In Linux Operating System you can use the builtin MD5Sum utility to quickly calculate and verify the hash values to check file integrity. There is no built-in Microsoft Windows. However, Microsoft provides a free command line utility that you can download to calculate the MD5/SHA hashes of the files called FCIV (File CheckSum Integrity Verifier). . . . → Read More: How To Verify Hash Values in Windows
Beware of Fake Blackberry Messenger Android App . . . → Read More: Beware of Fake Blackberry Messenger Apps
According to an article published by the Chaos Computer Club popularly called CCC, a group of its hackers have successfully broken the much touted Fingerprint scanner by Apple called TouchID. . . . → Read More: Hackers Break Apple’s Biometric Security TouchID
Password on a Post-it. Spotted this at the reception of a company. Next time you hear a breach or data leak in this part of the world, you know what caused it 🙂 . . . → Read More: Password On A Post-It
Spotted this sometime back on one of the Axis Bank’s ATM machines in Bangalore. Any clues on what could be a demo software on a Bank’s ATM machine? It says License expired! . . . → Read More: What is this Demo Software running on ATM?
Some folks at Flipkart decided to piggyback on the “Crossword Bookstore” term and bid for this key word at Google’s Adwords. Did Flipkart really need to do this? I don’t think so and I feel this is a case of Blackhat SEO. So what prompted Flipkart to do this? Only they can answer but the folks at Flipkart team who bid for this keyword must have surely known what they were doing and the eventual consequences (see the update). Going by the similar instances it appears many brands do indulge in such practices and deactivate such “gray” or unethical paid listings upon notice by the victims! . . . → Read More: Why Flipkart Is Wrong To Hijack Crossword’s Name Using Sponsored Ads
Although the concept of hacking has been used from a long time in Hollywood movies, its adoption in the Indian mainstream movies has been relatively low profile. One of the most famous hacking scene must be Trinity (Carie Annie Moss) firing up nmap in the cult movie The Matrix Reloaded to figure out open ports on one of the power grids control machine. There have been notable other scenes and hacking concepts used in Hollywood like Wargames, Swordfish, Takedown, The Girl with the Dragon Tattoo, Independence day (probably the dumbest hacking scene in movie history – infecting alien systems with virus) and others. Kahaani, an Indian movie has lot of geek stuff like hacking and social engineering used in it. But the hacking scenes could have been made more authentic. This post is as attempt on this lines . . . → Read More: How Kahaani Could Have Been Hackers Cult Movie
If you are a fan of cryptex that also made its appearence in Da Vinci Code novel, I am pretty sure you would be itching to you get your hands on it. May be to send that secret message to the special one 🙂 What if turned out to be a truly geeky stuff? Well some blokes at Kickstarter project thought so and are now bringing it to real life. . . . → Read More: USB Drive inspired by Da Vinci Code’s Cryptex