Whatsapp is a standout amongst the most well known cross stage informing applications for ios and something that I utilize every day on my iphone to stay in contact with loved ones. The application has been accepting new gimmicks routinely, however despite everything i'm baffled that the designers haven't added local Quick Reply to it yet.
In case you're an escape client, you'll be happy to get some answers concerning a change known as Nuntius that guarantees to bring this peculiarity to Whatsapp. With the change introduced, you can without much of a stretch react to Whatsapp messages from the Notification flag, regardless of whether you're inside the application or not.
When you get a message from Whatsapp, essentially swipe down the Notification Banner and a content field shows up where you can sort in your answer and send it immediately without opening the application. Alongside individual discussions, the change backings gathering messages also.
In the wake of introducing Nuntius, there are no settings to arrange. Basically swipe down the warning flag from Whatsapp and react to the messages from anyplace in ios.
As quite a while and regular client of Whatsapp, I've been enthusiastically sitting tight for a change like this which brings Quick Reply to the informing application and I can say that Nuntius does its employment flawlessly. It doesn't make any issues and works splendidly as promoted.
The change is at present in beta and may have a few bugs, yet in the event that you'd like to get your active it, you'll need to add another source to Cydia. To do thus, dispatch Cydia and head to Sources -> Edit -> Add and sort in the accompanying URL: http://sharedroutine.com/repo/. Once done, just look for the change in Cydia and search it.
Thursday, 29 January 2015
"GHOST" Critical Vuln most affected linux
An exceptionally discriminating defenselessness has been uncovered in the GNU C Library (glibc), a generally utilized part of most Linux disseminations, that could permit assailants to execute pernicious code on servers and remotely pick up control of Linux machines.
The powerlessness, named "Ghost" and appointed CVE-2015-0235, was found and revealed by the security scientists from Redwood Shores, California-based security firm Qualys on Tuesday.
Basic AS HEARTBLEED AND SHELLSHOCK
Apparition is thought to be discriminating on the grounds that programmers could abuse it to quietly increase complete control of a focused on Linux framework without having any former information of framework certifications (i.e. managerial passwords).
The blemish speaks to an enormous Internet danger, in a few routes like the Heartbleed, Shellshock and Poodle bugs that became exposed a year ago.
The powerlessness, named "Ghost" and appointed CVE-2015-0235, was found and revealed by the security scientists from Redwood Shores, California-based security firm Qualys on Tuesday.
Basic AS HEARTBLEED AND SHELLSHOCK
Apparition is thought to be discriminating on the grounds that programmers could abuse it to quietly increase complete control of a focused on Linux framework without having any former information of framework certifications (i.e. managerial passwords).
The blemish speaks to an enormous Internet danger, in a few routes like the Heartbleed, Shellshock and Poodle bugs that became exposed a year ago.
WHY GHOST ?
The vulnerability in the GNU C Library (glibc) is dubbed GHOST because it can be triggered by the library's gethostbyname family of functions. Glibc is a repository of open-source software written in the C and C++ coding languages that defines system calls.
The problem actual originates from a heap-based buffer overflow found in the __nss_hostname_digits_dots() function in glibc. This function is especially invoked by the _gethostbyname and gethostbyname2() function calls.
According to the researchers, a remote attacker has ability to call
either of these functions which could allow them to exploit the
vulnerability in an effort to execute arbitrary code with the
permissions of the user running the application.
Endeavor CODE
While trying to highlight the seriousness of the danger, security analysts had the capacity compose verification of-idea adventure code that is competent to do an undeniable remote code execution assault against the Exim mail server.
The analyst's endeavor ready to sidestep all current adventure assurances (like ASLR, PIE and NX) accessible on both 32-bit and 64-bit frameworks, including position free executions, location space design randomization and no execute securities.
Utilizing the endeavor, an aggressor has the capacity make pernicious messages that could consequently trade off a powerless server without the email actually being opened, by Sarwate, chief of designing with Qualys.
