Sudo on Windows is not as good as it claims to be.
The new sudo command on Windows is not as good as it seems, not compared to Linux.
Read MoreThe new sudo command on Windows is not as good as it seems, not compared to Linux.
Read MoreThere is an exploit that has been found in Linux that can overwrite the /etc/shadow file with a new password for root. But this requires the setuid root bit for Xorg and to be run from a text console that is not already running Xorg. So this will only work…
Read MoreThis image is a photograph of an ATM machine that has Windows 7 installed, this machine requires Windows 7 activation… This is an Ethernet connection that is over 231 meters long. Far too long for a standard Ethernet connection. The maximum range of a cable is 100 meters according to…
Read MoreThis is the beginning of the end for the Internet if the Attorney-General George Brandis gets his way. There are a large number of people downloading the latest episodes of Game Of Thrones, but this is a massively popular TV show. The battle at the wall was well worth watching….
Read MoreEpic failure computer consultant. Put the captions on as this video is in Hebrew.
Read MoreThe Iron man 3 movie shows Tony Stark using a computer with IP addresses that have numbers greater than 255. This is not possible; the largest number you can have is 255.255.255.0 There is another scene where he is using Speedtest.net. This is a strange thing for a defense login…
Read MoreHack Tuesday April 9 2013: http://mpegmedia.abc.net.au/triplej/hack/daily/hack_tue_2013_4_9.mp3. Listen to this recording of the ABC TripleJ radio show Hack and hear what Malcom Turnbull is planning if the Liberals get into power in 2013. A broadband network using copper wires instead of the Labour proposed fibre to the node that would use…
Read MoreThere is a new short film out now that has a scene where a character is using an Apple Macintosh computer, yet the terminal window has a Windows command prompt in it? The character is using the Aircrack-ng WIFI cracking utility to crack the passkey for a WIFI network, but…
Read MoreQuoted from the website. These body scanners are an invasion of privacy and nothing more, they just want to expose people to dangerous radiation and provide an illusion of security. This video is here to demonstrate that the TSA’s insistence that the nude body scanner program is effective and necessary…
Read MoreDick Smith Electronics, a major Australian retailer have been accused of selling used and malware infected hard drives as new, endangering the computers owned by consumers. In one instance a preacher bought an external hard drive and when he plugged it in he was greeted by a pornographic video. You…
Read MoreSony corporation has been hit by another Cyber Attack, with the accounts of 93,000 users compromised and Credit Card data possibly used to fleece the owners. This after Sony suffered the first embarrassing attack that compromised countless accounts. A Sony representative has advised that users accounts were locked down and…
Read MoreThis is the UNIX operating system that the computer in TRON legacy is running, it appears to be an operating system that is created by Sun Microsystems, like Solaris. The name of this operating system which is a play on the name of the Solaris UNIX operating system. The user…
Read More