Free Mp3 Player is prone to a remote buffer-overflow vulnerability
because it fails to properly bounds-check user-supplied data before
copying it into an insufficiently sized buffer.An attacker can
exploit this issue to execute arbitrary code in the context of the
affected application. Failed exploit attempts will likely result in
denial-of-service conditions.
Free Mp3 Player 1.0 is vulnerable; other versions may also be affected. Exploit Code #!/usr/bin/perl # Exploit Title: Free Mp3 Player 1.0 Local Denial of Service # Date: 19-12-2011 # Author: JaMbA # Download: http://www.softpedia.com/get/Multimedia/Audio/Audio-Players/Free-Mp3-Player.shtml # Version: 1.0 # Tested on: Windows 7 my $file= "Crash.mp3"; my $junk= "\x41 ... Read more » |
There are many factors involved in getting your website ranking on
search engines. Below are some key things to take into consideration, and we hope that it will help you to increase traffic on your blog website or forum :) Use keywords in your title tag and other meta tags |
Firefox 9 has been officially released.
The latest update to the popular browser brings several new features and
improvements, the biggest of which is a modification to the JavaScript
engine that provides a big performance boost of up to 30 percent in some
cases.
The latest Firefox uses type inference, a method of determining and setting the type of a JavaScript variable at runtime which leads to less overhead and more efficiently used memory. A more comprehensive explanation as well as some ... Read more » |
Puppy Linux is an evolutionary operating system, based on GNU Linux. What's different here is that Puppy is extraordinarily small, yet quite full featured. Puppy Linux can boot into a 64MB ramdisk, and that's it, the whole caboodle runs in RAM. Unlike
live CD distributions that have to keep pulling stuff off the CD, Puppy
in its entirety loads into RAM. This means that all applications start
in the blink of an eye and respond to user input instantly. |
Chinese hackers broke into computers at the U.S. Chamber of Commerce and
had access to everything on its systems including information on about 3
million of its members, according to a report in today's Wall Street
Journal.
The report quotes unnamed sources as saying that the intrusion was discovered and shut down in May 2010, possibly a year after the hackers may have first gained access to the chamber's networks. According to the Journal, investigators have been unable to determine specifically what information may have been compromised. However, it appears that the hackers targeted four Chamber employees who worked on Asia policy, the Journal said. About six weeks' worth of email belonging to these four employees is believed ... Read more » |
I knw you all are very good in computers but why i am writing this post is because, what i found is when every i got any pc of a B.Tech student(BookWorm Especially) or a Business Man. The worst thing i found is that their systems are full of unwanted software and adding charm on that they have not formatted computer from last 3 or 4 years. That means from the day of purchasing a new laptop they are using the same windows from last 3 years.
And at last they will say in Hindi ( Yaar dekhna iski speed badi slow ho gyi hai, In my heart i reply :- Abey speed to kam hogi hi bachee ki jaan lega 3 saal se to). Anyways so if you are from one of these which i think no one will be accepting ha ha then please read the below tips and make your PC run like a Firebullet :). 1.Let your PC boot up completely before opening any applications. 2.Refres ... Read more » |
Linux is from past considered as one of the best secure operating system. Almost virus free Ubuntu help you to stay safe from various cyber attacks. But here in this tute we will talk about hacking Ubuntu . We will try to hack Ubuntu's Root which is mostly not accessible by the user even if he is teh administrator so what to do so that we can access the Root of Ubuntu . I tried it on Ubuntu 11.10 it works . Here are some Steps you have to follow :-
Step 1:- Start Ubuntu and Login to your user Step 2:- Open the terminal window Step 3:- Now here type "sudo passwd root" Step 4:- Now type your password and press enter Step 5:- Now type new ... Read more » |
Almost everyone of us using the Intel Processors may be i3 , i5 or even i7 too. But what exactly running in these processors do you know?. Here in this tute today i will tell you what it is inside of Intel's processors. Starting from Intel Core i3 to Intel Core i7 you will be know each and every inside pack of these processors.
Internal Pack of Core i3: * Entry level processor. * 2-4 Cores * 4 Threads * Hyper-Threading (efficient use of processor resources) * 3-4 MB Catche * 32 nm Silicon (less heat and energy) Internal Pack of Core i5: * Mid range processor. * 2-4 Cores * 4 Threads * Turbo Mode (turn off core if not used) * Hyper-Threading (efficient use of processor resources) * 3-8 ... Read more » |
This is really irritating for me when in company students came for me to get study material everyone having a common virus that bring up some shortcuts of My Document. Here is the tutorial in which i will tell you how you can ruin these shortcut files.
Step 1:- Click on "Start" -->Run --> type cmd and click on OK. Here I assume your pen drive letter as G: Step 2:- Enter this command. attrib -h -r -s /s /d g:\*.* You can copy the above command --> Right-click in the Command Prompt and paste it. Note : Don't forget to replace the letter g with your pen drive letter. Now press "Enter". Now check for your files and folder in Pen Drive. |
FTP (File Transfer Protocol) is an older protocol for moving files back
and forth over the Internet and other networks. All modern web
browsers still speak FTP, which was sometimes used as a substitute for
HTTP in the early days of the web. FTP is still used often as a means of
downloading large files.
Many web hosts still offer FTP as the preferred way of uploading new web pages to a website. However, because there is no encryption of your password, FTP is not the best choice for this purpose. And since there is no encryption of the files being moved, FTP is a poor choice indeed for more sensitive information. SFTP (Secure FTP) is a popular replacement. Built on SSL, SFTP is just as secure as HTTPS. And most modern FTP clients, such as the free, high-quality FileZilla program for W ... Read more » |