Hacking, Reverse ...
Follow
Find
357 views | +0 today
 
Scooped by ITGabs
onto Hacking, Reverse Engineering, Software, Scripts, Coding, Guides
Scoop.it!

30 Terrible Pieces of Social Media Advice You Should Ignore

30 Terrible Pieces of Social Media Advice You Should Ignore | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Don't be fooled by this terrible social media marketing advice.

 

There are a lot of so-called “social media experts” out there. Dishing out advice, sometimes based on limited experiences, and sometimes based on nothing at all. Even the true social media experts sometimes share some misguided advice based on their beliefs and experiences. So with all this bad advice floating around the web, how do you distinguish between what you should -- and shouldn't -- believe?

 

Have no fear! We’re here to share some of the worst pieces of social media advice we've seen to debunk all those misguided "best practices" and steer you in the right direction toward social media marketing truth and justice.


Read more: http://blog.hubspot.com/blog/tabid/6307/bid/34180/30-Terrible-Pieces-of-Social-Media-Advice-You-Should-Ignore.aspx#ixzz2LGyohnqO
more...
ITGabs's curator insight, February 18, 2013 2:47 PM

I am facebook expert hahaha, joke, joke

Hacking, Reverse Engineering, Software, Scripts, Coding, Guides
Interesting things for programmers, tips, guides, news about new software development things and everything related to coding and IT
Curated by ITGabs
Your new post is loading...
Your new post is loading...
Scooped by ITGabs
Scoop.it!

Black Hat Asia 2014: Dangers of hacking IoT devices - ElectronicsWeekly.com

Black Hat Asia 2014: Dangers of hacking IoT devices - ElectronicsWeekly.com | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Black Hat Asia 2014: Dangers of hacking IoT devices ElectronicsWeekly.com We all know that computers can be hacked and so three presentations at Black Hat Asia 2014 in Singapore later this month on the dangers of hacking internet-enabled hardware...
ITGabs's insight:

Hacking Cameras, Doors or all Electric systems that use an Internet Control Panel, like in a movie.

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

South Korea raises alert after hackers attack broadcasters, banks

South Korea raises alert after hackers attack broadcasters, banks | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
SEOUL (Reuters) - South Korean authorities were investigating a hacking attack that brought down the servers of three broadcasters and two major banks on Wednesday, and the army raised its alert level...
ITGabs's insight:

Complicated situation for South Korea

more...
Sean Gardiner's curator insight, March 20, 2013 8:16 AM

Hacking attack in South Korea

Scooped by ITGabs
Scoop.it!

Dropbox users complain of spam emails reminiscent of last year’s data leak, company is investigating

Dropbox users complain of spam emails reminiscent of last year’s data leak, company is investigating | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

A thread on the Dropbox forums is filling up with reports of users getting sent spam email to addresses that have exclusively been used for the service. The uptick in spam has grown beyond just a few users, sparking some comparisons to last year’s data leak.

Dropbox has taken notice and is now investigating.

The thread indicates a couple of things that make this more interesting than ‘I’m getting spam’. First, many of the users complaining about the issue claim to be using email addresses exclusively for Dropbox. This means that they aren’t public emails and shouldn’t be on any other lists anywhere. Second, the spam coming to those emails spring into existence over the space of the last few days, indicating that there was some sort of incident (like a leak of emails) that allowed spammers access to them

 

 

ITGabs's insight:

Probably the leak of information is not only about emails, bad for DropBox

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Combating the Big Data skills shortage - Forbes

Combating the Big Data skills shortage - Forbes | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

OK, so you and your company have decided that this Big Data is more than a buzzword, and that you’re going to jump feet first into this. You’ve worked with various business leaders, planned out a pilot project, and set aside a budget. But then things come to a grinding halt! Where do you find the skills to actually deploy this?

 

Despite the activity around Big Data, there is still a significant shortage of skilled professionals who can truly be called Data Scientists who can evaluate business needs and impact, write the algorithms and program platforms such as Hadoop.

