<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>techgeenix</title>
		<link>http://techgeenix.ucoz.com/</link>
		<description></description>
		<lastBuildDate>Wed, 12 Sep 2012 15:20:28 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://techgeenix.ucoz.com/news/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>What Is Social Engineering?</title>
			<description>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A social engineer runs what used to be called a &quot;con game.&quot; For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network&apos;s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical s...</description>
			<content:encoded>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A social engineer runs what used to be called a &quot;con game.&quot; For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network&apos;s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Social engineering is a component of many, if not most, types of exploits. Virus writers use social engineering tactics to persuade people to run&amp;nbsp;&lt;a href=&quot;http://searchmidmarketsecurity.techtarget.com/definition/malware&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;malware&lt;/a&gt;-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, and&lt;a href=&quot;http://whatis.techtarget.com/definition/scareware&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;scareware&lt;/a&gt;&amp;nbsp;vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Another aspect of social engineering relies on people&apos;s inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone&apos;s shoulder (&lt;a href=&quot;http://searchsecurity.techtarget.com/definition/shoulder-surfing&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;shoulder surfing&lt;/a&gt;), or take advantage of people&apos;s natural inclination to choose passwords that are meaningful to them but can be easily guessed.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people&apos;s awareness of how social engineers operate.&lt;/div&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;p style=&quot;line-height: 19.200000762939453px; margin: 0px 0px 20px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/what_is_social_engineering/2012-09-12-31</link>
			<category>H4ckers&apos; Z0n3</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/what_is_social_engineering/2012-09-12-31</guid>
			<pubDate>Wed, 12 Sep 2012 15:20:28 GMT</pubDate>
		</item>
		<item>
			<title>What Is Social Engineering?</title>
			<description>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.&lt;br&gt;A social engineer runs what used to be called a &quot;con game.&quot; For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network&apos;s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.&lt;br&gt;Social engineering is a component of many, if not most, types of exploits. Viru...</description>
			<content:encoded>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.&lt;br&gt;A social engineer runs what used to be called a &quot;con game.&quot; For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network&apos;s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.&lt;br&gt;Social engineering is a component of many, if not most, types of exploits. Virus writers use social engineering tactics to persuade people to run&amp;nbsp;&lt;a href=&quot;http://searchmidmarketsecurity.techtarget.com/definition/malware&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;malware&lt;/a&gt;-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, and&lt;a href=&quot;http://whatis.techtarget.com/definition/scareware&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;scareware&lt;/a&gt;&amp;nbsp;vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst.&lt;br&gt;Another aspect of social engineering relies on people&apos;s inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone&apos;s shoulder (&lt;a href=&quot;http://searchsecurity.techtarget.com/definition/shoulder-surfing&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;shoulder surfing&lt;/a&gt;), or take advantage of people&apos;s natural inclination to choose passwords that are meaningful to them but can be easily guessed.&lt;br&gt;Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people&apos;s awareness of how social engineers operate.&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;p style=&quot;line-height: 19.200000762939453px; margin: 0px 0px 20px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;/p&gt;&lt;br class=&quot;Apple-interchange-newline&quot;&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/what_is_social_engineering/2012-09-12-30</link>
			<category>H4ckers&apos; Z0n3</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/what_is_social_engineering/2012-09-12-30</guid>
			<pubDate>Wed, 12 Sep 2012 15:19:38 GMT</pubDate>
		</item>
		<item>
			<title>DNN Attack-An Introduction</title>
