How cyberattacks threaten real-world peace

More and more, nations are waging attacks with cyber weapons — silent strikes on another country’s computer systems that leave behind no trace. (Think of the Stuxnet worm.) Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict — and how we might avert this global security hazard. (Filmed at TEDxParis.)

Kases sistēmu ļaunatūra ļāva restorānam “Gan Bei” krāpties ar nodokļiem

Kases sistēmu ļaunatūra ļāva restorānam “Gan Bei” krāpties ar nodokļiem

Podiņš sacīja, ka kratīšanas un aizturēšanas ir veiktas arī vienā no Latvijas lielākajiem kases sistēmu izstrādāšanas uzņēmumiem, kurš savas kases sistēmas piegādājis lielai daļai Latvijas tirgotāju, pakalpojumu sniedzēju un citu klientu. Kopā ar kases sistēmām šis uzņēmums klientiem piedāvājis zibatmiņas ar ļaunprogrammatūru, kura, slēdzot kasi, pēc saviem ieskatiem ļāvusi samazināt kasē esošo naudas summu un izņemt to no kases skaidrā naudā. Tādā veidā tika samazināts uzņēmuma oficiālais apgrozījums. “Grupējums bija ar ļoti sarežģītu struktūru, skrupulozi plānoja savu darbību, tajā strādāja augsta līmeņa speciālisti. Starp aizturētajiem ir arī šī kases sistēmu uzņēmuma vadītāji, kas vienlaikus ir arī ļaunprogrammatūras izstrādātāji,” skaidroja Podiņš. Zibatmiņu ar ļaunprogrammatūru uzņēmums klientiem piedāvāja par 1500 eiro, šai […]

Linux Destructive Commands You Should *Never* Use

Linux Destructive Commands You Should *Never* Use

Linux’s terminal commands are powerful, and Linux won’t ask you for confirmation if you run a command that won’t break your system. It’s not uncommon to see trolls online recommending new Linux users run these commands as a joke. Learning the commands you shouldn’t run can help protect you from trolls while increasing your understanding of how Linux works. This isn’t an exhaustive guide, and the commands here can be remixed in a variety of ways. Note that many of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work otherwise. On other Linux distributions, most commands must be run as root. rm […]

Get a List of Software Installed on Your PC with a Single Line of PowerShell

Get a List of Software Installed on Your PC with a Single Line of PowerShell

How to Get a List of Installed Software on Your PC Getting a list of installed software is as simple as using this straightforward WMI query. Get-WmiObject -Class Win32_Product | Select-Object -Property Name   You will probably want to export that to a file though, which is also easy enough — we’ll send the output using the > symbol and adding the path to a new text file that we want to create. Get-WmiObject -Class Win32_Product | Select-Object -Property Name > C:\Software\PCapps.txt What makes using PowerShell really neat is that if you do this on two different machines, you can easily compare the software installed on them. Compare-Object -ReferenceObject (Get-Content […]

Clear Putty’s Cache / Attīram Putty Kešatmiņas atslēgas

Clear Putty’s Cache For all those of you who have been trying to clear Putty’s cache of host fingerprints (Windows) for development or testing, here is the answer: 1. Open the registry (regedit) 2. Go to HKCUSoftwareSimonTathamPuTTYSshHostKeys There you should see Putty’s cache of host keys. The ‘name’ column tells you which key is for which server. For example, it will have the format of @: [rsa2@22:172.16.117.159] 3. Delete the rows that you need and presto! That’s all there is to it. — LV — Bieži gadās ka vajag attīrīt putty’a kešu, vai vienkārši bija jāpārģenerē RSA key’s, un putty’s pie [preauth] nobļaujas ka veca atslēga etc. Lai nerastos domstarpības […]

How To Fix The Windows Bootloader bootmgr

This article will show you how to: – Fix the Windows Vista bootloader – Fix the Windows 7 bootloader – Fix the Windows 8 bootloader ***warning – Messing with this stuff is potentially dangerous to your PC. I am not responsible for what you do. Option 1 – Standard Bootloader Repair 1 – Boot from the Windows install or repair CD appropriate to you version of Windows. For Windows 8: 1 – Boot from repair disc > Choose Keyboard type > click Troubleshoot > click Advanced options > choose Automatic Repair if that fails then use: 2 -Boot from Recovery disc or Install disc -Boot from repair disc > Chose […]