 

The Hadoop framework is broad, and is a new menagerie of jargon and projects: HDFS, Hbase, Hive, Pig, Zookeeper, Map/Reduce, and R just to name a few.

 

During my trip to the Bay Area this week, I was very encouraged to hear and speak to several companies who have taken some very positive steps towards helping the IT community bridge this gap.

 

The most significant one to me, are those companies who provide the libraries or interfaces that allow traditional database administrators (DBAs) who have spent years learning, honing and perfecting their skills on well known platforms such as Oracle, IBM DB/2 and others. This traditional database platforms, known as relational database management systems (RDBMS) all use a language called SQL (structured query language). Some Big Data companies are beginning to look at ways of taking the SQL language and allow these queries to be performed on Hadoop.

 

Now, RDBMS and SQL somewhat goes directly against the principles that forced Hadoop to be created in the first place, which is requirement to have a predefined structure (known as a schema) of the data being stored. The basic idea behind Big Data systems is to breakdown these traditional schemas so that data can be queried and analyzed by any number of factors.

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Finally, Tattoos That Let You Control Objects with Your Mind | TIME.com

Finally, Tattoos That Let You Control Objects with Your Mind | TIME.com | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

Science hasn’t been easy on the paranormal, routinely deflating fantastic claims by hucksters purporting psychic abilities. So wouldn’t it be ironic if scientists were on the verge of making paranormal-like abilities a reality?

Imagine controlling an object with your mind. Or don’t, because you probably already have. I did when I was a (pretty little) kid. It never worked, of course, but boy did I stare daggers at several unsuspecting flower pots, pencils and sticks of chalk.

 

The trouble, of course, is that your brain works a whole lot better when it’s motivating things it’s actually wired to, say your eyeballs, tongue, fingers or toes. But aha, you’re saying, we have wireless technology in 2013. We live in the future! Can’t we just cut that cord, too?

We already have: If you want to get technical about it, when using a handheld remote control with old-school antennae to pilot a hobby-style airplane across a field, you don’t actually touch the radio-controlled plane; the brain-interface includes your hands and the control box. But that assumes you have hands to work with, and working a control box to drive a wireless drone around is hardly “telekinetic” — not half as cool-sounding as it might be if you could simply think that drone into action.

 

You’ve probably heard of brain implants acting as biomedical prostheses in what’s sometimes referred to as a “brain-computer interface,” allowing someone to manipulate neuroprosthetic arms and legs or simply nudge a mouse cursor using nothing but thought. We’re doing that stuff today. But you’re still talking about interfaces that usually involve invasive technology, often drilled into the skull and attached directly to the brain itself — Jean Grey, it’s not. What if you could reduce the interface to something that didn’t require brain surgery, something not only noninvasive, but roughly the size of a tiny, removable tattoo?

 

Read more: http://techland.time.com/2013/02/22/finally-tattoos-that-let-you-control-objects-with-your-mind/#ixzz2Lias9BPq

Science hasn't been easy on the paranormal, routinely deflating fantastic claims by hucksters purporting psychic abilities. So wouldn't it be ironic if scientists were on the verge of making paranormal-like abilities a reality?
ITGabs's insight:

Amazing. I hope in some point I can record my dreams ^_^

more...
No comment yet.
Rescooped by ITGabs from ITGabs News
Scoop.it!

Cloud Integration Architecture – The Missing Links — CIO Dashboard

Cloud Integration Architecture – The Missing Links — CIO Dashboard | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Enterprise application integration (EAI) should be applied to the cloud computing integration problem – call it Cloud Integration Architecture (CIA).

Via ITGabs
more...
ITGabs's curator insight, January 14, 2013 7:04 AM
Cloud Integration Architecture
Scooped by ITGabs
Scoop.it!