			<description>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 13px; font-family: &apos;Comic Sans MS&apos;; font-size: small; &quot;&gt;You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack.&lt;/span&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 13px; &quot;&gt;So here it is, let’s start:&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;1.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;2.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Now select any website from the list.&lt;/div&gt;&lt;o:...</description>
			<content:encoded>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 13px; font-family: &apos;Comic Sans MS&apos;; font-size: small; &quot;&gt;You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack.&lt;/span&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 13px; &quot;&gt;So here it is, let’s start:&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;1.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;2.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Now select any website from the list.&lt;/div&gt;&lt;o:p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;3.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Now add&amp;nbsp; ”&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx&lt;/span&gt;” after the name of your website in url bar.&lt;/div&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;4.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;You will get a link gallery page&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;img src=&quot;http://img834.imageshack.us/img834/390/43997343.png&quot; width=&quot;366&quot;&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;5.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;Select &quot;file”&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;6.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;Now copy this javascript in url bar.&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white; color: rgb(51, 0, 51); &quot;&gt;javascript:__doPostBack(&apos;ctlURL$cmdUpload&apos;,&apos;&apos;)&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: rgb(51, 0, 51); &quot;&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;Now you will see an upload option. Clck on that and upload your shell ASp&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;img src=&quot;http://img804.imageshack.us/img804/2255/82686308.png&quot; width=&quot;400&quot;&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;You can download it from here&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.ziddu.com/download/15017245/ASpShell.rar.html&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(0, 0, 0); &quot;&gt;http://www.ziddu.com/download/15017245/ASpShell.rar.html&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;8.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;After upload&lt;/span&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;color: rgb(51, 0, 51); background-color: white; &quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white; color: rgb(51, 0, 51); &quot;&gt;go for your shell www.yoursite.com/portals/0/yourshellname.asp;.jpg&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: rgb(51, 0, 51); &quot;&gt;&lt;span style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; &quot;&gt;EXample :&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 0, 51); &quot;&gt;&lt;span style=&quot;line-height: 20px; color: black; background-color: white; &quot;&gt;&lt;a href=&quot;http://www.itservicespro.net/portals/0/umer.asp;.jpg&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(0, 0, 0); &quot;&gt;http://ww.itservi wcespro.net/portals/0/umer.asp;.jpg&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;9.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;Now shell is in frot of you like this (screen shot)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;img src=&quot;http://img412.imageshack.us/img412/4060/27802506.jpg&quot; width=&quot;320&quot;&gt;&lt;/div&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;10.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;Click again and again on &lt;Dir&amp;gt;, untill you find admin.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;line-height: 20px; &quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;11.&lt;span style=&quot;line-height: normal; &quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 13px; &quot;&gt;When you see this page admin area, click on upload and upload your deface index page to be shown.&lt;/span&gt;&lt;/div&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/dnn_attack_an_introduction/2012-09-10-29</link>
			<category>H4ckers&apos; Z0n3</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/dnn_attack_an_introduction/2012-09-10-29</guid>
			<pubDate>Mon, 10 Sep 2012 18:32:36 GMT</pubDate>
		</item>
		<item>
			<title>PlayStation Eye will know your face and gender</title>