In this way, the organization has not distributed the endeavor code to people in general however in the end it plans to make the adventure accessible as a Metasploit module.
While trying to highlight the seriousness of the danger, security analysts had the capacity compose verification of-idea adventure code that is competent to do an undeniable remote code execution assault against the Exim mail server.
The analyst's endeavor ready to sidestep all current adventure assurances (like ASLR, PIE and NX) accessible on both 32-bit and 64-bit frameworks, including position free executions, location space design randomization and no execute securities.
Utilizing the endeavor, an aggressor has the capacity make pernicious messages that could consequently trade off a powerless server without the email actually being opened, by Sarwate, chief of designing with Qualys.
In this way, the organization has not distributed the endeavor code to people in general however in the end it plans to make the adventure accessible as a Metasploit module.
VERSIONS AFFECTED
The vulnerability affects versions of glibc as far back as glibc-2.2, which was released in 2000.
"Unfortunately, it was not recognized as a security threat; as a result, most stable and long-term-support distributions were left exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7, Ubuntu 12.04, for example," researchers from Qualys said in an advisory published Tuesday.
FIXES AVAILABLE FOR SOME LINUX DISTRIBUTIONS
However, major distributors of the Linux operating system, including Red Hat, Debian and Ubuntu,
updated their software on Tuesday to thwart the serious cyber threat.
In order to update systems, core functions or the entire affected server
reboot is required.
Red Hat, the No. 1 provider of Linux software to businesses, recommends its customers to update their systems "as soon as possible to mitigate any potential risk."
Label:
News
Mozilla Deploying High-limit Tor Middle Relays
Back in November, Mozilla collaborated with Tor Project under another activity called Polaris, to help decrease limited number of Tor associations happening in the meantime by including high-limit Tor center transfers to the Tor system, and now the organization is prepared with its first Tor Middle transfers.
The Firefox producer has given the Tor arrange a high-limit center transfers with the dispatch of 12 transfers, all placed in the United States, that will help circulate client movement; the Tor program is an extraordinary approach to continue prying eyes from following you.
Mozilla is a standout amongst the most trusted organizations on the web, especially in terms of client security. The organization of Mozilla and Tor went for giving more protection peculiarities to Firefox program, and expanded Tor system help.
The Polaris Privacy Initiative was an exertion of Mozilla, the Tor Project and the Center of Democracy and Technology — a support bunch for computerized rights, so as to help incorporate more security controls with engineering.
Specialists working under the Polaris Project made utilization of Mozilla's extra and decommissioned fittings, which incorporated a couple of Juniper Ex4200 switches and three HP Sl170zg6 (48gb ram, 2*xeon L5640, 2*1gbps NIC) servers, alongside a committed existing IP Transit supplier to the venture (2 X 10gbps)
"The current outline is completely repetitive. This permits us to finish support or have hub disappointment without affecting 100% of activity. The most dire outcome imaginable is a half loss of limit," French Mozilla engineer Arzhel Younsi said in a blog entry."
"The configuration additionally permits us to effortlessly include more servers in the occasion we require more limit, with no expected effect."
In any case, the stage is not near to running its maximal data transfer capacity limit and could get further upgrades including being moved into Mozilla's overseen foundation and having Ipv6 network help.
Underlining a few restrictions, Younsi clarifies that because of security reasons, not more than two Tor hubs can impart a solitary IP address. Anyhow assuming this is the case, an assailant could dispatch a mixed bag of fake hubs to sidestep the obscurity.
Also, a recently began Tor Relay would last up to two months to utilize its full data transmission. It would in this way screen the usage of the data transfer capacity accurately.
Designers utilized the open source Ansible stage for arrangement administration, an instrument under thought for which there is as of now an "ansible-tor" profile. Likewise, the device does not oblige a substantial customer/server foundation which ought to make it more available to different administrators.
The stage was secured with strict firewall channels, solidified working frameworks, solidified the system gadgets administration plane, and executed edge sifting in a push to verify just approved frameworks can interface with the "system administration plane."