Sorry, But That 'Chinese' Hacking Report Proves ... - Business Insider

Sorry, But That 'Chinese' Hacking Report Proves ... - Business Insider | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
We have some individuals here in the U.S. with military and/or intelligence agency employment or past employment that have engaged in hacking attacks on their own. The U.S. gov't had nothing to do with it.
more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Apple company computers hacked with Java malicious software

Apple company computers hacked with Java malicious software | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Zee News
Apple company computers hacked with malicious software
Deutsche Welle
Tech giant Apple on Tuesday said a "small number" of its company computers were hit by hackers who took advantage of flaws in the Java plug-in for Web browsers.
ITGabs's insight:

Java Plug in again :/

more...
No comment yet.
Rescooped by ITGabs from Whatisfiction
Scoop.it!

5 Top Augmented Reality Apps for Education

5 Top Augmented Reality Apps for Education | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Editor’s note: This is a contributed post by Gabriela Jugaru, a tech enthusiast who is passionate about the mobile industry and gadgets. She’s a technology entrepreneur, co-founder of UnlockUnit.com.

Via Nicole Yacobozzi
more...
ITGabs's comment, February 18, 2013 3:01 PM
Oh that is so nice, I have the idea to make that with video and html5
Scooped by ITGabs
Scoop.it!

Burger King Twitter Account Hacked, Hilarity Ensues

Burger King Twitter Account Hacked, Hilarity Ensues | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Hackers took control of Burger King's Twitter account this afternoon and went on a juvenile rampage.
ITGabs's insight:

Muahahah

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

30 Terrible Pieces of Social Media Advice You Should Ignore

30 Terrible Pieces of Social Media Advice You Should Ignore | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Don't be fooled by this terrible social media marketing advice.

 

There are a lot of so-called “social media experts” out there. Dishing out advice, sometimes based on limited experiences, and sometimes based on nothing at all. Even the true social media experts sometimes share some misguided advice based on their beliefs and experiences. So with all this bad advice floating around the web, how do you distinguish between what you should -- and shouldn't -- believe?

 

Have no fear! We’re here to share some of the worst pieces of social media advice we've seen to debunk all those misguided "best practices" and steer you in the right direction toward social media marketing truth and justice.


Read more: http://blog.hubspot.com/blog/tabid/6307/bid/34180/30-Terrible-Pieces-of-Social-Media-Advice-You-Should-Ignore.aspx#ixzz2LGyohnqO
more...
ITGabs's curator insight, February 18, 2013 2:47 PM

I am facebook expert hahaha, joke, joke

Rescooped by ITGabs from opexxx
Scoop.it!

4 Nmap Scripts for Hunting 2012 popular vulnerabilities

4 Nmap Scripts for Hunting 2012 popular vulnerabilities | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Here we have four important Nmap Scripts for Hunting 2012 popular vulnerabilities including MS12-020 RDP vulnerability,Php-cgi vulnerability, Samba heap overflow vulnerability and Bypassing authentication in MySQL and MariaDB servers...

Via alexander knorr
ITGabs's insight:

Awesome Nmap Scripts ;)

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

How to Clean Up and Secure Your Hacked WordPress Site

How to Clean Up and Secure Your Hacked WordPress Site | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
As we often state, the Web has been the great equalizer for attackers. Everyone, regardless of operating system, uses the Internet. Therefore, a lot of software is written that is usable by anyone ...
ITGabs's insight:

Very good info...

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

HTML5 Web bug allows data dump on PCs

HTML5 Web bug allows data dump on PCs | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.

 

Developer Faross Aboukhadijeh found the bug and set up a demo page that fills visitors hard drives with pictures of cartoon cats.

In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook.


Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.

While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.

 

One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.

 

 

ITGabs's insight:

One gigabyte of data every 16 seconds onto a vulnerable Macbook!!

more...
Sean Gardiner's curator insight, March 20, 2013 9:09 AM

This just shows that people can find a way to do anything via hacking oand exploiting bugs 

Scooped by ITGabs
Scoop.it!

