follow

help me to improve quality

donate

Pages

Saturday, 29 July 2017

Autodesk inventor file types

File types and templates in Inventor:-You can open existing files, or start new files using templates. To see the templates, click the Application menu and then click on "New". In the New File dialog box, templates with predefined units are available in the file types for your application. Tabs in the dialog box contain the different standards.Note: Before you open a file or start a new file, create or activate a project file to set the file location.A template can contain property information, such as part and project data, and drawing views....

Sunday, 23 July 2017

Dark Web Users Suspect "Dream Market" Has Also Been Backdoored by Feds

By now you might be aware of the took down of two of the largest online dark websites—AlphaBay and Hansa—in what's being called the largest-ever international operation against the dark web's black market conducted by the FBI, DEA (Drug Enforcement Agency) and Dutch National Police. But the interesting aspect of the takedown was that the federal authorities shut down AlphaBay, but took control of the Hansa market and kept it running for...

Saturday, 22 July 2017

how to create your own blog website for free 2017

Having a blog is a great thing because you can share anything you want (…and if you are wise you can also earn a decent income from your blog).Here in this video, I have shown about how to make blogger account with blogspot.There are many blogging platforms which offer users the ability to create free blogs. If you are looking for a simple free blog, my suggestion would be to start blogging with WordPress.com or BlogSpot.com. in this video i have talked about blogspot.BlogSpot allows you to create a free blog, but it does have limitations.However,...

Thursday, 20 July 2017

Tor Launches Bug Bounty Program — Get Paid for Hacking!

With the growing number of cyber attacks and breaches, a significant number of companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded. Following major companies and organisations, the non-profit group behind Tor Project – the largest online anonymity network that allows people to hide their real identity online...

Wednesday, 19 July 2017

WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development

As part of its ongoing Vault 7 leaks, the whistleblower organisation WikiLeaks today revealed about a CIA contractor responsible for analysing advanced malware and hacking techniques being used in the wild by cyber criminals. According to the documents leaked by WikiLeaks, Raytheon Blackbird Technologies, the Central Intelligence Agency (CIA) contractor, submitted nearly five such reports to CIA as part of UMBRAGE Component Library (UCL)...

Tuesday, 18 July 2017

Over 70,000 Memcached Servers Still Vulnerable to Remote Hacking

Nothing in this world is fully secure, from our borders to cyberspace. I know vulnerabilities are bad, but the worst part comes in when people just don't care to apply patches on time. Late last year, Cisco's Talos intelligence and research group discovered three critical remote code execution (RCE) vulnerabilities in Memcached that exposed major websites including Facebook, Twitter, YouTube, Reddit, to hackers. Memcached is a popular open-source...

Monday, 17 July 2017

Critical RCE Vulnerability Found in Cisco WebEx Extensions, Again — Patch Now!

A highly critical vulnerability has been discovered in the Cisco Systems’ WebEx browser extension for Chrome and Firefox, for the second time in this year, which could allow attackers to remotely execute malicious code on a victim's computer. Cisco WebEx is a popular communication tool for online events, including meetings, webinars and video conferences that help users connect and collaborate with colleagues around the world. The extension...

Windows 10 Will Now Let You Reset Forgotten Password Directly From the Lock Screen

Microsoft is making every effort to make its Windows 10 Fall Creators Update bigger than ever before by beefing up its security practices and hardening it against hackers and cyber attacks in its next release. Microsoft is finally adding one of the much-requested features to Windows 10: Pin and Password recovery option directly from the lock screen. Yes, the next big update of Windows 10, among other features, will allow you to recover...

Saturday, 15 July 2017

direct distance entry method in Autocad

if you want to learn "how to draw a line using Direct distance entry in autocad 2018 with an example" then you came to right place because here you will find "AutoCAD line command tutorial with example".there are basically 4 methods to draw line in autocad and i have already shown three methods in previous tutorial, and i this video i have shown one method to "draw draw line in autocad 2018".which is: 1) Direct distance entry in autocad : In the direct distance entry method, you draw a line by entering its distance and angle values. You use...

