Our new System Speedup makes your life so much easier!

The management and optimization of your Windows PC is not an easy job, unless you are a tech savvy who masters the console and writes mini programs in order to solve daily problems. Let’s face it though; the new technology’s whole purpose is to make our lives easier, not to teach us all how to write code.

The post Our new System Speedup makes your life so much easier! appeared first on Avira Blog.

Announcing Release for Gluster 3.7 on CentOSLinux 7 x86_64

Over the last few weeks we have been working on getting the repositories
and related bits in place so that the Storage SIG is able to release
Gluster packages for general consumption. I am pleased to announce that
the majority of the requested versions are now available. Users can now
simple install Gluster on CentOS 6 and 7 with only these two commands:

  # yum install centos-release-gluster
  # yum install glusterfs-server

The centos-release-gluster content comes from the
centos-release-gluster37 package delivered via CentOS Extras repos. This
contains all the metadata and dependancy information, needed to install
Gluster 3.7.

For people looking at running Gluster 3.6, we will soon also release a
centos-release-gluster36 package. In order to get this version,
substitute the step-1 mentioned above with : yum install
centos-release-gluster36. A new announcement will be posted once this
content has been tested and released.

We have a quickstart guide specifically built around the packages we are
releasing today, it makes for a good introduction to Gluster and will
help get you started in just a few simple steps, this quick start is
available at
  https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart

More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
  https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster

The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Users can request additional
tools and applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
  https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs

Gluster is the first project that provides packages through the Storage
SIG. Other projects are in the process to do so too. General information
about the SIG can be read in the wiki:
  https://wiki.centos.org/SpecialInterestGroup/Storage

We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
( https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
< at >gluster .

Cheers,
Niels de Vos 
Storage SIG member & Gluster maintainer

PRTG Network Monitor Tool – Multiple Cross-Site Scripting Vulnerability

Posted by Sachin Wagh on Nov 27

================================================================
PRTG Network Monitor Tool – Multiple Cross-Site Scripting Vulnerability
================================================================

Information
——————–

Vulnerability Type : Cross Site Scripting Vulnerability
Vulnerable Version : 15.1.15.2021
Vendor Homepage:http://www.paessler.com/
CVE-ID : 2015-3445
Severity Low : Medium
Author – Sachin Wagh…

Mitigations for "carpet bombing" alias "directory poisoning" attacks against executable installers

Posted by Stefan Kanthak on Nov 27

Hi @ll,

almost all executable installers (and self-extractors as well
as “portable” applications too) for Windows have a well-known
(trivial, trivial to detect and trivial to exploit) vulnerability:
they load system DLLs from their “application directory” (or a
temporary directory they extract their payload to) instead of
“%SystemRoot%System32”.

See <https://capec.mitre.org/data/definitions/471.html>,
<…

[CVE-2015-6942] CoreMail XT3.0 Stored XSS

Posted by shack . li on Nov 27

Application: CoreMail
Versions Affected: XT3.0
Vendor URL: http://www.coremail.cn/
Bugs: Stored XSS
Author:shack.li(DBAPPSecurity Ltd)
Description:
Coremail mail system was born in 1999, is widely used in network operators, large enterprises, government institutions,
colleges and universities and other mail systems, so far, the user has more than 700000000,the official website.
Create a document, insert a hyperlink, hyperlink for…

Google Translator affected by Cross-Site Scripting vulnerability

Posted by Francisco Javier Santiago Vázquez on Nov 27

I. VULNERABILITY
————————-
Vulnerability Cross-Site Scripting Translator Google affected by Cross-Site
Scripting vulnerability (XSS)
Google assumes the vulnerability.

II. DESCRIPTION
————————-
– Firstly, go to https://translate.google.es/?hl=es website and click in
“Document Translate”
– Upload the proof of concept
– Finally, we can display the Cross-Site Scripting (XSS)

III. PROOF OF CONCEPT…

How to keep your kids safe on Snapchat

snapchat

If your child has a smartphone then it’s likely that they’ve installed one of the many different social networks that place photos as their primary way of communication. It seems almost unthinkable that a few years ago we weren’t all worrying about the best angle for a selfie or whether to snap a quick picture of our food to upload to Instagram before it goes cold.

A photo and video messaging app that has seen a huge surge in popularity is Snapchat. This app, which is primarily aimed at a younger audience, allows users to send videos and images to their contacts with the premise that these messages will be automatically eliminated after a few moments. Users set a time limit for how long recipients can view their Snaps (as of September 2015, the range is from 1 to 10 seconds) after which Snapchat claims they will be deleted from the company’s servers.

However, the application has seen some worrying issues relating to its security. For example, just last year the credentials of 4.6 million U.S. Snapchat users, such as usernames and phone numbers, were made public on the Internet. Despite introducing a new two-step verification process to help boost the app’s security, here are a few things to keep in mind before you let your child get too snap-happy.

How to keep your kids safe on Snapchat

  1. Warn your child over what content to send

Even though your child might think that they are sending the picture of video to their friends, remind them that the app has been hacked in the past and that if it happens again, their images could be made public. So advise them not to send something they wouldn’t want the whole world to see.

  1. Remind them that pictures can be saved

Despite the notion that pictures sent to contacts expire automatically after a set period of time, there are various ways around this and it’s worth pointing it out to your children.

For example, users are often able to take screenshots of photos and videos which are intended to be ephemeral using standard screen capture features on their smartphone or even by using special software to save the image.

  1. Don’t let strangers contact your children

So after following the above steps, next is to ensure that a stranger can’t send your child unsuitable images or contact them. To change the settings to ensure that only their friends can send them messages, tap the ghost icon at the top of the screen to access your child’s profile, then tap the gear cog icon in the upper-right corner, under the Settings menu go to “Receive Snaps from…” and ensure that it says “My Friends” instead of “Everyone”.

Finally, if someone has been harassing your child you can delete and block them from the same section of the menu as the step above. You can also write to [email protected] and they will resolve the issue. If still don’t feel comfortable letting your child use the app, you can delete their account and entering the username and password.

Remember, no matter how much freedom you want to allow your children when using social media, it always pays to keep them informed of the dangers it can pose, too.

The post How to keep your kids safe on Snapchat appeared first on MediaCenter Panda Security.