			<description>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;Every once in a while, some new video game technology is released that could change the way games could be played. We’ve already seen the announcement from Microsoft with their&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090602/microsofts-project-natal/&quot; style=&quot;color: rgb(27, 118, 174); text-decoration: none; &quot;&gt;Project Natal&lt;/a&gt;, and Sony is chiming in with its own great advancement. Sony has recently announced that the&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090720/playstation-eye-face-gender/#&quot; class=&quot;kLink&quot; id=&quot;KonaLink0&quot; style=&quot;color: rgb(0, 110, 184); cursor: pointer; margin: 0px; top: 0px; right: 0px; bottom: 0px; left: 0px; outline: none; border: 0px none transparent !important; background-image: none !important; background-color: transparent !important; padding: 0px; display: inline !important; position: static; &quot;&gt;&lt;font color=&quot;#006eb8&quot; style=&quot;position: static; &quot;&gt;&lt;span class=&quot;kLink&quot; s...</description>
			<content:encoded>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;Every once in a while, some new video game technology is released that could change the way games could be played. We’ve already seen the announcement from Microsoft with their&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090602/microsofts-project-natal/&quot; style=&quot;color: rgb(27, 118, 174); text-decoration: none; &quot;&gt;Project Natal&lt;/a&gt;, and Sony is chiming in with its own great advancement. Sony has recently announced that the&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090720/playstation-eye-face-gender/#&quot; class=&quot;kLink&quot; id=&quot;KonaLink0&quot; style=&quot;color: rgb(0, 110, 184); cursor: pointer; margin: 0px; top: 0px; right: 0px; bottom: 0px; left: 0px; outline: none; border: 0px none transparent !important; background-image: none !important; background-color: transparent !important; padding: 0px; display: inline !important; position: static; &quot;&gt;&lt;font color=&quot;#006eb8&quot; style=&quot;position: static; &quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom-width: 1px; border-bottom-style: solid; background-image: none; background-color: transparent; border-top-width: 0px !important; border-top-style: none !important; border-left-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-right-style: none !important; padding: 0px 0px 1px !important; width: auto !important; float: none !important; display: inline !important; position: static; &quot;&gt;PlayStation&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&amp;nbsp;Eye webcam is going to have face-recognition technology as well as gender recognition technology.&lt;br&gt;I believe that we have already covered&lt;a href=&quot;http://www.coolest-gadgets.com/20090618/computer-gender/&quot; style=&quot;color: rgb(27, 118, 174); text-decoration: none; &quot;&gt;gender-recognition technology before&lt;/a&gt;, and Kish Hirani, Sony Europe’s head of developer services, says that it can &quot;detect gender and even the age of the face, separate facial features such as the nose, eyes, and ears, and even detect whether you’re smiling or not”.&lt;br&gt;By the way, it is planned to work with the upcoming Sony&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090720/playstation-eye-face-gender/#&quot; class=&quot;kLink&quot; id=&quot;KonaLink2&quot; style=&quot;color: rgb(0, 110, 184); cursor: pointer; margin: 0px; top: 0px; right: 0px; bottom: 0px; left: 0px; outline: none; border: 0px none transparent !important; background-image: none !important; background-color: transparent !important; padding: 0px; display: inline !important; position: static; &quot;&gt;&lt;font color=&quot;#006eb8&quot; style=&quot;position: static; &quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom-width: 1px; border-bottom-style: solid; background-image: none; background-color: transparent; border-top-width: 0px !important; border-top-style: none !important; border-left-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-right-style: none !important; padding: 0px 0px 1px !important; width: auto !important; float: none !important; display: inline !important; position: static; &quot;&gt;Motion&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom-width: 1px; border-bottom-style: solid; background-image: none; background-color: transparent; border-top-width: 0px !important; border-top-style: none !important; border-left-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-right-style: none !important; padding: 0px 0px 1px !important; width: auto !important; float: none !important; display: inline !important; position: static; &quot;&gt;Controller&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;, which I don’t think we have covered. It will accomplish this using the X, Y, and Z motion.