Why Hybrid Cloud Computing May Be the Way of the Future

Why Hybrid Cloud Computing May Be the Way of the Future | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

Public cloud computing, such as that offered by Amazon, Microsoft, RackSpace and others, is the most prevalent deployment model in use today.  The costs to enter are the lowest of the three models, and because it is heavily commoditized, it offers effective self-service options. This minimizes the need for on-site technology staff.

 

Private cloud computing, where the organization creates its own cloud computing infrastructure internally, or has it hosted/managed by a large scale data center provider, is an option that larger enterprises make use of.  The costs are not trivial, and it can take a fair amount of time to put into place. It offers the most security and privacy and customization of the three models.

 

Read More at: http://www.techpageone.com/uncategorized/why-hybrid-cloud-computing-may-be-the-way-of-the-future/

 

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

The Best Cloud Computing Companies and CEOs to Work For in 2013 - Forbes

The Best Cloud Computing Companies and CEOs to Work For in 2013 - Forbes | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

Hiring great people and creating a culture of achievement that is fun, focused and able to get challenging tasks done is not an easy task.

Keeping that culture strong and focused on the customer takes a unique leader that consistently earns trust and respect.  Those are the qualities I think of whenever I’m asked to recommend the best cloud computing companies to work for.  Using the scores from Glassdoor.com I’ve put together the table below comparing cloud computing companies and when available, the percentage of employees who approve of their CEO.

Cloud computing companies are sorted based on the percentage of employees would recommend their company to a friend.  I added in CEO scores to get a sense of which companies have a significant gap between morale and the perception of the CEO.  As of today according to employee rankings, Microsoft has the largest gap between percentage of employees who would recommend the company to a friend (77%) and  CEO rating (48%).

 

 

 

ITGabs's insight:

I was checking this list and I really like box.net, in ThinkHR.com we did an amazing job integrating that service, sad for box that their don't have a free service like Dropbox, another amazing startup, and Google amazing as usual... but Appdynamics mmmm all the Java stuff had so good marketing and the worst religious brain washed programmers so what we can expect ;)

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

In A Play For More HTML5 Muscle, Intel Buys appMobi’s HTML5 Developer Tools, Leaving appMobi To Focus On The Cloud | TechCrunch

In A Play For More HTML5 Muscle, Intel Buys appMobi’s HTML5 Developer Tools, Leaving appMobi To Focus On The Cloud | TechCrunch | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

Intel will not be left out of the party when it comes to being central in the mobile app ecosystem. The company today acquired a set of HTML5 development tools, originally created by appMobi and used by some 150,000 developers, and has hired staff from appMobi that worked on the product to continue to maintain it. appMobi, meanwhile, is going to forge ahead as a standalone company, focused on the remaining part of its business as a provider of cloud services for mobile applications. Financial terms of the deal were not disclosed.

 

The acquisition was first made public by appMobi in a letter sent out to the 150,000+ developers that use its platform. A copy of that letter was sent to TechCrunch and is below.

 

In it, appMobi spells out the basics of what Intel has now taken under its wing. In short, it’s a set of app creation and testing tools that cover mobile web, Windows 8 and Windows Phone, iOS, Android and more.

 

 

ITGabs's insight:

Nice!!

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Apple suffers largest hacking attack in its history - San Jose Mercury News

Apple suffers largest hacking attack in its history - San Jose Mercury News | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
International Business Times Apple suffers largest hacking attack in its history San Jose Mercury News BOSTON/SAN FRANCISCO -- Apple (AAPL) was recently attacked by hackers who infected Macintosh computers of some employees, the company said...
more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Space Station Communications Outage Due To Software Update - Fast Company

Space Station Communications Outage Due To Software Update - Fast Company | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it
Fast Company
Space Station Communications Outage Due To Software Update
Fast Company
NASA lost communication with the International Space Station today for nearly three hours because of a software update gone wrong.
ITGabs's insight:

what It's next? a computer virus going to the moon?

