Friday , September 22 2017
Home / Networking

Networking

Get Linux Root Shell Just By Pressing ‘ENTER’ key for 70 Seconds + Fix

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds. The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted …

Read More »

How to hide who became friends with on Facebook

When you become friends with someone on Facebook, it appears on your friends news feed. It shows “abc is now friends with xyz” on your friends news feeds and then you left with no privacy you want. Some users don’t like it to appear on news feed as they don’t want their …

Read More »

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

Currently, Asus is undergoing through a troublesome situation after a lawsuit had been filed by the US Federal Trade Commission (FTC) regarding its Router Insecurity. On Tuesday, FTC settled charges with Asus, where the hardware manufacturing company agrees to: Undergo Independent Security Audits Once in 2 years, for the Next …

Read More »

Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

There are several encrypted messaging apps for mobile and desktop platforms that shipped with “The Most Secure” tagline but ends up in de-anonymizing the real identity of its users in some or the other way. In fact, very few encrypted messaging apps available today deal with the core problem of …

Read More »

New Long-Range Wi-Fi Standard Offers Double Range to Home Devices

It is a common problem: Home Wireless Router’s reach is terrible that the WiFi network even does not extend past the front door of the room. My house also has all kinds of Wi-Fi dead zones, but can we fix it? The answer is: YES. The problem will improve with …

Read More »