By default Google Drive installer creates a folder here C:\Users\<USERNAME>\AppData\Local\Google (Replace ‘USERNAME’ with your computer username), considering the storage option available with google drives this might end-up in utilizing filling your default drive space if all folders is allowed to sync. We can change the Gdrive installation location in two ways. During installation we can change as mentioned […]
Category: technews
PETYA Crypto-ransomware
Till now we have heard of ransomware’s targeted computers files will be encrypted, in this scenario users are allowed to login to the Operating System but won’t be able to open encrypted files. The newly discovered PETYA Crypto-Ransomware has crossed one more step and it overwrites the MBR itself to lock users out of their […]
Drown vulnerabilty
Drown stands for Decrypting RSA using Obsolete and Weakened eNcryption, and it provides a way for attackers to decrypt HTTPS communications from servers that are still supporting SSLv2. Most of us think supporting SSLv2 protocol on server is not a problem because most of the modern client software’s just don’t use it. But looks like […]
Introduction to Elasticsearch
Elasticsearch is an Open Source (Apache 2), Distributed search engine built on top of Apache Lucene. It allows you start with one machine and scale to ‘n’ number of servers with high availability. Elasticsearch makes it easy to run a full-featured search server. It can be setup in lesser than five minutes. In this blog […]
Illustration of MITM attack
Here’s a gif, from internet illustrating manual gear transmission.
The solution is built on the same antimalware platform as Microsoft Security Essentials [MSE], MicrosoftForefront Endpoint Protection, Microsoft System Center Endpoint Protection and Windows Defender for Windows 8.0 and higher. Microsoft Antimalware for Azure is a single-agent solution for applications and tenant environments, designed to run in the background without human intervention. You can deploy […]
With the latest finding from Google researchers , browser vendors are scrapping SSLv3 in wake of poodle attacks. For more information on poodle attack check this link https://www.technix.in/sslv3-poodle-attack/. Officials at mozilla has confirmed in a blog post that only 0.3% of https connection with Firefox uses SSLv3. They are planning to remove fully SSLv3 in the […]
SSLv3 – Poodle Attack
Researchers at Google has discover a new attack on the SSLv3 protocol, which takes advantage of an issue with the protocol that enables a network attacker to recover the plain text communications of the victim. The attack is known as POODLE. The technique takes advantage of the fact that when a secure communication attempts fails, […]
A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. The bug, discovered by Stephane Schazelas, is related to how Bash processes environmental variables passed by the operating system or […]