Featured Post
IOS 4.1 Jailbroken Already
- Get link
- X
- Other Apps
By
Rishoo Mittal
-
Just hours after Apple released iOS 4.1 to great fanfare, hardware hackers found a way to jailbreak devices that run the new operating system. More surprising still, there doesn't appear to be anything Steve Jobs can do to stop them in the near future. The exploit in the boot ROM of iOS devices was first announced by iPhone Dev-Team member pod2g. It was soon confirmed by other hackers, who said that because the exploit targets such a low-level part of the operating system, Apple won't be able to stop jailbreakers without making significant hardware changes.
Related Posts
Ex-HP CEO Hurd Pays $14 Million Bounty as Oracle Pledge Fee
By
Rishoo Mittal
-
Valleywag reports that ousted HP CEO Mark Hurd is paying dearly to roll with Oracle, giving up millions of dollars to settle the HP lawsuit that threatened to prevent him from working at his new job. Hurd will forfeit about 345,000 restricted HP shares that he was given as part of his HP exit package, which had a market value of $13.6 million. In addition to announcing the truce against the backdrop of Oracle's OpenWorld conference, HP and Oracle also reaffirmed their vows to each other.
The bug in the name of the C++ language.
By
Rishoo Mittal
-
From the internet, a popular quote goes like this: "Of course, while it is true that the ++ operator gives the C++ language its name, it also led to the first joke about the language. C++ haters point out that even the name of the language contains a bug: 'After all, it should really be called ... ++C, because we only want to use a language after it has been improved.' " We will now see why this joke is so absolutely hilarious. int main() { int x = 40; int y = ++x + 1; std::cout << x << '\n' << y; } Output: x = 41, y = 42. The pre-increment operator first increments the value of x (the ++) and then stores it in the variable. Hence, when the code is executed, x becomes 41 AFTER being assigned to y . The post-increment works the other way, the value is first stored in the lvalue before being assigned to the rvalue of the variable being incremented. int main() { int x = 40; int y = x++ + 1; std::cout <&l
Biography of The Rock 'n' Roll Drummer...John bonham....
By
Rishoo Mittal
-
John Bonham was born in the Midlands countryside of Worcestershire on 31 May 1948. He got his first snare drum at 10, a present from his mum. He joined his first band, Terry Webb and the Spiders, at the age of 16 in 1964. In 1965, he joined his second band, A Way of Life, and met Pat Phillips at a dance near his home in Kidderminster. At age 17, they were married. The band became inactive and Bonham, with a new wife to support, had either to make a go of drumming financially or quit. He had met a young singer, Robert Plant , a couple of years earlier, and Plant wa currently in a band called Crawling King Snakes, and they needed a drummer. Bonham fitted the bill. Bonham lived quite a way from the rest of the band and transportation costs (i.e. petrol money) stretched the finances of a struggling band to the limit. Within a few months, Bonham had left the band to rejoin the local A Way of Life. He was completely self-taught as a drummer, and despite this fact, or ma
Scrum Roles (Scrum Master, Product owner, Development Team) and collaboration between each other
By
Rishoo Mittal
-
1. What is one service a Scrum Master provides to the Product Owner? The Scrum Master is Scrum Framework expert and responsible for its adherence in creating a successful product. As an expert, he is the coach for both product owner and development team. Now if we talk about service a Scrum Master provides to the product owner - a product owner gets coaching from the Scrum Master especially for: • In choosing the right product management techniques and tools • In making product-related decisions • In determining product management practices. 2. Who can order the items in the Product Backlog? As per Scrum Guide, - The Product backlog is an ordered list of everything that is known to be needed in the product. It is the single source of requirements for any changes to be made to the product. The Product Owner is responsible for the Product Backlog, including its content, availability, and ordering. The Product Own
Wi-Fi WPA2 Zero Day Vulnerability Found
By
Rishoo Mittal
-
Black Hat conference: a claimed vulnerability in WPA2 Enterprise that leaves traffic open to a malicious insider. "...wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available. Malicious insiders can exploit the vulnerability, named 'Hole 196' by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Hole 196 lends itself to man-in-the-middle-style exploits, whereby an internal, authorized Wi-Fi user can decrypt, over the air, the private data of others, inject malicious traffic into the network, and compromise other authorized devices using open source software, according to AirTight. 'There's nothing in the standard to upgrade to in order to patch or fix the hole,' says Kaustub
Comments
Post a Comment
Let's discuss and learn more