"It is vital to note, that a large number of the security necessities adjust pleasantly to what's viewed as a decent practices when all is said in done framework and system organization," Younsi said.
Prior to the dispatch of Polaris activity, Facebook began offering an extraordinary Tor-just URL – facebookcorewwwi.onion – trying to make it simpler for unknown clients to get to the Internet, it seems like the little Onion Router is at last hitting the stand
The Firefox producer has given the Tor arrange a high-limit center transfers with the dispatch of 12 transfers, all placed in the United States, that will help circulate client movement; the Tor program is an extraordinary approach to continue prying eyes from following you.
Mozilla is a standout amongst the most trusted organizations on the web, especially in terms of client security. The organization of Mozilla and Tor went for giving more protection peculiarities to Firefox program, and expanded Tor system help.
The Polaris Privacy Initiative was an exertion of Mozilla, the Tor Project and the Center of Democracy and Technology — a support bunch for computerized rights, so as to help incorporate more security controls with engineering.
Specialists working under the Polaris Project made utilization of Mozilla's extra and decommissioned fittings, which incorporated a couple of Juniper Ex4200 switches and three HP Sl170zg6 (48gb ram, 2*xeon L5640, 2*1gbps NIC) servers, alongside a committed existing IP Transit supplier to the venture (2 X 10gbps)
"The current outline is completely repetitive. This permits us to finish support or have hub disappointment without affecting 100% of activity. The most dire outcome imaginable is a half loss of limit," French Mozilla engineer Arzhel Younsi said in a blog entry."
"The configuration additionally permits us to effortlessly include more servers in the occasion we require more limit, with no expected effect."
In any case, the stage is not near to running its maximal data transfer capacity limit and could get further upgrades including being moved into Mozilla's overseen foundation and having Ipv6 network help.
Underlining a few restrictions, Younsi clarifies that because of security reasons, not more than two Tor hubs can impart a solitary IP address. Anyhow assuming this is the case, an assailant could dispatch a mixed bag of fake hubs to sidestep the obscurity.
Also, a recently began Tor Relay would last up to two months to utilize its full data transmission. It would in this way screen the usage of the data transfer capacity accurately.
Designers utilized the open source Ansible stage for arrangement administration, an instrument under thought for which there is as of now an "ansible-tor" profile. Likewise, the device does not oblige a substantial customer/server foundation which ought to make it more available to different administrators.
The stage was secured with strict firewall channels, solidified working frameworks, solidified the system gadgets administration plane, and executed edge sifting in a push to verify just approved frameworks can interface with the "system administration plane."
"It is vital to note, that a large number of the security necessities adjust pleasantly to what's viewed as a decent practices when all is said in done framework and system organization," Younsi said.
Prior to the dispatch of Polaris activity, Facebook began offering an extraordinary Tor-just URL – facebookcorewwwi.onion – trying to make it simpler for unknown clients to get to the Internet, it seems like the little Onion Router is at last hitting the stand
Label:
News
Tuesday, 27 January 2015
‘Alfred Remote’ can make your iOS device a remote control for your Mac
On Tuesday, January 27, Running with Crayons authoritatively proclaimed an extend a long-term impending: Alfred for ios.
The application, which is presently accessible in the ios App Store for $4.99, is planned with some equality with the "Alfred" Mac application. The thought behind the ios application is to capacity as a remote control for your Mac, making it conceivable to control certain components of the machine, such as opening a few applications, right from your ios gadget.
More than that, however, the Alfred for ios application will let clients get to some systemwide associations on their machine, as well. That will take the expansion of a Powerpack alongside Alfred 2 on their Mac, which costs around $25. With this expansion, Alfred for ios clients can control some selective parts of the framework, including itunes playback.
Different gimmicks included with the Powerpack alternative incorporate the capacity to duplicate and glue from ios to OS X, running terminal orders, and actually making and altering custom Workflows.
For clients who would prefer not to spend additional for the Powerpack alternative, Alfred for ios will let clients actuate a screen saver or open pages on their Mac from their iphone or ipad.