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

BackTrack Linux - Penetration Testing Distribution

BackTrack Linux - Penetration Testing Distribution | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

BackTrack is my chooise for a computer security audit or a Linux desktop is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date.

 

Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.

 

 

ITGabs's insight:

BackTrack is my chooise for a computer security audit or a Linux desktop

more...
No comment yet.
Scooped by ITGabs
Scoop.it!

Platform-as-a-Service: 6 Ways PaaS Will Change The Enterprise

Platform-as-a-Service: 6 Ways PaaS Will Change The Enterprise | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

Jetpacks, flying cars, hybrid cloud. Which one will be ubiquitous in two years? Here’s a hint: It’s the one that doesn’t involve personal air travel.

In two years, the cloud-computing-enabled enterprise will have the enviable luxury to take much for granted, including accelerated time to market, seamless deployment, true polyglot coding and agile-as-you-want development.

And the technology that will enable that bright future? Here’s another hint: It starts with “private PaaS” or private Platform- as-a-Service. Think of private PaaS as cloud middleware for the enterprise — Platform-as-a-Service technology for on-premise service delivery behind a firewall, or an operating system for an enterprise private cloud.

Here are six ways private PaaS will change the enterprise cloud space by 2015:

 

1. Mobile apps will drive enterprise cloud and private PaaS adoption.

Two years from now, the biggest driver for cloud adoption won’t be traditional applications, it’ll be mobile apps. Disparate workforces already make Bring Your Own Device (BYOD) a cost of doing business for the enterprise: More types of enterprise work will require more types of mobile applications. And that will burden IT leaders mandated with managing the cloud. To retain control (and sanity), those IT leaders will embrace private PaaS technologies to provide integrated application management of mobile (and Web and cloud) applications.

ITGabs's insight:

From SaaS to PaaS

more...
No comment yet.
Rescooped by ITGabs from Great Mind
Scoop.it!

Facebook Said to Work With FBI on Malware Attack Probe

Facebook Said to Work With FBI on Malware Attack Probe | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

 

Facebook Inc., operator of the largest social network with more than 1 billion members, is working with the U.S. Federal Bureau of Investigation to probe a malware attack, people with knowledge of the matter said.

 

Facebook said yesterday that it was subjected to a “sophisticated attack” by hackers last month, without saying where the attack originated. Investigators haven’t found any evidence that user data was compromised, Menlo Park, California- based Facebook said on its website. The people who discussed the FBI’s involvement asked not to be identified, citing the sensitive nature of the probe.

 

“As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day,” Facebook said.

Malware infected laptops used by Facebook employees when they visited a mobile developer’s website, the company said.

Facebook fell less than 1 percent to $28.32 at yesterday’s close in New York

more...
ITGabs's curator insight, February 18, 2013 1:49 PM

100% secure it's imposible. everything is hackeable

 

Scooped by ITGabs
Scoop.it!

The beginner's guide to Greasemonkey scripting

The beginner's guide to Greasemonkey scripting | Hacking, Reverse Engineering, Software, Scripts, Coding, Guides | Scoop.it

The idea behind Greasemonkey is pretty simple. It's a Firefox extension, installed in the same way as any other Firefox extension (find it via the Tools > Addons menu and hit Install).

 

However, it doesn't do anything in and of itself: what it does is to enable you to run scripts, either by other people or by yourself, which will alter the way web pages look and function.

 

Greasemonkey user scripts are the bits of code that actually do the work – Greasemonkey itself just loads and manages these. User scripts are written in JavaScript, but be warned: for security reasons, this isn't just a question of writing regular JavaScript and away you go.

 

There are some gotchas to be aware of, although the scripts in this guide don't encounter any of them. A quick note if you're unfamiliar with JavaScript: this guide isn't going to explain JavaScript syntax in any detail, but don't let that stop you from giving it a go. It's all fairly logical and the code snippets are all explained.

 

 

ITGabs's insight:

Very Easy Guide to use Grease Monkey

more...
No comment yet.