&lt;br&gt;So, what are we looking at here? An age where you don’t have to use your own username, or set up an account? A time where your&amp;nbsp;&lt;a href=&quot;http://www.coolest-gadgets.com/20090720/playstation-eye-face-gender/#&quot; class=&quot;kLink&quot; id=&quot;KonaLink3&quot; style=&quot;color: rgb(0, 110, 184); cursor: pointer; margin: 0px; top: 0px; right: 0px; bottom: 0px; left: 0px; outline: none; border: 0px none transparent !important; background-image: none !important; background-color: transparent !important; padding: 0px; display: inline !important; position: static; &quot;&gt;&lt;font color=&quot;#006eb8&quot; style=&quot;position: static; &quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: rgb(0, 110, 184); background-image: none; background-color: transparent; border-top-width: 0px !important; border-top-style: none !important; border-left-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-right-style: none !important; padding: 0px 0px 1px !important; width: auto !important; float: none !important; display: inline !important; position: static; &quot;&gt;Sony&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;border-bottom-width: 1px; border-bottom-style: solid; border-bottom-color: rgb(0, 110, 184); background-image: none; background-color: transparent; border-top-width: 0px !important; border-top-style: none !important; border-left-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-right-style: none !important; padding: 0px 0px 1px !important; width: auto !important; float: none !important; display: inline !important; position: static; &quot;&gt;Playstation&lt;/span&gt;&lt;/font&gt;&lt;/a&gt;&amp;nbsp;just &quot;looks” at you and knows you are? Does anyone else think that sounds a little scary, like Big Brother?&lt;br&gt;I mean, why not apply this technology to our webcams, and so our computers greet us with full knowledge of who we are? It sure beats the traditional Windows welcome screen. Unless, of course, you like anonymity.&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;p style=&quot;margin: 0px 0px 15px; padding: 0px; color: rgb(46, 46, 46); line-height: 1.4; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: rgb(238, 238, 238); &quot;&gt;&lt;span id=&quot;more-28173&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/playstation_eye_will_know_your_face_and_gender/2012-09-06-28</link>
			<category>Advanced Computing</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/playstation_eye_will_know_your_face_and_gender/2012-09-06-28</guid>
			<pubDate>Thu, 06 Sep 2012 16:09:44 GMT</pubDate>
		</item>
		<item>
			<title>How to &quot;Delete administrator Password&quot; without any software</title>
			<description>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;/div&gt;&lt;span style=&quot;background-color: rgb(255, 255, 255); &quot;&gt;&lt;div style=&quot;text-align: justify; &quot;&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Method 1&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Boot up with DOS and delete the sam.exe and sam.log files from Windows&amp;#92;system32&amp;#92;config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Method 2&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 1. Put your hard disk of your computer in any other pc .&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span...</description>
			<content:encoded>&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;/div&gt;&lt;span style=&quot;background-color: rgb(255, 255, 255); &quot;&gt;&lt;div style=&quot;text-align: justify; &quot;&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Method 1&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Boot up with DOS and delete the sam.exe and sam.log files from Windows&amp;#92;system32&amp;#92;config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Method 2&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 1. Put your hard disk of your computer in any other pc .&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 2. Boot that computer and use your hard disk as a secondary hard disk (D&apos;nt boot as primary hard disk ).&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 3. Then open that drive in which the victim’s window(or your window) is installed.&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 4. Go to location windows-&amp;gt;system32-&amp;gt;config&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 5. And delete SAM.exe and SAM.log&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 6. Now remove hard disk and put in your computer.&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 18px;&quot;&gt;Step 7. And boot your computer&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;div style=&quot;font-family: &apos;Comic Sans MS&apos;; font-size: small; line-height: 18px; &quot;&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/how_to_delete_administrator_password_without_any_software/2012-09-05-27</link>
			<category>Computer tricks and tips</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/how_to_delete_administrator_password_without_any_software/2012-09-05-27</guid>
			<pubDate>Wed, 05 Sep 2012 10:06:40 GMT</pubDate>
		</item>
		<item>
			<title>All (Ctrl+Alt+Del) Permanently deleted files Recovery solution</title>
			<description>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;span style=&quot;background-color: rgb(255, 255, 255); color: rgb(71, 75, 78); line-height: 18px; &quot;&gt;Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...&lt;br&gt;&lt;/span&gt;For all those folks,&lt;br&gt;Here is the solution&lt;br&gt;Software called &quot;Kissass Undelete&quot; , can bring those files from the hard disk or your flash drive.&lt;br&gt;Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.&lt;br&gt;&lt;a href=&quot;http://sourceforge.net/projects/kickassundelete/&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(214, 160, 182); font-weight: bold; text-decoration: none; &quot;&gt;Click Here&lt;/a&gt;&amp;nbsp;&amp;nbsp;to download the .&lt;br&gt;1)&lt;br&gt;To start searching for the files,&lt;br&gt;Select the drive from the Left panel of the Windows and Click the scan button.&lt;br&gt;the Scan might take upto 10 secs.&lt;br&gt;2)&lt;br&gt;When the files search has been...</description>
