Around 2 years back we talk about how to upgrade to SHA-256 and ECC SSL (ECDSA) certificate for the TLS/SSL certificate users. Secure Hash Algorithm 1 is a Cryptographic hashing function. Secure Hash Algorithm 1 (SHA-1) is Circumvented by Google Research For Testing Vulnerability. Some researchers theorised vulnerabilities of SHA-1 from 2005 and now have been exploited for the first time with an … [Read more...]
Get the latest Microsoft windows, computer, gadgets, Apple, Linux, Wordpress related technology news.
Amazon Web Services Planned to Create an AWS Infrastructure Region in India for Their Cloud Computing Platform in Next Year (2016). The fact that, there is a need of datacenter as region near India is rightly pointed out by Amazon Web Services. We previously discussed the issues around opening the safety matters to open a datacenter related to Cloud Computing or just traditional datacenter in … [Read more...]
Do Not Imagine That Switching From Cheque to SWIFT Made AdSense Payments Problem Free. Axis Bank Google AdSense SWIFT Payment Problem is New Style. Previous problems with Google AdSense payment was 100% "manual" - the Bluedart/DHL guy will simply not come to your house and write "door closed" to "reduce workload". We faced that, webmaster of thewindowsclub faced, probably all faced in AdSense … [Read more...]
Sadly, Latest Research Showing No Advantage of SSD on Virtual Machine. Older SSDs showing decline in performance which is not a cost saving fact. Solid State Drives are becoming more of enterprise standard, but they have not yet reached their full potential. Researchers found data and created performance graphs which are not encouraging.SSD technology is relatively new and not surprisingly, … [Read more...]
OpenStack is a Cloud Computing Software With Free Software License. Myths behind OpenStack Cloud Computing Software Hinder the More Faster Growth. It is quite sad that, code contribution for OpenStack is still lesser, HP being the highest code contributor. Few days ago OpenStack Summit 2015 ended, it was a five day intensive session with 6000 peoples including the developers, users and … [Read more...]
Logjam, which allows man-in-the-middle attacker to downgrade the vulnerable TLS connections, apparently created by NSA Threatens the Security of HTTPS. The series of various deliberately created security flaws including Heartbleed, are gradually being discovered possibly not even a minor percentage of the total works done by National Security Agency to run their mass surveillance tools. These was … [Read more...]
CVE-2015-3456 or VENOM Security Vulnerability is a new Vulnerability. VENOM stands for Virtualized Environment Neglected Operations Manipulation. This CVE-2015-3456 (VENOM) is a security vulnerability within the QEMU service used to run instances within the Cloud Service provider. This vulnerability may allow a malicious user to escape a virtual instance and potentially gain access to the host … [Read more...]