Sindoni Says

 
Sindoni Says


Trust But Verify...

Blog

Sindoni Says will be a place where I will share my observations. Looking forward to creating a place of truth where Kool-Aid isn't served.

view:  full / summary

Trojan Virus Attacks On Raspberry Pi Computers Discovered

Posted on August 17, 2017 at 5:10 PM Comments comments (1)


Trojan Virus Attacks On Raspberry Pi Computers Discovered

 

The Russian security firm Doctor Web discovered two Trojan programs that target Linux machines. One turns Raspberry machines into a cryptocurrency mining device, and the other runs a proxy server on Linux systems.

 

The Trojan named Linux Muldrop, 14 targets Raspberry Pi devices, changing the password on the devices it infects, then unpacking and launching a miner, which, in an infinite l...

Read Full Post »

Stand With Us To Fight Corporate Greed

Posted on August 17, 2017 at 4:50 PM Comments comments (0)

Stand With Us To Fight Corporate Greed

SpectrumStrike2017.com

To The General Public


Dated August 17th, 2017

 

1700 Technicians represented by Local Union #3, International Brotherhood of Electric Workers have been ON STRIKE against CHARTER/SPECTRUM (FORMALLY TIME WARNER CABLE) FOR OVER THREE MONTHS.


CHARTER/SPECTRUM NO LONGER WANTS TO CONTRI...

Read Full Post »

Bait The Hook to Catch The Fish (Mr. Goldstien)

Posted on August 5, 2017 at 6:30 PM Comments comments (0)

Bait The Hook to Catch The Fish (Mr. Goldstien)


Upon returning from vacation. I learned that someone had hacked into my laptop computer.

What I discovered was that someone had created an additional Guest Account and also

created a Wi-Fi Bridge to be able to access the Internet. After realizing I was hacked,

I contacted my Internet provider and asked them to look over my settings. I specifically

requested that my Modem should only have an ethernet conn...

Read Full Post »

New And Improved MacBook Air Laptop Computer

Posted on August 5, 2017 at 4:05 PM Comments comments (0)

New And Improved MacBook Air 13” Laptop Computer


On Friday, I tried going onto the internet using a 2007 MacBook Air Model # A1181 13” laptop computer. Was surprised to learn that Apple was no longer supporting the Safari internet browser. To compound matters, Google Chrome was also not going to support the older model Apple computer's internet browser.



The solution was rather simple:


A) Transfer all my files, ...

Read Full Post »

Intel patches seven-year remote hijacking bug revealed

Posted on July 8, 2017 at 5:10 PM Comments comments (0)


Intel patches seven-year remote hijacking bug revealed


Serious security flaw is patched. Intel has long been considered one of the premier chip manufacturers on the market, with security playing a vital part in the firm’s overall success.


However, it seems that one element had slipped through the net. Recently conducted research found that Intel processors shipped since 2010 contained remote management features. While from t...

Read Full Post »

50 Top Linux Distributions

Posted on June 20, 2017 at 2:35 PM Comments comments (3)

50 Top Linux Distributions

The 50 most well-known versions of the Linux operating system.

Posted May 10, 2011

By Cynthia Harvey

We sometimes talk about Linux as if it were one, single operating system, but of course, it really comes in hundreds of different flavors. In fact, one of the strengths of open source software is that developers can (and do) customize the code to meet a variety of unique needs.


In this article, we'll take a look at 50 of the ...

Read Full Post »

Stockton and Lemuria: Case Closed

Posted on June 16, 2017 at 8:50 PM Comments comments (1)

Stockton and Lemuria: Case Closed


Record columnist

Mike Fitzgerald

Posted Jun 3, 2017 at 1:30 PM


A New York paranormal researcher and filmmaker says he’s finally cracked the case of a mysterious man who pulled off the most outlandish flimflam in Stockton history.


Stephen Sindoni says after years of sleuthing he’s discovered the true identity of a ‘J.C. Brown’ who in 1934 tricke...

Read Full Post »

FBI Refuses to Release the Tool Used to Hack Terrorist's iPhone

Posted on June 2, 2017 at 3:40 PM Comments comments (0)

Feds believe that tools can still be used to unlock devises for investigations. The FBI has refused to disclose information about the tool it used to hack into the iPhone of San Bernadino shooter Syed Farook.


Initially, the FBI asked Apple to create a back door so they could access the content of Farook's iPhone. Apple refused to create the backdoor, statint that once there, it can be used over and over.


Now it's clear that Apple's concerns were correct. Ac...

Read Full Post »

Microsoft's Patch Tuesday Is Back

Posted on June 2, 2017 at 3:35 PM Comments comments (0)

Microsoft missed the entire month of February, leaving Windows users exposed to attacks. After missing Patch Tuesday in February, Microsoft has released security updates for March. The latest updates fix more than a dozen vulnerabilities.


According to Wccftech, "Among the patches, Microsoft has also fixed a 'critical' flaw, which was publicly disclosed earlier last month following Microsoft missing February's Patch Tuesday. The exploit code related to a Windows SMB bug was m...

Read Full Post »

DoubleAgent: Unpatchable Windows Vulnerability Discovered

Posted on June 2, 2017 at 3:25 PM Comments comments (0)

Researchers at Cybellum, an Israeli zero-day prevention firm, have discovered a vulnerability in Windows that allows attackers to take complete control of the system. Named DoubleAgent, the vulnerability affects all the versions between Windows 10 and Windows XP.


According to Cybellum, "DoubleAgent gives the attacker the ability to inject and DLL into any process. The code injection occurs extremely early during the victim's process boot, giving the attacker full control ov...

Read Full Post »

Rss_feed