Oracle Java Vulnerabilities

java-danger

 

We all know Java is an essential tool for Windows machines, but the installed java in your system may open back doors for crackers or bad hackers, which makes your system vulnerable. If you are using older versions of Java, Java SDK then please upgrade it to the latest version. You may download the latest version here.

 

The vulnerability was detected in my system by Kaspersky Internet Security 2013. This vulnerability can make your system vulnerable for Impacts like

 

1. DoS (Denial of Service)

2. System Access

3. Exposure of Sensitive Information

4. Manipulation of Data

 

You can know more about this here.

 

Please upgrade… Njoy

 

Ashampoo Burning Studio 2012 10.0.15 (FREE)

ashampoo_burning_studio_2012Burn almost anything with Ashampoo Burning Studio. Officially the free burning studio from Ashampoo is the Ashampoo Burning Studio 6(You can check here). But I recently found that there is a legal free Ashampoo burning Studio 2012 for free! Ashampoo Burning Studio 2012 10.0.15 can be used for everything you need to burn movies, music and data - fast and effectively. The software with the intuitive user interface focuses on the core competencies of burning software and offers you compact functions to tackle all tasks relating to your burning projects - easily create data discs, burn backups, rip music, create audio CDs or burn already existing film files on Blu-ray Disc and lots more.

Download it here or here.

It got a great user interface, and complicated functionality. Try it, you will use it... Njoy

 

Nokia Suite message Backup

Nokia users sync messages with Nokia Suite so that those messages are not lost. I had to reformat my C drive, but never wanted to lost my messages, so I searched for a solution to backup my messages. Its so simple as it is. Nokia Suite store messages in an SQLite database and very easy to find.

 

You can find the messages here

 

C:\Users\{USERNAME}\AppData\Local\Nokia\Nokia Suite\Messages\Database

 

Copy your sqlite file to a safe place. After formatting your PC, install Nokia Suite, copy your sqlite file to the above location.

 

Enjoy!

 

The Windows God Mode

God mode is not just for games, there is a GOD mode for Windows as well. Microsoft introduced this feature from the time of Vista, and its still in Windows 7. Take the following steps to gain access to GOD MODE in Windows Vista or Windows 7. . .

Step 1: Create a New Folder in your Windows machine, anywhere.

Step 2: Name the folder as

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}


Once you have done this, you will have an icon entitled “GodMode”, double clicking on it gives you something like this below.

godmod

Have fun. . . and do visit www.kodspider.com
 

Differentiating i3, i5, and i7


Many people out there don’t know about the difference between Intel’s new series of processors. The i3, i5, and i7. These are just great processors, made for everyone on the planet, satisfying everyone’s needs, making you smileJ.
Everyone don’t need an i7 (The KING), and only KINGs can afford to one of them. These processors use minimum number of cores to perform well. They use Hyper Threading which enables these processors to work as two cores. Speaking of which, I’ll have to explain a lot, like about threads, thread life cycle etc.
Well now I’ll give a good basic clear explanation and provide links to more true information. How about that? J

Intel Core i3

The Intel Core i3 is the first guy, an entry level processor in the great “i” series. In simple words this guy is an intelligent dual core processor. The i3 uses 2 cores with Hyper threading technology yielding a quad core like processing.

Open “Control Panel\All Control Panel Items\Administrative Tools”, look for a “Computer Management” icon, open it, and check the device manager. You will find 4 processors with same clock speed under the processors (collapse it).

This processor series features



Intel Core i5

This processor series features


·         
This is recommended almost all applications, including programming, multimedia processing, image processing etc.

Intel Core i7

This is the best of all. As mentioned above, the KING of all. This processor is available in 4 Cores and 6 Cores (Extreme). The i7s have higher clock speeds and large cache memory. This is the best processor ever, the best ever for gamers!

This processor series features


·        
More precise information is shown below, from Wikipedia.


