Security Alert: Linux Kernel Privilege escalation exploit affects Android platform


Android Operating System is based on the Linux, means the vulnerabilities affecting Linux kernel have the possibility of being exploited in the Android platform.





It appears the recently discovered Linux local kernel privilege escalation vulnerability (CVE-2013-2094) is affecting the Android operating system.

According to Symantec researchers, the exploit for the kernel vulnerability has now been modified to work on Android platform. The security flaw allows hacker to gain complete control of the infected devices.

Top 10 Computer Tricks Every Geek Should Know

visit www.earnandfun.tk for online income. just do task and get incomes

We've talked before about the things every computer user should know how to do, but we geeks are special: we want to go above and beyond, to explore every nook and cranny of our system and make everything easier. Here are ten ways to do just that.
Top 10 Computer Tricks Every Geek Should Know

10. Find New Uses for the Programs You Already Have

visit www.earnandfun.tk for online income. just do task and get incomes

Chances are, you've probably already found a few awesome tools and added them to your productivity arsenal, but most programs can be used for more than just their inteded purpose. The file-syncing Dropbox, for example, is also great for monitoring your home computer, printing files from afar, and even downloading stuff with BitTorrent. Savvy folks can use Gmail to store files in the cloud or find out if someone's stolen your laptop. Any tool can become multipurpose if you know its ins and outs.
Top 10 Computer Tricks Every Geek Should Know

9. Use the Command Line Like a Ninja

How to enable Two-Factor authentication in Linkedin?



I'm very glad to hear the Linkedin is the latest company that boosts the security with the Two-Factor authentication. Few days back, Twitter enabled the two-step verification to thwart hackers.

Are you searching for the guide to configure the 2-step authentication? You are at right place.  Here is the guide that will help you to configure the linkedin two-step verification .

Before getting into the actual steps, let me explain what 2-step auth is.


Two-Step Verification:
A security feature that prompts you to enter a temporary secret number sent to your phone whenever you log into your account.

Why you should enable this feature?
I believe this is best security feature.  Let us assume, someone has stolen your login credentials via keylogger or phishing or any other method.  If the hacker try to log into the website with your credentials, he will asked to provide the secret number sent to your mobile.  Fortunately, you have your mobile with you ;) .  So hacker can't log in to your account.  Also you will come to know that someone is trying to access your account. 

  visit www.earnandfun.tk for online income. just do task and get incomes

The Transparent Smartphone to become real by end of 2013!

The Transparent Smartphone to become real by end of 2013!

 

Yes, the Transparent Smartphone shown only in sci-fi flicks till now is soon to become real. Thanks to an amazing working concept by Polytron Technologies .


visit www.earnandfun.tk for online income