			<content:encoded>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;span style=&quot;background-color: rgb(255, 255, 255); color: rgb(71, 75, 78); line-height: 18px; &quot;&gt;Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...&lt;br&gt;&lt;/span&gt;For all those folks,&lt;br&gt;Here is the solution&lt;br&gt;Software called &quot;Kissass Undelete&quot; , can bring those files from the hard disk or your flash drive.&lt;br&gt;Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.&lt;br&gt;&lt;a href=&quot;http://sourceforge.net/projects/kickassundelete/&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(214, 160, 182); font-weight: bold; text-decoration: none; &quot;&gt;Click Here&lt;/a&gt;&amp;nbsp;&amp;nbsp;to download the .&lt;br&gt;1)&lt;br&gt;To start searching for the files,&lt;br&gt;Select the drive from the Left panel of the Windows and Click the scan button.&lt;br&gt;the Scan might take upto 10 secs.&lt;br&gt;2)&lt;br&gt;When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.&lt;br&gt;3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;pre&gt;&lt;br&gt;&lt;/pre&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/all_ctrl_alt_del_permanently_deleted_files_recovery_solution/2012-09-05-26</link>
			<category>Computer tricks and tips</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/all_ctrl_alt_del_permanently_deleted_files_recovery_solution/2012-09-05-26</guid>
			<pubDate>Wed, 05 Sep 2012 10:01:21 GMT</pubDate>
		</item>
		<item>
			<title>DNS poisoning via Port Exhaustion</title>
			<description>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.&lt;br&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;It discloses two vulnerabilities:&lt;/font&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;A vulnerability in&amp;nbsp;&lt;strong&gt;Java&lt;/strong&gt;&amp;nbsp;(CVE-2011-3552, CVE-2010-4448) which enables&amp;nbsp;&lt;em&gt;remote&lt;/em&gt;&amp;nbsp;DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; mar...</description>
			<content:encoded>&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br class=&quot;innova&quot; style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.&lt;br&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;It discloses two vulnerabilities:&lt;/font&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;A vulnerability in&amp;nbsp;&lt;strong&gt;Java&lt;/strong&gt;&amp;nbsp;(CVE-2011-3552, CVE-2010-4448) which enables&amp;nbsp;&lt;em&gt;remote&lt;/em&gt;&amp;nbsp;DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;A vulnerability in multiuser&amp;nbsp;&lt;strong&gt;Windows&lt;/strong&gt;&amp;nbsp;environments which enables&amp;nbsp;&lt;em&gt;local&lt;/em&gt;&amp;nbsp;DNS cache poisoning of arbitrary domains. This&amp;nbsp; vulnerability can be triggered by a normal user (i.e. one with non-administrative rights) in order to attack other users of the system. A successful exploitation of this vulnerability may lead to information disclosure, privilege escalation, universal XSS and more.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;The whitepaper can be found&amp;nbsp;&lt;strong&gt;&lt;a href=&quot;http://bit.ly/q31wSq&quot; target=&quot;_self&quot; title=&quot;DNS poisoning via Port Exhaustion whitepaper&quot; style=&quot;text-decoration: none; color: rgb(41, 61, 107); &quot;&gt;here&lt;/a&gt;&lt;/strong&gt;.&lt;br&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;A few video demos of our Proof-of-Concept:&lt;/font&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Attack: Remote DNS poisoning via Java Applets: Cookie theft.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Environment: Ubuntu 11.04, Firefox 7.0.1.&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=eSEvFmsw55A&quot; target=&quot;_blank&quot; style=&quot;text-decoration: none; color: rgb(41, 61, 107); &quot;&gt;Movie link&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Attack: Remote DNS poisoning via Java Apples: NTLM credentials and Clipboard theft.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Environment: Windows 2008, Internet Explorer 9.&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=i-Fmk7-pFFA&quot; target=&quot;_blank&quot; style=&quot;text-decoration: none; color: rgb(41, 61, 107); &quot;&gt;Movie link&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Attack: Remote DNS poisoning via Java Applets: Firewall bypass.&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Environment: Windows 2008, Firefox 7.0.1.&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=7CFq_pofeBU&quot; target=&quot;_blank&quot; style=&quot;text-decoration: none; color: rgb(41, 61, 107); &quot;&gt;Movie Link&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Attack: Local DNS poisoning via port exhaustion.&amp;nbsp;&lt;a href=&quot;http://www.youtube.com/watch?v=m2GkLL9d68E&quot; target=&quot;_blank&quot; style=&quot;text-decoration: none; color: rgb(41, 61, 107); &quot;&gt;Movie link&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ol style=&quot;margin-top: 10px; margin-bottom: 10px; text-align: justify; background-color: rgb(239, 239, 239); &quot;&gt;&lt;li style=&quot;padding: 0px 0px 3px; &quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Environment: Windows 2008&lt;/font&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/dns_poisoning_via_port_exhaustion/2012-09-02-23</link>
