A PHP Error was encountered

Severity: 8192

Message: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead

Filename: core/Router.php

Line Number: 114

My Infoline Forum | Latest News & Articles | Technologies | Entertainment
images
 flag  India flag
sub icon
image    

Make Your Entire Video Collection Portable

More and more of your time is spent out of your home these days. Whether you're on the train
to work, waiting for an airplane, or stuck in traffic, there's a very real chasm between you and
your beloved videos that live on your computer and on your DVDs. It's time to bridge that gap
and bring all of your entertainment to the palm of your hand, and it's all made possible by
today's discount software promotion, Mobile Video 2!

Mobile Video 2 converts DVDs and video files to formats that are perfect for playback on
mobile dev
sub icon
image   Sophos Antivirus Labs has intercepted a malware attack, hitting many German internet users, disguised as an email from Skype. The email, which has the subject line "Wir haben Ihre Bestellung geliefert" (Translation: We have delivered your order") has a ZIP file attached, which contains a Trojan horse. The email claims that details of the order can be found in the attached file. Here's what a typical example of the email looks like: Inside the ZIP file, however, is a program called Die Einzelheiten Ihres Eiknkaufs.pdf.exe, obviously designed to use the "double-extension trick" to hoodwink unsuspecting users into believing it i
sub icon
image  
On April 8th, 2014 - exactly one year from today - Microsoft will terminate Extended Support for Windows XP. That means no more security updates. And that could mean very big problems for a significant percentage of PC users. According to data from Net Applications, Windows XP still maintains a nearly 39% hold on the desktop operating system market, second only to Windows 7 which has just under 45%. Every other individual desktop operating system (including Windows Vista, Windows 8, and Mac OS X v10.8 Mountain Lion) has 5% or less of the desktop operating system market. Imagine, if you will, what could happen should bad guys decide to h
sub icon
image   Kommersant, a Ukrainian news site,reported last week on the arrest of 20 people for stealing more than $250 million through online banking fraud over the last five years. The SBU (Security Service of Ukraine) and FSB (Federal Security Service of Russia) spent more than a year jointly investigating the gang who were located in Kiev, Zaporozhye, Lviv, Herson and Odessa. The arrested were between 25 and 30 years old and were responsible for coding individual pieces of the banking malware involved in the scam. All of the stolen banking details were sent off to a server in Odessa, Ukraine where the 28 year old Russian mastermind of the operation was located. The SBU is curre
sub icon
image   Facebook’s enduring popularity means that cybercriminals find it a tempting lure for their malicious misdeeds. A newly-spotted phishing scam is no exception. We came across a malware sample, which we detected as TSPY_MINOCDO.A. The goal is to redirect users who visit Facebook to a spoofed page, which claims to be a part of the social networking website’s security check feature, even sporting the tagline “Security checks help keep Facebook trustworthy and free of spam”. It does this by redirecting all traffic to facebook.com and www.facebook.com to the system itself (using the affected machine’s HOST file). This ensures
sub icon
image   Last December, our senior malware researcher (Mr. Abhishek Singh) posted an article about a Trojan which could detect mouse clicks to evade sandbox analysis. Interestingly, we have found another spear phishing document that downloads malware which incorporates improved mouse click detection anti-sandboxing capability. It also leverages multiple advanced evasion techniques to achieve stealth and persistent infection. The name of malicious document is translated to be “Islamic Jihad.doc”. Hence, we suspect that this weaponized document was used to target the governments of Middle East and Central Asia. This new malware is significant for several reasons:
sub icon
image   Hotspot Shield One Year Free Elite Account US & UK students
 

  Key Benefits to using Hotspot Shield:
Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
Protect yourself from identity theft online.
Secure your IP address for your privacy online and private browsing.
Access all content privately without censorship; bypass firewalls.
Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports and corporate offices.
VPN client works on both wireless and wired connections. Provides Unlimited Bandwidth.
Works on PC and Mac, inclu
sub icon
image   Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker the ability to perform a number of different actions on a compromised system. One component that is often present in these attack toolkits is akeylogger, a highly specialized tool designed to record every keystroke made on the machine, giving the attacker the ability to steal huge amounts of sensitive information silently. Keylogger Definition
A keylogger is any piece of software or hardware that has the capability to intercept and record input from the key
sub icon
image   EaseUS Todo Backup has been featured on dotTech multiple times in the past. EaseUS Todo Backup Free is featured in our review of best free backup program for Windows and we have reviewed EaseUS Todo Backup Home. Now we bring you a treat: free and unlimited dotTech exclusive giveaway of EaseUS Todo Backup Workstation ($39.95 value)!       For those that don’t know, EaseUS Todo Backup is a drive-level (image) backup program that allows you to backup and restore drives, partitions, and whole systems. On top of that, it also supports file-level backup plus has other features like drive cloning, system snapshot, and virtualization.   EaseUS Todo Back
sub icon
image  
    Description: Tweaking.com - Windows Repair is an all-in-one repair tool to help fix a large majority of known Windows problems including registry errors and file permissions as well as issues with Internet Explorer, Windows Update, Windows Firewall and more. Malware and installed programs can modify your default settings. With Tweaking.com - Windows Repair you can restore Windows original settings.   Tweaking.com - Windows Repair can do the following:
 Reset Registry Permissions
 Reset File Permissions
 Register System Files
 Repair WMI
 Repair Windows Firewall
 
sub icon
image   Spammers are always on the lookout for new ways to disguise themselves on the way into your inbox, and recently they've found a new trick that lets them leverage the most trusted brand on the internet - Google. Specifically, they are hiding behind Google's language translation services.

