DDoS can be legal with your help
No, this is not a joke and yes it can be done. Anonymous, the hacktivist group, has filed a petition online on the White House website claiming that Distributed denial-of-service (DDoS) shouldn't be...
View ArticleSerious Sam 3 BFE issues and fixes
First of all I would like to say that I don't support piracy, I am a software engineer and I know how much effort is needed to create a game or a software in general. If you like a game you should...
View ArticleApple lost the iPhone Trademark in Brazil
Apple has, now officially, lost its iPhone trademark in Brazil. Gradiente Eletronica, a Brazilian company has registered the name in 2000 and secured this name until 2018. The Brazilian Institute of...
View ArticleBypass iPhone lock screen with iOS 6.1
Anyone can bypass iPhone's lock screen even if a password is set with a number of simple steps. This is for the latest platform iOS 6.1. Apple promised to fix this bug in the next release and iPhone...
View ArticleFacebook: OAuth flaw allows full control to any account
Applications in Facebook use the OAuth to communicate with the users and grand additional permissions. The user should click on the 'Allow' or 'Accept' button in order for the application to gain those...
View ArticleFree Anti-Virus Suite by Baidu
Baidu for those who don't know is a Chinese search engine, it is called as the Google of Asia. Baidu recently released a free anti-virus suite that will help you to protect your computer by any kind of...
View ArticleAn HTML5 browser exploit can fill you disk with junk
An HTML5 browser exploit was found recently and it can fill your hard drive with junk data. Usually browsers allow websites to store small files like cookies but in case of HTML5 they allow bigger...
View ArticleAnother Facebook OAuth vulnerability
Not even a month ago I posted about Facebook OAuth flaw that was allowing to an attacker to gain access to any account. Facebook have fixed that specific flaw with minor changes but those changes are...
View ArticleThe Biggest cracking dictionary
Before cracking a password using brute force attack, that meas try every possible combination of characters, programs use a dictionary with common words. So, if the password, which in many cases do, is...
View ArticleFar Cry 3 cheats: GodMode and Unlimited Ammo without trainer
I liked Far Cry very much, the story is very good and it is not only about shooting and killing. It has similar features with Assassin's Creed like liberating outposts and killing animals to get their...
View ArticleDisable lockscreen on Samsung devices
I wrote several posts on Apple security holes and how to bypass lockscreen. Security researches found also similar flaw on Samsung devices. Even though this doesn't work on all Samsung devices but it...
View ArticleFree soda from vending machines
I really want to try this but for now I will just post it. Of course after a successful or not try I will give the money to the machine. I don't show it for you to have free drinks but to gain the...
View ArticleRPG Excel Game
I have found an RPG game that Gary Walkin, an accountant, made in Excel. The graphics are poor but its Excel not flash. There is also storyline and bosses every few levels. I tried it and it works in...
View ArticleFlaw in Viber allows full access to smart phones
About 50 million android smart phones have Viber installed and a critical flaw in that app make all those devices vulnerable. It is as easy as sending two messages through Viber and attacker can gain...
View ArticleJapan authorities try to block Tor
Japan authorities ask from internet service providers to block access to Tor network. Tor is a web service that help users to surf the internet anonymously without the fear that prying eyes are...
View ArticleBubblePop
BubblePop is a fun and addictive bubble pop game to entertain children and at the same time make them smarter. It is a clone of BubbleBurst with added options and colors to help (red-green) colorblind...
View ArticleAuthorities need Apple to decrypt iPhone data
Authorities seize digital devices and they want to use the data inside them to find evidence. Some times they can't decrypt the data and in case of iPhone they ask Apple to decrypt the data for them....
View ArticleFrance Dreams of Free Software Digital Age
France has so much respect for its cultural industry, including the ones produced in this digital age. In order to further improve and preserve the works of its artists, the government has made various...
View ArticleWordPress: Fix maintenance mode
If you installed or updated a plugin and your website is unavailable for a long time with the message "Briefly unavailable for scheduled maintenance. Check back in a minute." then something went wrong....
View ArticleWindows 8: Disable Maintenance Tasks
Microsoft has default maintenance tasks running without you even knowing about them. One is running when the system is idle and the other by default every day at 03:00. This second one is very annoying...
View Article