			<category>H4ckers&apos; Z0n3</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/dns_poisoning_via_port_exhaustion/2012-09-02-23</guid>
			<pubDate>Sun, 02 Sep 2012 15:32:51 GMT</pubDate>
		</item>
		<item>
			<title>What Is Cloud Computing?</title>
			<description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Infrastructure-as-a-Service-IaaS&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;IaaS&lt;/a&gt;), Platform-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;PaaS)&lt;/a&gt;&amp;nbsp;and Software-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Software-as-a-Service&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;SaaS&lt;/a&gt;). The name cloud computing was inspired by the cloud symbol that&apos;s often used to represent the Internet in&amp;nbsp;&lt;a href=&quot;http://whatis.techta...</description>
			<content:encoded>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br style=&quot;font-size: 10pt; &quot;&gt;&lt;/font&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Infrastructure-as-a-Service-IaaS&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;IaaS&lt;/a&gt;), Platform-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;PaaS)&lt;/a&gt;&amp;nbsp;and Software-as-a-Service (&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/Software-as-a-Service&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;SaaS&lt;/a&gt;). The name cloud computing was inspired by the cloud symbol that&apos;s often used to represent the Internet in&amp;nbsp;&lt;a href=&quot;http://whatis.techtarget.com/definition/flowchart&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;flowchart&lt;/a&gt;&amp;nbsp;s and diagrams.&lt;br&gt;A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet and a weak economy, have accelerated interest in cloud computing.&lt;br&gt;A cloud can be private or public. A&amp;nbsp;&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/public-cloud&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;public cloud&lt;/a&gt;&amp;nbsp;sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A&amp;nbsp;&lt;a href=&quot;http://searchcloudcomputing.techtarget.com/definition/private-cloud&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;private cloud&lt;/a&gt;&amp;nbsp;is a proprietary network or a data center that supplies hosted services to a limited number of people. When a service provider uses public cloud resources to create their private cloud, the result is called a virtual private cloud. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services.&lt;br&gt;Infrastructure-as-a-Service like Amazon Web Services provides virtual server instance&lt;a href=&quot;http://searchexchange.techtarget.com/definition/application-program-interface&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;API&lt;/a&gt;&amp;nbsp;) to start, stop, access and configure their virtual servers and storage. In the enterprise, cloud computing allows a company to pay for only as much capacity as is needed, and bring more online as soon as required. Because this pay-for-what-you-use model resembles the way electricity, fuel and water are consumed, it&apos;s sometimes referred to as utility computing.&lt;br&gt;Platform-as-a-service in the cloud is defined as a set of software and product development tools hosted on the provider&apos;s infrastructure. Developers create applications on the provider&apos;s platform over the Internet. PaaS providers may use APIs, website&amp;nbsp;&lt;a href=&quot;http://searchcio-midmarket.techtarget.com/definition/portal&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;portal&lt;/a&gt;&amp;nbsp;s or&lt;a href=&quot;http://searchnetworking.techtarget.com/definition/gateway&quot; wrc_done=&quot;true&quot; style=&quot;color: rgb(102, 51, 102); outline: 0px; &quot;&gt;gateway&lt;/a&gt;&amp;nbsp;&amp;nbsp;software installed on the customer&apos;s computer. Force.com, (an outgrowth of Salesforce.com) and GoogleApps are examples of PaaS. Developers need to know that currently, there are not standards for interoperability or data portability in the cloud. Some providers will not allow software created by their customers to be moved off the provider&apos;s platform.&lt;br&gt;In the software-as-a-service cloud model, the vendor supplies the hardware infrastructure, the software product and interacts with the user through a front-end portal. SaaS is a very broad market. Services can be anything from Web-based email to inventory control and database processing. Because the service provider hosts both the application and the data, the end user is free to use the service from anywhere.&lt;/font&gt;&lt;/div&gt;&lt;p style=&quot;line-height: 19.200000762939453px; margin: 0px 0px 20px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br&gt;&lt;/div&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/what_is_cloud_computing/2012-09-01-22</link>
