8 Best Android Apps To Improve Privacy and Security in 2015

Just to have a good anti-virus protection app in your smartphone doesn’t mean a complete Security. As Mobile Device Security is comprised of security of different features, such as: Data privacy and security features Permission restrictions for snoopy apps A blacklist for undesired calls An excellent backup capability, in case your smartphone gets deteriorated. As well as encryption Source: Hacker […]

» Read more

The Great… Great… Firewall of China Hijacks Facebook Connect Plugin

From past few days, Internet Users in China are dealing with a weird redirection of traffic nationwide while accessing any website that makes use of connect.facebook.net resource. Great Firewall of China, which is infamous for the Internet censorship by Chinese government, believes to be intercepting the JavaScript module used by Facebook Connect Login, which is meant to allow third-party Source: […]

» Read more

[Video] PayPal Remote Code Execution Vulnerability Demonstrated by Hacker

A critical remote code execution vulnerability has been reported in the eBay owned global e-commerce business PayPal that could be exploited by an attacker to execute arbitrary code on the PayPal’s Marketing online-service web-application server. The remote code execution flaw, discovered by an independent security researcher, Milan A Solanki, has been rated Critical by Vulnerability Lab Source: Hacker News

» Read more

Crazy! Hacker Implants NFC Chip In His Hand To Hack Android Phones

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn’t forget that with the advance in technology, the techniques used by cyber criminals also improves. Today, What hackers need to conduct a successful cyber attack? Maybe just a computing device injected […]

» Read more

WordPress Blog Brute Force Flood Underway !!

Recently we have seen on-going global attack on WordPress installations across every web host in existence. This attack is well organized and specially targets the file wp-login.php. Some of the ramifications of this attacks  are 1) Sites are loading extremely slow.2) Unable to login to WordPress Admin Panel.3) Website could even intermittently go down for undisclosed periods of time. So […]

» Read more

Setup HAProxy on CentOS !!!

HAProxy stands for High Availability Proxy, for the High Performance TCP/HTTP load balancing. Installation Steps : # yum -y install wget gcc gcc-c++ autoconf automake make # wget http://haproxy.1wt.eu/download/1.4/src/haproxy-1.4.20.tar.gz /download # tar -zxf haproxy-1.4.20.tar.gz # cd haproxy-1.4.20 # make TARGET=centos # cp haproxy /usr/sbin/haproxy Now take configuration files : # wget http://layer1.rack911.com/haproxy/haproxy-standard.cfg -O /etc/haproxy.cfg # wget http://layer1.rack911.com/haproxy/haproxy.init -O /etc/init.d/haproxy ================================================Sample […]

» Read more

How to install maldet in linux server !

Maldet also known as Linux Malware Detect virus scanner for Linux. Go to the below path:     cd /usr/local/src/ Download the tar file using the below link:     wget http://www.rfxn.com/downloads/maldetect-current.tar.gz Extract the file using the below command:     tar -xzf maldetect-current.tar.gz go to the maldet folder:     cd maldetect-* Now, run the below command to install maldet:     sh ./install.sh […]

» Read more

Unsuspending Bandwidth Limit Exceeded user/domain

Hello,If domain is giving the error of “Bandwidth Limit Exceeded” you can unsuspend it from WHM or terminal as well.From WHM :To bring the website back online or un-suspend the bandwidth exceed-er, use the optionWHM >> Account Functions >> Unsuspend Bandwidth Exceeders >> click “Proceed”.This will reset the bandwidth usage to zero for the account. To increase the bandwidth limit […]

» Read more
1 23 24 25 26 27 31