Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities

Yahoo! pays $24,000 to Hacker for finding Security Vulnerabilities

yahoo-bug-bounty
Yahoo! has offered $24,000 to a security researcher for finding out and reporting three critical security vulnerabilities in its products including Yahoo! Stores and Yahoo!-hosted websites.
While testing all the company’s application, Mark Litchfield, a bug bounty hunter who often works with different companies, discovered three critical vulnerabilities in Yahoo!’s products. All the three vulnerabilities have now been fixed by Yahoo!.

Read more

Advertisements
RIP, Internet Explorer is dead

RIP, Internet Explorer is dead

SONY DSC

You know, I never imagined this would actually happen, but it’s finally a reality: Internet Explorer is dead.
According to a report from The Verge, Microsoft’s marketing head Chris Capossela said at an internal Microsoft event yesterday that “We’re now researching what the new brand, or the new name, for our browser should be in Windows 10.” Read more

DNA Editing of Human Embryos Alarms Scientists ( Editing of DNA in human embryos )

DNA Editing of Human Embryos Alarms Scientists ( Editing of DNA in human embryos )

7FE60389-0278-4130-A27CC853BCF8158D_articleAmid rumors that precision gene-editing techniques have been used to modify the DNA of human embryos, researchers have called for a moratorium on the use of the technology in reproductive cells.

In a Comment published on March 12 in Nature, Edward Lanphier, chairman of the Alliance for Regenerative Medicine in Washington DC, and four co-authors call on scientists to agree not to modify human embryos — even for research. Read more

WordPress Security : Securing wp-config.php

WordPress Security : Securing wp-config.php

protect-wp

This post is first of a series, where in we will detail the steps needed to make your WordPress site more secure.

Every WordPress site contains a file called wp-config.php. Many of us, who work closely with WordPress would have already seen this file. When we install WordPress for the very first time, this is where we enter the database details for the site. Along with the database details, this file also contains many other configuration parameters which can lead to a much better security of your WordPress Site. Read more

Pengertian RIP, IGRP, OSPF, EIGRP, dan BGP

Pengertian RIP, IGRP, OSPF, EIGRP, dan BGP

1. Routing Information Protocol (RIP)

Routing protokol yang menggunakan algoritma distance vector, yaitu algortima Bellman-Ford. Pertama kali dikenalkan pada tahun 1969 dan merupakan algoritma routing yang pertama pada ARPANET. Versi awal dari routing protokol ini dibuat oleh Xerox Parc’s PARC Universal Packet Internetworking dengan nama Gateway Internet Protocol. Kemudian diganti nama menjadi Router Information Protocol (RIP) yang merupakan bagian Xerox network Services.

RIP yang merupakan routing protokol dengan algoritma distance vector, yang menghitung jumlah hop (count hop) sebagai routing metric. Jumlah maksimum dari hop yang diperbolehkan adalah 15 hop. Tiap RIP router saling tukar informasi routing tiap 30 detik, melalui UDP port 520. Untuk menghindari loop routing, digunakan teknik split horizon with poison reverse. RIP merupakan routing protocol yang paling mudah untuk di konfigurasi.
RIP memiliki 3 versi yaitu : Read more