			<category>Advanced Computing</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/what_is_cloud_computing/2012-09-01-22</guid>
			<pubDate>Fri, 31 Aug 2012 20:35:08 GMT</pubDate>
		</item>
		<item>
			<title>Coming soon: Google on your brain</title>
			<description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Just thinking about likely near-term innovations in computing is exciting, but slowly a longer-term vision is coming into focus.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Down the road we&apos;re probably going to have access to something approaching all information all the time. Our lives - much longer by then because of the implications of this for medical care - will be enriched, even as our behavior will be very unlike how we live today.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The other huge, and related, move of the moment is toward ultimate mobility. Several trends are taking us there. The cellphone is becoming more like a PC while the PC is becoming more like a cellphone. In short, the next great era of computing - succeeding the PC one - will likely be about smaller, cheaper, more-powerful portable devices.Already much of our softwa...</description>
			<content:encoded>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Just thinking about likely near-term innovations in computing is exciting, but slowly a longer-term vision is coming into focus.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Down the road we&apos;re probably going to have access to something approaching all information all the time. Our lives - much longer by then because of the implications of this for medical care - will be enriched, even as our behavior will be very unlike how we live today.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The other huge, and related, move of the moment is toward ultimate mobility. Several trends are taking us there. The cellphone is becoming more like a PC while the PC is becoming more like a cellphone. In short, the next great era of computing - succeeding the PC one - will likely be about smaller, cheaper, more-powerful portable devices.Already much of our software and data is moving to giant remote servers connected to the Internet. Our photos, music, software applications like Microsoft Word, and just about everything else we use a computer for will be accessible to us wherever we go.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If you wonder how devices can get smaller and yet replace the PC, keep in mind that a major innovation we&apos;re seeing right now is vastly-improved voice-recognition software. While it only works on the fast processors of a PC today, the inexorable growth of computing power will soon take that kind of power into your cellphone. So long keyboard!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the next phase, the devices essentially disappear.&amp;nbsp;&lt;a href=&quot;http://money.cnn.com/2006/07/26/magazines/fortune/futureoftech_quantum.fortune/index.htm&quot; style=&quot;color: rgb(0, 51, 153); &quot;&gt;An article in the new issue of Fortune by Peter Schwartz and Rita Koselka&lt;/a&gt;&amp;nbsp;describes the amazing coming world of quantum computing.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Forget the technical details - quantum computing is tough for non-engineers to grasp. Suffice it to say that if you thought the increase in computing power was impressive during the past 20 years, the pace will likely speed up radically as quantum computing takes hold within the next decade.As part of a broader look at the future last September, I speculated that in the future we would feel that everything in life had become like an open-book test. &quot;Any kind of information is available anytime you want it,&quot; I wrote. &quot;Simply speak a question, or even think it. You will always be connected wirelessly to the network, and an answer will return from a vast, collectively-produced data matrix. Google queries will seem quaint.&quot;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;At the time, I thought I was being a little wild, but less than a year later such talk is almost routine in the futurist camp. Chris Taylor at Business 2.0 this week published &quot;&lt;a href=&quot;http://money.cnn.com/2006/07/21/technology/googlebrain0721.biz2/index.htm&quot; style=&quot;color: rgb(0, 51, 153); &quot;&gt;Surfing the Web with Nothing but Brainwaves&lt;/a&gt;.&quot; Taylor explains that already quadriplegics can play videogames, control robotic arms, and turn a TV on and off, using only their minds. They are connected to a computer with an implant that reads electrical patterns in the brain.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sony has already patented a game system that beams data directly into the brain without implants, reports Taylor.