Friday 6 September 2013

Weakness in car system

Hackers Find Weaknesses in Car Computer Systems - ClaimsJournal.com http://tinyurl.com/mnljjmq shared via www.newshog.co

Saturday 10 August 2013

Hacking Windows phone

http://thehackernews.com/2013/08/hacking-windows-phone-wifi-tool-download.html?m=1

Friday 15 March 2013

HP LaserJet Security Flaw

Critical vulnerability discovered in certain LaserJet Pro printers could give remote attackers access to sensitive data. Homeland Security’s Computer Emergency Response Team recently issued a vulnerability note warning that HP LaserJet Professional printers contain a telnet debug shell which could allow a remote attacker to gain unauthorized access to data.
This flaw was discovered by a Germany security expert, Christoph von Wittich. He detected the vulnerability during a routine network scan of his company's corporate network. He said the vulnerability could also be used for a denial-of-service attack. "As long as the printer is not connected to the Internet, this vulnerability should not cause much trouble for the end user,".

Marked as CVE-2012-5215 (VU#782451, SSRT101078), vulnerability affected 12 printer models including HP LaserJet Pro P1102w, P1102w, P1606dn, M1212nf MFP, M1213nf MFP, M1214nfh MFP, M1216nfh Multifunction Printer, M1217nfw Multifunction Printer, M1218nfs MFP, M1219nf MFP, CP1025nw, and CP1025nw.


Users are advised to download updated firmware for printers impacted by the bug from the company’s Support Center site.


Monday 18 February 2013

Repair Corrupt Microsoft Word

This are file that when you open comes out with gibberish words which are really strange to read. So how do you fix them, but note they is not mean all corrupt doc. will open with this methods.

The steps are below;
First ensure you are using the right program to read it i.e use Adobe reader to read pdf, MS Excel to open xls, MS Word to open doc, MS PowerPoint to open ppt files etc.

Second: If the first step is ok, then the next option is to open your MS Word program,do not try to open the corrupt file. Once the program is running, goto file > open > browse to the corrupt file then click it, then at the bottom left where you have the open tab, click on the down arrow and select open and repair. Then click on the it after selecting it.

Third: If the first two does not repair the file , then download Openoffice, note this is a large file to download. Once downloaded, run it on your system to install it. After the installation, start the program from the list of programs installed on your system, then select file > open > browse to your doc, then click on open, to open it. Once opened , save the doc with Save as Microsoft 1997/2000 doc.

Fourth : This option can either help or destroy the file, so this done at your risk. Download WordRepair , it does a good job of opening corrupted Word files, but you lose all your formatting, and hence it is the last on this list.

Portable tools to have handy

You never know when you would need them, but having them on you can be your first or best line of defence against rootkit or malwares. When a machine won’t allow you to install applications, this portable apps might be the only way to remove rootkits.
Before you run a scan on a machine, it’s always best to reboot the machine in Safe Mode. This can be done by restarting your system and tapping the F8 key until the Safe Mode menu appears. When that menu appears, select Safe Mode With Networking.

1. Rkill : is a program that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running.
As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed.

2. Combofix : It scans your computer for known malware, and when found, attempts to clean these infections automatically. In addition to being able to remove a large amount of the most common and current malware, ComboFix also displays a report that can be used by trained helpers to remove malware that is not automatically removed by the program.

3. Kaspersky TDDSKiller :   Kaspersky focuses only on the TDSS rootkits (Rootkit.Win32.TDSS, Tidserv, TDSServ, or Alureon).  Kaspersky’s TDSSKiller can also remove the Sinowa, Whistler, Phanta, Trup, and Stoned rootkits.

4. BitDefender Rootkit RemoverBitdefender cleans infections with Necurs (the last rootkit standing). New rootkit definitions are added as they become known; because of this, you will want to make sure you check the Bitdefender site and download a new version of the tool frequently. I personally use this last, when cleaning a system.