BrandDesktopLaptop
Code-namedCoresFabDate releasedCode-namedCoresFabDate released
Core Solo
Desktop version not available
Yonah165 nmJanuary 2006
Core Duo
Desktop version not available
Yonah265 nmJanuary 2006
Core 2 Solo
Desktop version not available
Merom-L
Penryn-L
1
1
65 nm
45 nm
September 2007
May 2008
Core 2 DuoConroe
Allendale
Wolfdale
2
2
2
65 nm
65 nm
45 nm
August 2006
January 2007
January 2008
Merom
Penryn
2
2
65 nm
45 nm
July 2006
January 2008
Core 2 QuadKentsfield
Yorkfield
4
4
65 nm
45 nm
January 2007
March 2008
Penryn445 nmAugust 2008
Core 2 ExtremeConroe XE
Kentsfield XE
Yorkfield XE
2
4
4
65 nm
65 nm
45 nm
July 2006
November 2006
November 2007
Merom XE
Penryn XE
Penryn XE
2
2
4
65 nm
45 nm
45 nm
July 2007
January 2008
August 2008
Core i3Clarkdale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
Q3 2012
Arrandale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
June 2012
Core i5Lynnfield
Clarkdale
Sandy Bridge
Sandy Bridge
Ivy Bridge
Ivy Bridge
4
2
4
2
4
2
45 nm
32 nm
32 nm
32 nm
22 nm
22 nm
September 2009
January 2010
January 2011
February 2011
April 2012
April 2012
Arrandale
Sandy Bridge
Ivy Bridge
2
2
2
32 nm
32 nm
22 nm
January 2010
February 2011
May 2012
Core i7Bloomfield
Lynnfield
Gulftown
Sandy Bridge
Ivy Bridge
4
4
6
4
4
45 nm
45 nm
32 nm
32 nm
22 nm
November 2008
September 2009
July 2010
January 2011
April 2012
Clarksfield
Arrandale
Sandy Bridge
Sandy Bridge
Ivy Bridge
4
2
4
2
2
45 nm
32 nm
32 nm
32 nm
22 nm
September 2009
January 2010
January 2011
February 2011
May 2012
Core i7
Extreme Edition
Bloomfield
Gulftown
Sandy Bridge-E
4
6
6
45 nm
32 nm
32 nm
November 2008
March 2010
November 2011
Clarksfield
Sandy Bridge
Ivy Bridge
4
4
4
45 nm
32 nm
22 nm
September 2009
January 2011
May 2012




 

Hacking And Cracking





      There are many words that confuse us, when in the field of computer. Such a term is 'Hacking'. Most of us know what is hacking, we usually see cyber crimes in the news. Most probably like this “Unknown hacker manipulated the server of the City bank”, Such a news in the leading channels and newspapers could actually manipulate the word 'hacker' or entirely the process 'hacking'. Then what is Hacking?
Now I am going to discus about Hacking. Before knowing about hacking we should know about, what Cracking is? Cracking is something just opposite of Hacking. It's a process where computerphiles invades others computers through the network, they simply corrupt data, or spy into our data and manipulate it! And to the core it is not at all hacking.
Let me highlight an example... Everyone have an e mail ID most probably with yahoo, gmail, hotmail etc such common e mail providers, and all you will have a username and password. The username will be known to any one who knows the e mail ID. Example: name@yahoo.com here name stands for the username and the password will be known only to the user. Now to the subject, Cracker will acquire the password with means of some critical data which is known only by the email providers! Thus he manipulate everything, now he can send mail to anyone in the world, deletes your important mails and data using your email id and the password he just cracked, this creates problems.
These are people (mainly adolescent males) who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers mostly think crackers are lazy, irresponsible, and not very bright, and object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer.
Now you may have got an idea about cracking, or who a cracker is?. A confusion may arise in your thoughts about the process hacking, let me solve it.
A hacker is also a computerphile-a person totally engrossed in computer programming and computer technology. Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick. So hacking is just something positive.
There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. Unfortunately, many journalists and writers have been fooled into using the word ‘hacker’ to describe crackers; this irritates real hackers no end.
The basic difference is this: hackers build things, crackers break them.
The action of a cracker is offensive, so never crack!




By: Vishnu Balaji

 

Popular Posts