Before we continue please remember that:
A master reset restores the original factory settings and may delete your personal data on the internal storage, it does not delete data stored on the SIM card.
- Back up data on the internal memory.
- Turn off the device.
- Press and hold the
Volume Up key and the
Home key, then press and hold the Power key.
- When the Samsung Galaxy Note5 logo screen displays, release only the Power key
- When the Android logo displays, release the Volume Up and the Home key (‘Installing system update’ will show for about 30 – 60 seconds before showing the Android system recovery menu options).
- Press the Volume down key several times key to highlight
wipe data / factory reset.
- Press Power button to select.
- Press the Volume down key until
Yes -- delete all user data is highlighted.
Power button to select and start the master reset.
- When the master reset is complete,
Reboot system now is highlighted.
- Press the
Power key to restart the device.
Security expert Bruce Schneier recently talked about how someone is learning how to take down the internet. We have seen lots of companies talk about attacks on their infrastructure, breaches, hacking and stealing accounts, etc. As per the companies, it seems name of the attacks are made out to seem like probing for ways to get into networks and do harm.
It reminds me of the US’s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.
– Bruce Schneier
Continue reading Bringing down the Net?
Games with Gold
WARRIORS OROCHI 3 Ultimate
Available: 08/01 – 08/31 (Xbox One)
Available: 07/16 – 08/15 (Xbox One)
Available: 08/01 – 08/15 (Xbox 360)
Available: 08/16 – 09/15 (Xbox One)
Beyond Good & Evil HD
Available: 08/16 – 08/31 (Xbox 360)
First off, you may be wondering what’s the Sleeper Simulant… It’s a powerful 290 Exotic Fusion Rifle that goes into your Guardian’s Heavy Weapon slot. I just got mine last night and am enjoying the heck out of it.
Once you complete the The First Firewall quest, you’ll receive the Curious Transceiver. Continue reading Destiny: the Sleeper Simulant quest
Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know what webserver you are connecting to. Continue reading Researchers find over 100 spying Tor nodes
This vulnerability has existed since 2012 and it affects Android and Linux systems running Linux Kernel version 3.8+, and Linux server or desktop running kernel 3.8+ is vulnerable.
As of the date of disclosure, this vulnerability has implications for approximately tens of millions of Linux PCs and servers, and 66 percent of all Android devices (phones/tablets).
How do I fix this?
First some background on what the CVE-2016-0728 bug is. From the Perception Point Research Team
CVE-2016-0728 is caused by a reference leak in the keyrings facility. Before we dive into the details, let’s cover some background required to understand the bug. It can successfully escalates privileges from a local user to root.
Continue reading Linux Kernel Zero Day Vulnerability CVE-2016-0728
This is actually a really old post that I had done on another site and wanted to share it here in case it would help anyone. We have the code on GitHub should you want to fork it or collaborate to keep it updated to more recent versions of Nagios and Exchange.
I was tasked at work to devise a way to make our Exchange OWA site be monitored by our Nagios-3 servers. After several days and some hours of research, hoping that someone had already done it in hopes of making my life easier; I ended up with one script that basically combined php and curl. Being new to scripting it was most confusing and I ended up taking on the task to introduce myself to it.
Continue reading Monitoring an Outlook Web Access site with Nagios
What is viber?
Viber for Desktop lets you send free messages as well as make free calls to other Viber users, on any device and network, in any country! Initially released as a phone app, you can now use it on your Windows and Mac desktops with a Linux version currently in development for 64-bit systems.
For the Viber site:
Viber is a mobile application that allows you to make phone calls and send text messages to all other Viber users for free! Viber is available over WiFi or 3G. Our sound quality is much better than a regular call. Once you and your friends install Viber, you can use it to talk and message as much as you want. Talk, message, and talk and message some more – for free!* You can also call any number that doesn’t have Viber at low rates using ViberOut.
Continue reading Install Viber on Linux
We all owe [Richard Stallman] a large debt for his contributions to computing. With a career that began in MIT’s AI lab, [Stallman] was there for the creation of some of the most cutting edge technology of the time. He was there for some of the earliest Lisp machines, the birth of the Internet, and was a necessary contributor for Emacs, GCC, and was foundational in the creation of GPL, the license that made a toy OS from a Finnish CS student the most popular operating system on the planet.
Continue reading Stallman’s One Mistake | Hackaday