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the future quantum-computing world which Schwartz and Koselka describe, we&apos;d go way further. Computing power would be so great that we could easily have &quot;network-enabled telepathy.&quot; We&apos;d wear headbands with unimaginable computing power.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It&apos;s fascinating to consider some of the potential social and even political ramifications of such a turn toward ubiquitous information availability. The necessity to learn languages might disappear. If the devices necessary to participate in this information revolution were cheap enough, and the network truly ubiquitous and global, the economic playing field could be leveled. If information is power, everyone would have it. That&apos;s the kind of breakthrough the developing world needs.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Even moral codes and behavior might alter, if all that available information led to a profound transparency in human conduct. One of my beliefs is that people will routinely record their entire lives on some equivalent of video.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sharing your personal history - warts and all - might then become routine, in order to improve your perceived trustworthiness. Computing is now so important that to talk of its future is inevitably to consider the future fate of mankind.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br&gt;&lt;/div&gt;&lt;/font&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/coming_soon_google_on_your_brain/2012-09-01-21</link>
			<category>Advanced Computing</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/coming_soon_google_on_your_brain/2012-09-01-21</guid>
			<pubDate>Fri, 31 Aug 2012 20:20:33 GMT</pubDate>
		</item>
		<item>
			<title>Hackers can pluck private data from your brain</title>
			<description>&lt;div&gt;&lt;p&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 22px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 22px;&quot;&gt;It is very easy to hack a human brain and pluck things such as bank details from the head using technology that costs only a few hundred dollars, scientists claim.A team of researchers from the University of Oxford in Geneva and the University of California in Berkeley explained the process using an off-the-shelf Emotiv brain-computer interface that only cost a few hundred dollars. Volunteers for the security experiment were asked to wear an Emotiv BCI head piece and sat in front of a computer screen that showed images of maps, banks and card PINS. The researchers then tracked the P300 brain signal, which is given off when the brain registers meaningful stimuli. The team found they could consistently reduce the random data in each variable by 15 to 40 per cent, a marked advantage over random guessing. Subjects were essential...</description>
			<content:encoded>&lt;div&gt;&lt;p&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 22px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Comic Sans MS&quot; size=&quot;2&quot;&gt;&lt;span style=&quot;line-height: 22px;&quot;&gt;It is very easy to hack a human brain and pluck things such as bank details from the head using technology that costs only a few hundred dollars, scientists claim.A team of researchers from the University of Oxford in Geneva and the University of California in Berkeley explained the process using an off-the-shelf Emotiv brain-computer interface that only cost a few hundred dollars. Volunteers for the security experiment were asked to wear an Emotiv BCI head piece and sat in front of a computer screen that showed images of maps, banks and card PINS. The researchers then tracked the P300 brain signal, which is given off when the brain registers meaningful stimuli. The team found they could consistently reduce the random data in each variable by 15 to 40 per cent, a marked advantage over random guessing. Subjects were essentially leaking valuable information through the BCI units, making it easier to calculate their address or bank account numbers. &quot;The simplicity of our experiments suggests the possibility of more sophisticated attacks,&quot; Discovery News quoted the team as saying in their paper. For example, an uninformed user could be easily engaged into &apos;mindgames&apos; that camouflage the interrogation of the user and make them more cooperative. Furthermore, with the ever increasing quality of devices, success rates of attacks will likely improve, they added.&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&quot;relatehere&quot; class=&quot;hideout&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 22px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;/div&gt;</content:encoded>
			<link>https://techgeenix.ucoz.com/news/hackers_can_pluck_private_data_from_your_brain/2012-08-31-20</link>
			<category>H4ckers&apos; Z0n3</category>
			<dc:creator>geenix</dc:creator>
			<guid>https://techgeenix.ucoz.com/news/hackers_can_pluck_private_data_from_your_brain/2012-08-31-20</guid>
			<pubDate>Fri, 31 Aug 2012 07:25:31 GMT</pubDate>
		</item>
	</channel>
</rss>