Friday, 14 July 2017

Awesome! WhatsApp Now Lets You Send Files of Any Format

Have you ever felt like wishing of sending any type of file immediately to your friends and office colleagues on WhatsApp directly, instead of just contacts, images or documents? Well, now you can… The latest version of WhatsApp for Android and iOS now allows users to send and receive any type of files, whether it’s .mp3, .avi, .php, zip files, or even APKs. The company last month rolled out this feature to its beta users for Android,...

Thursday, 13 July 2017

How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)

WikiLeaks has today published the 16th batch of its ongoing Vault 7 leak, this time instead of revealing new malware or hacking tool, the whistleblower organisation has unveiled how CIA operatives stealthy collect and forward stolen data from compromised smartphones. Previously we have reported about several CIA hacking tools, malware and implants used by the agency to remotely infiltrate and steal data from the targeted systems or smartphones. However,...

Wednesday, 12 July 2017

Katyusha Scanner — Telegram-based Fully Automated SQL Injection Tool

A new powerful hacking tool recently introduced in an underground forum is making rounds these days, allowing anyone to rapidly conduct website scans for SQL injection flaws on a massive scale — all controlled from a smartphone using the Telegram messaging application. Dubbed Katyusha Scanner, the fully automated powerful SQLi vulnerability scanner was first surfaced in April this year when a Russian-speaking individual published it on...

Sunday, 9 July 2017

Google Chrome Bans Chinese SSL Certificate Authorities WoSign and StartCom

As a punishment announced last October, Google will no longer trust SSL/TLS certificate authorities WoSign and its subsidiary StartCom with the launch of Chrome 61 for not maintaining the "high standards expected of CAs."The move came after Google was notified by GitHub's security team on August 17, 2016, that Chinese Certificate Authority WoSign had issued a base certificate for one of GitHub's domains to an unnamed GitHub user without authorization.After...

Saturday, 8 July 2017

how to customize your own youtube channel url 2017

This short and sweet video is simply to show you where and how to create a custom YouTube channel URL/link. ► Get a custom URL for your channel: If your channel is eligible, you can give fans an easy-to-remember web address, called a custom URL/link, for your YouTube channel. This is called a custom URL and looks like youtube.com/1pcuser and youtube.com/c/1pcuser.You can choose a custom URL based on things like your display name, your YouTube username, any current vanity URLs that you have, or the name of your linked website (all subject...

Friday, 7 July 2017

Millions of Android Devices Using Broadcom Wi-Fi Chip Can Be Hacked Remotely

Google has released its latest monthly security update for Android devices, including a serious bug in some Broadcom Wi-Fi chipsets that affects millions of Android devices, as well as some iPhone models.Dubbed BroadPwn, the critical remote code execution vulnerability resides in Broadcom's BCM43xx family of WiFi chipsets, which can be triggered remotely without user interaction, allows a remote attacker to execute malicious code on targeted...

Tuesday, 4 July 2017

China Shuts Down Popular VPN Services to Make Great Firewall Stronger

Online Privacy has been one of the biggest challenges in today's interconnected world, as the governments across the world have been found censoring the Internet, stealing information and conducting mass surveillance on innocent people.China is one such nation which always wanted to have a tight hold on its citizen and has long been known for its strict Internet censorship laws through the Great Firewall of China.The Great Firewall of China is...

Sunday, 2 July 2017

WordPress Plugin Used by 300,000+ Sites Found Vulnerable to SQL Injection Attack

A SQL Injection vulnerability has been discovered in one of the most popular Wordpress plugins, installed on over 300,000 websites, which could be exploited by hackers to steal databases and possibly hijack the affected sites remotely.The flaw has been discovered in the highly popular WP Statistics plugin, which allows site administrators to get detailed information related to the number of users online on their sites, the number of visits...

Saturday, 1 July 2017

Autodesk inventor 2018 tutorials for beginners - inventor 2018 introduction and overview

Welcome to my first free autodesk inventor tutorials for beginners! in this autodesk inventor 2018 training video, you will see inventor 2018 basic features overview and introduction. You are about to see why Autodesk Inventor software is the best choice for 3D mechanical engineering and design. This inventor 2018 tutorial demonstrates how Autodesk Inventor accelerates and simplifies your design process while extending your design capabilities. Autodesk Inventor 2018 is high-performance software for mechanical engineering and...