https://www.cert-in.org.in/ Severity Rating: HIGH Software Affected : Microsoft SharePoint Foundation 2013 Service Pack 1 Microsoft SharePoint Foundation 2010 Service Pack 2 Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 Overview : Multiple vulnerabilities exist in Microsoft SharePoint which could allow a remote attacker to execute arbitrary code on a targeted system. Description : These vulnerabilities exist due to improper input validation in Microsoft SharePoint. A remote attacker can send a specially crafted request and execute arbitrary code on the targeted system. Successful exploitation of these vulnerabilities may result in…
Read MoreA device to hack your dreams
A wearable glove-like device that can “hack” and influence dreams, Team of MIT researchers is developing this device called “Dormio”. It senses the users slipping into hypnagogia which is the semi-lucid state between wakefulness and sleep. It plays prerecorded audio, typically comprising one word. The researchers have found that the audio content successfully showed up in people’s dreams. They have experimented with 50 people. The possibilities are endless to help cure traumatic memories or bad nightmares. However, if they move closer to commercialization there could be serious ethical concerns as…
Read MoreZoom Zero-Day Exploits Sold for $500,000
Zoom popular video conferencing app has been in a huge controversy recently for sending data to Facebook along with encryption issues which allowed hackers to upload the Zoom recordings on Youtube. It has been rumored that the zoom account is being sold by hackers on the dark web There are two Zoom zero-day exploits one for Windows and one for Mac OS which is priced for $500,000. The major flaws in the app allow hackers to attack the user accounts and spy on their calls. Windows Zero-Day in…
Read MoreRead Write File using File Stream in Dot Net
Read file in byte array in vb.net : Public Function Reader(ByVal FilePath_ As String) As Byte() Dim BytArr(FileSystem.FileLen(FilePath_) – 1) As Byte Using fs As New FileStream(FilePath_, FileMode.Open, FileAccess.Read, FileShare.ReadWrite) fs.Read(BytArr, 0, BytArr.Length) fs.Close() End Using Return BytArr End Function Read file in String : Public Function ReaderString(ByVal FilePath_ As String) As String Dim data_str As String Using fs As New FileStream(FilePath_, FileMode.OpenOrCreate, FileAccess.ReadWrite, FileShare.ReadWrite) Using Sr As New StreamReader(fs) data_str = Sr.ReadToEnd Sr.Close() fs.Close() End Using Return data_str End Using End Function Read File with Encoding (using default encoding…
Read MoreInterview questions for SQL server jobs
For all the software developers interested in working on SQL server, we bring you a set of interview questions asked by one of the top IT giants – Tech Mahindra. These questions have been posted by techies – who are presently working with Tech Mahindra, or have previously worked with the IT giant.
Read MoreSql Server How do Temporary Tables Work?
All of the temporary tables are stored in the tempdb database and can be listed using the query below.
Read MoreEmail provider got hacked, data of millions of users now sold on the dark web
Italian email provider Email.it confirms security breach.
The data of more than 600,000 Email.it users is currently being sold on the dark web.,
“Unfortunately, we must confirm that we have suffered a hacker attack,” the Italian email service provider said in a statement to ZDNet on Monday.
Read MoreVulnerabilities Affected Millions of Cisco Switches, Routers and devices
Critical Vulnerabilities Affected Millions of Cisco Switches, Routers, IP Phones and Cameras. Researchers discovered 5 critical zero-day vulnerabilities (dubbed CDPwn) in Cisco Discovery Protocol that are used in multiple Cisco products such as Routers, Switches, IP phones, Cameras and more. Cisco Discovery Protocol is also known as CDP is the Cisco proprietary Layer 2 (Data Link Layer) network protocol and is virtually implemented in Cisco products including switches, routers, IP phones, and cameras to discover the information about the Cisco equipment. Four of the five vulnerabilities are remote code execution (RCE) vulnerabilities that…
Read MoreCritical Zoom Vulnerability Allows Hackers to Steal your Password
A critical vulnerability with the Zoom client for windows allows attackers to steal Windows login credentials.
Zoom is an online video communication platform that has features such as video conferencing, online meetings, chat, and mobile collaboration.
Read MoreRun Command in Windows
‘Run’ dialogue in Microsoft Operating system provides the execution of various commands without opening the Command Prompt, although Command Prompt have its own features and usability. Microsoft windows operating system provides much flexibility to users in terms of Design, Development and Distribution of Application either Windows Based Application or Web Based Application. We can execute any command using ‘Run’ : Press “Windows” Button + “R” Button on your keyboard simultaneously.
Read More