, it was the one to discover the 2013 theft of tens of millions of records from Adobe Systems. This means that Hold Security could have been seen as a reliable source.

The company claimed that the hacking attack was discovered after over 7 months of research and was being carried out by some unnamed Russian cyber gang. Apparently, the latter now owns the largest cache of stolen information.
Now, what many of the comments about the breach online center on is the fact that the security outfit is offering a $120 per month breach notification service allowing pe…

50 Linux Security Applications For Your Arsenal

This is one hefty list to have, make sure you're updated and on your toes with respect to security!

The security and sanctity of your Linux systems is of prime importance off late, especially with new and improved threats coming up from every nook and corner of the digital age. It is therefore essential to know and understand the various tools that exist out there to maintain the Linux system security.


Essentially used to prevent, detect and remove malicious computer viruses. Most of them also work well against other types of malware: browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, among others.


2.AVG Free





Essentially provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware and blocks any threats it comes…

Ten Important Rules Of Ethical Hacking

The world of ethical hacking too is bound by a set of rules and principles, here are 10 crucial ones!

Time and again we have been bringing you valuable resources on ethical hacking since we know and understand the nature of things as far as security goes. Ethical hacking is picking up steam each day with more and more organisations spending heftily to maintain the sanctity of their systems and data. As such, ethical hacking is a glorious career option in the current scheme of things.

1.Set your goals straight

To begin with, an ethical hacker must start thinking like the intruder. He must be able to identify the loopholes on the target access points or networks that are prone to attack, he must be aware of the repercussions of these loopholes and how the intruder can use it against the same. An ethical hacker then has to find out if anyone at the target notice the intruder's attempts to carry out his/her acts. Finding out and eliminating unauthorised wireless access points is always t…

Had Enough Of Unity/GNOME 3? Here Are 5 Good Alternatives!

If you're looking to go beyond Unity/GNOME 3, well, there are many alternatives that await you!

Unity and GNOME 3 are perhaps the two most well known desktop environments that ever came into existence in the world of Linux and open source. Both of them boast of tremendous functionality, crisp speed and yet they are very user-friendly. No wonder, more and more people use either for their everyday/professional tasks. However, the world of Linux doesn't let you live with those two alone but gives you alternatives that are at no less if not more.


-Designed with the goal to provide basic desktop functions and applications for daily needs as well as tools and documentation for developers to write stand-alone applications for the system, KDE is perhaps one of the most notable and familiar alternative to the said DEs. The DE has managed to hold on to its fort against time and still stands as an ever user-friendly environment that is beyond doubt one of the most visually attractive …

8 Firefox Tricks You Should Know!

Speed up your browsing on Mozilla's Firefox with these awesome tricks we have compiled just for you!

Mozilla's Firefox is undoubtedly one of the most preferred choice for developers/designers as far as web browsers are concerned. The fact that it lets you play around conveniently with its settings so as to ensure you have an amazing browser experience all the time makes it one of the better options available today. Did you know, there are a few interesting tips and tricks that can speed up Firefox remarkably? 

1.Do you know these Keyboard Shortcuts?

-Spacebar: page down

-Shift-Spacebar: page up

-Ctrl+F: find

-Alt-N: find next

-Ctrl+D: bookmark page

-Ctrl+T: new tab

-Ctrl+K: go to search box

-Ctrl+L: go to address bar

-Ctrl+=: increase text size

-Ctrl+-: decrease text size

-Ctrl-W: close tab

-F5: reload

-Alt-Home: go to home page

2.Do you know these Mouse Shortcuts?

-Middle click on link: opens in new tab

-Shift-scroll down: previous page

-Shift-scroll up: next page

-Ctrl-scroll up: decrease text …

76,000 Mozilla Developers’ Email Addresses Compromised

A few days ago, members of Mozilla’s developer community were notified of the accidental leak of email addresses and encrypted passwords. This was a result of the failure of a “data ”sanitization process carried out by the company.
Mozilla is known worldwide for its Firefox Internet browser. The company coordinates the development of some open-source software projects via its Mozilla Developer Network.
From 23 June and for about 30 days, the company admits, data sanitization process had been failing. This caused the accidental disclosure of MDN email addresses of almost 76,000 users plus encrypted passwords of 4,000 users on a publicly accessible server. However, Mozilla said those passwords had been stored as salted hashes – an encryption process which rendered it computationally impossible to retrieve the original password in a readable format. The company also says that, by themselves, the passwords now can’t be used to authenticate with the MDN website.

Still, Mozilla added that some…