Our Barracuda Labs spam honeypots are turning up a variety of large volume spam attacks that usegoogle.com/translate to whitewash links in an attempt to evade automatic detection.

Here's an example...

      Now you probably wouldn't click on this, (although someone must be clicking on them because these spammers
sub icon
image     A Hacker created a worldwide map of more than 100,000 vulnerable devices after “playing around” with a scripting tool. The “Carna” botnet was named after the Roman goddess that protected inner organs because it was “a good choice for a bot that runs mostly on embedded routers.” Carna ran from June to October last year and was allegedly never detected. Many of the open machines were based on Linux and allowed login with empty or default credentials. Though the project itself is illegal, the anonymous researcher claims the information may be useful for further study. The Carna database is available for download
sub icon
image   AOMEI Backupper is a free backup utility that backs up your entire system drive to ensure your data safety to not only data but the system that holds the data as well, with a simple and intuitive user interface that even your grandma can’t get lost. It’s a perfect solution for someone looking for a system-level of backup plan, whether for your home network or your small business environment. It supports both Windows client operation system as well as server platform like Server 2008 R2 and Server 2012. Both 32-bit and 64-bit editions are supported. The main Window has 4 tabs on the side, with each tab representing a single function of the program. The Home tab doe
sub icon
image   When you are browsing the Internet, do you really know what information you are sharing? Most people don’t have a clue that everything they do online could be being tracked. This includes what websites you visit, what you are interested in, and even who you really are. Most people stay unaware of their own footprints on the Internet, and how online tracking is affecting their experience. By knowing more about your online footprint, you have a chance to enhance your own browsing experience. Governments around the world want to control the Internet down to its smallest fiber. What few people know is that we are already tracked in a way that makes our privacy quite obscured. We
sub icon
image   Free Screen Capture software for Windows Gadwin PrintScreen Gadwin PrintScreen can capture the entire Windows screen, the active window, or a specified area, when the hot key is pressed. The hot key defaults to the PrintScreen key, but users may also define other keys to initiate a capture. DuckLink Screen Capture DuckLink Screen Capture is a feature-rich and easy to use freeware en capture tool which comes with four capture modes that make screen capture easy! Capture the full screen, a window on your screen, region of your screen, or the contents of a tall web page that scrolls. Greenshot Greenshot is an open-source screen capture software for W
sub icon
image For those who may not be aware, Windows PowerShell is a scripting language from Microsoft designed to help system administrators automate some the tasks required to run a Windows network. It’s included with Windows 7 and later but can be installed on earlier Windows operating systems too. This latest ransomware uses this Windows PowerShell program to perform file encryption using "Rijndael symmetric key encryption". This variant also targets Russian users with a ransom message displayed in the Russian language. Here's how this ransomware works: It arrives as spam containing an HTA file attachment. The HTA file contains a pair of Base64 encoded strings. These are dec
sub icon
image Security researchers are gathering in Vancouver at the CanSecWest conference, in the hope of winning substantial cash prizes for finding exploitable vulnerabilities in the likes of Chrome, Internet Explorer and Java.   The Pwn2Own competition offers more than half a million dollars in cash and prizes for the first person to successful compromise a selected target. Here's what's on the menu: Web Browser Google Chrome on Windows 7 ($100,000) Microsoft Internet Explorer, either IE 10 on Windows 8 ($100,000), or IE 9 on Windows 7 ($75,000) Mozilla Firefox on Windows 7 ($60,000) Apple Safari on O
sub icon
image   Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited by hackers in targeted attacks.   The vulnerabilities, identified as CVE-2013-1493 and CVE-2013-0809, are located in the 2D component of Java and received the highest possible impact score from Oracle.   “These vulnerabilities may be remotely exploitable without authentication, i.e., they may be exploited over a network without the need for a username and password,” the company said in a security alert. “For an exploit to be successful, an unsuspecting user running an affected release in a bro
sub icon
image   After much deliberation, the developers of Windows 8 decided to comply with the request of the user and return to the menu "start" button in Windows update through the integrated Blue that appears in the middle of this year. Comprehensive update Windows Blue will return to the familiar Windows 8 "Start" menu, which is present in previous versions of the OS.

New comprehensive update to Windows 8/RT, Windows Server 2012 and Windows Phone 8 and cloud Outlook.com and called SkyDrive Windows Blue will be available in the middle of this year. One of the purposes of this update is to optimize the work and the interest of the users of the operating
sub icon
image If your computer is running poorly lately, have you ever wondered that maybe it’s your hard drive slowing down the whole performance of your computer? When you are building up a computer by yourself and you have a few hard drives in hand, do you know if you are picking the right one holding the OS and the data? Maybe, this little freeware called BenchMe will give you a hand helping you make a quick and correct decision. BenchMe is a free benchmark utility designed specifically to measure various performance characteristics of your data storages. You can then evaluate your data to give you a basic idea how good or bad your devices are. BenchMe works with almost all kinds of
First  < 6 7 8 9 10 11 12 >  Last
@Copyright 2013 My Infoline -Whole World At Your Fingertips
(This site in under beta version, please feel free to send your suggestion to improve this portal , and also write a email to us if you find any bugs.)