Rabu, 12 Agustus 2015

What is the Difference Between 127.0.0.1 and 0.0.0.0?

How-To Geek Newsletter
Did You Know?

The country of Mexico is named after its capital Mexico City (the ancient heart of the Aztec empire).

Geek Trivia

The Largest Asteroid Impact Site In The World Is Located In?
Russia →
The United States →
South Africa →
Brazil →


Advertisement
Get Dashlane Password Manager for Free
Keeping track of passwords and making them secure is startlingly simple with Dashlane's free password manager. Automatically import your passwords from Chrome or any other browser into your secure password vault. Save any missing passwords as you browse. Make a new password right within your browser. Get automatic alerts when websites get breached. Free download
Thoughts from the Geek

Hackers Cut a Corvette’s Brakes Via a Common Car Gadget

Researchers from the University of California at San Diego plan to reveal a technique they could have used to wirelessly hack into any of thousands of vehicles through a tiny commercial device: A 2-inch-square gadget that's designed to be plugged into cars' and trucks' dashboards and used by insurance firms and trucking fleets to monitor vehicles' location, speed and efficiency. By sending carefully crafted SMS messages to one of those cheap dongles connected to the dashboard of a Corvette, the researchers were able to transmit commands to the car's CAN bus—the internal network that controls its physical driving components—turning on the Corvette's windshield wipers and even enabling or disabling its brakes.

The headline says Corvette, but this could happen to any vehicle with an internet-connected component. In this case they hacked into a gadget used by companies like Uber to track their cars and were able to get through to the main computer that controls the car.

The lesson here is that we shouldn’t trust car companies with computer security.

Over 55% of all Androids at risk of high severity vulnerability

Now IBM security researchers have warned of another serious vulnerability that impacts over 55% of all Androids.

Another day, another big security hole in Android that has been patched by Google but the patch will never make it down to most devices because of incompetent manufacturers and carriers. What were we saying about iPhone vs Android again?

Verizon Tests 10-Gig [Internet]

Verizon said it has successfully tested NG-PON2 FTTP technology that, it claims, could "easily provide" symmetrical speeds of 10 Gbps [internet] to business and residential customers.

It’ll probably cost a lot of money, but at least progress is being made in building faster internet connections, thanks to pressure from Google Fiber and the competition between Verizon and others.

One has to wonder, though, whether eventually wireless technology will be fast enough to make all of these fiber cables pointless for most people. You don’t really need that kind of bandwidth unless you’re sending 4K video down the pipe, and we’re still a few years off from having enough 4K content to really justify all of the increased costs. So with wireless technology getting faster and municipal Wi-Fi filling in the gaps for smaller cities, the only thing holding wireless back is the absurd data caps by all of the providers.


Geek Comic
2015-08-12-(welcome-to-the-dark-side)
Today's Tech Term

Intexticated

The term Intexticated refers to individuals who are distracted by (sending or reading) text messages on their mobile device while driving or walking instead of focusing on their surroundings.

What We're Reading from Around the Web

How to Turn Off the Insert Options Floating Button in Excel

Excel includes a feature that allows you to quickly apply some basic formatting to inserted rows, columns, or cells in your worksheet. When you insert any of these items, a small, floating button, called "Insert Options", displays next to the inserted row, column, or cell.

Read This Article →


Android’s Stagefright Exploit: What You Need to Know and How to Protect Yourself

Android has a massive security bug in a component known as “Stagefright.” Just receiving a malicious MMS message could result in your phone being compromised. It’s surprising we haven’t seen a worm spreading from phone to phone like worms did in the early Windows XP days — all the ingredients are here.

Read This Article →


What is the Difference Between 127.0.0.1 and 0.0.0.0?

Most of us have heard of ‘127.0.0.1 and 0.0.0.0′ but have probably not given much thought to them, but if both actually seem to point to the same location, then what is the actual difference between the two? Today’s SuperUser Q&A post helps clear things up for a confused reader.

Read This Article →


How to Use Windows 10’s Storage Settings to Free Hard Drive Space

Windows 10 introduces quite a few improvements over its predecessor and of these is the new Storage settings, which gives users detailed analyses of what and how much is using up their disk space.

Read This Article →


How to Easily Change the Order of Paragraphs in a Word Document

When writing a document, most of us write the first draft, making changes as you go. Then, you edit it, rewrite it, and rearrange it. When rearranging a document, you may want to reorder some paragraphs. We'll show you an easy way to do this.

Read This Article →


How to Upgrade from Windows 7 or 8 to Windows 10 (Right Now)

You’re not interested in a clean install, you don’t want to fuss with wiping your computer, you just want to take the plunge and upgrade to Windows 10. It might be a relatively straight forward process, but it’s always useful to bring a guide. Read on as we walk you through the upgrade process.

Read This Article →


How to Stop Windows 10 From Uploading Updates to Other PCs Over the Internet

Windows 10 includes a new peer-to-peer download feature for updates and Windows Store apps. By default, Windows will automatically use your PC’s Internet connection to upload updates, hiding the option to disable this five clicks deep in the operating system.

Read This Article →


Advertisement
Download Office 365: An Introductory Guide
Explore Microsoft Office 365 works, and then discover what steps your organization should choose to implement an infrastructure that is completely driven by it. Click here to download

Tidak ada komentar:

Posting Komentar