With a solitary touch on your ios gadget, you can control numerous Alfred 2 activities on your Mac, including:
– Show Alfred 2 on your Mac
– System Commands: Lock, restart, close down, log out or rest your Mac, discharge all gadgets, quit all applications and unfilled junk
– Launch Applications and System Preferences on your Mac
– Open records and envelopes you've characterized on your Mac
– Open sites and bookmarks, or pop up Alfred with a custom hunt filled in
– Replace hard to recollect hotkey blends and watchwords with symbols on ios
In case you're an Alfred 2 Powerpack client, you can control Powerpack gimmicks, for example,
– itunes on your Mac: Play, skip, rate your tracks and even begin playing irregular collections
– Quickly glue client characterized clipboard bits into content fields and reports on your Mac
– Run client characterized scripts, Applescripts and terminal summons
– Connecting Remote to your most loved Alfred 2 Workflows gives very nearly boundless conceivable outcomes!
The application is accessible now in the ios App Store, with a download connection to the application underneath
Download Link
The application, which is presently accessible in the ios App Store for $4.99, is planned with some equality with the "Alfred" Mac application. The thought behind the ios application is to capacity as a remote control for your Mac, making it conceivable to control certain components of the machine, such as opening a few applications, right from your ios gadget.
More than that, however, the Alfred for ios application will let clients get to some systemwide associations on their machine, as well. That will take the expansion of a Powerpack alongside Alfred 2 on their Mac, which costs around $25. With this expansion, Alfred for ios clients can control some selective parts of the framework, including itunes playback.
Different gimmicks included with the Powerpack alternative incorporate the capacity to duplicate and glue from ios to OS X, running terminal orders, and actually making and altering custom Workflows.
For clients who would prefer not to spend additional for the Powerpack alternative, Alfred for ios will let clients actuate a screen saver or open pages on their Mac from their iphone or ipad.
With a solitary touch on your ios gadget, you can control numerous Alfred 2 activities on your Mac, including:
– Show Alfred 2 on your Mac
– System Commands: Lock, restart, close down, log out or rest your Mac, discharge all gadgets, quit all applications and unfilled junk
– Launch Applications and System Preferences on your Mac
– Open records and envelopes you've characterized on your Mac
– Open sites and bookmarks, or pop up Alfred with a custom hunt filled in
– Replace hard to recollect hotkey blends and watchwords with symbols on ios
In case you're an Alfred 2 Powerpack client, you can control Powerpack gimmicks, for example,
– itunes on your Mac: Play, skip, rate your tracks and even begin playing irregular collections
– Quickly glue client characterized clipboard bits into content fields and reports on your Mac
– Run client characterized scripts, Applescripts and terminal summons
– Connecting Remote to your most loved Alfred 2 Workflows gives very nearly boundless conceivable outcomes!
The application is accessible now in the ios App Store, with a download connection to the application underneath
Download Link
How to backconnect with weevely on windows
Okay, this Time I will share how to Backconnect with weevely on windows.
For those Who do not know how to install weevely on windows could be here.
- Open cmd and run weevely
- type "weevely.py generate yolo system.php" (Red colored paper can be changed according to the desire)
- upload a shell to a backdoor that you have
Install Weevely On Windows
I'm here to try to explain how backconnect with weevely on windows.
What is the use backconnect ?? Actually backconnect it is the first gate to do the rooting. but rooting a server is not easy
Tools :
After download all tools
Thanks :)
What is the use backconnect ?? Actually backconnect it is the first gate to do the rooting. but rooting a server is not easy
Tools :
After download all tools
- Instal Python 2.7
- Open command prompt and type "cd setuptools-0.9.8"
- then type "setup.py install"
- After the process is finished . Now move to python's directory
- then type "easy-install.exe pip"
- And the final step , type "pip install pyreadline pyyaml"
- After all step done , now try to open weevely
Thanks :)
Subscribe to:
Comments (Atom)

