LetsByteCode Headlines

Encryption is the first stop to intercept communications

It is no secret that government agencies are constantly monitoring communications of individuals, that is, ordinary citizens. In the case of the American system of surveillance is particularly interesting to see how often the interception of communications, whether it is a permanent process or...
Encryption is the first stop to intercept communications

The supercomputer "Tianhe-2" Takes No. 1 Ranking on 41st TOP500 List

The new Chinese supercomputer “Tianhe-2″ (“Milky Way-2″) headed by a fresh rating of the top 500 most powerful computer systems in the world.
The performance of this amounts to 33.86 petaflops supercomputer, which is almost twice the maximum performance of the former...
The supercomputer "Tianhe-2" Takes No. 1 Ranking on 41st TOP500 List

Export tweets in different formats

If you’re tired of Twitter and you want to leave this site forever, then, if desired you can make a total export of all your tweets. The easiest way to do this is through the service twDocs.
The service supports exporting to PDF, DOC, XML, CSV, TXT, XLS and HTML. Archive logs all messages,...
Export tweets in different formats

Export tweets in different formats

If you’re tired of Twitter and you want to leave this site forever, then, if desired you can make a total export of all your tweets. The easiest way to do this is through the service twDocs.
The service supports exporting to PDF, DOC, XML, CSV, TXT, XLS and HTML. Archive logs all messages,...
Export tweets in different formats

OWASP - Top 10 Vulnerabilities

Topping the list of the most dangerous and widespread flaws in web-applications was taken by injection of code.
According to the creators of Open Web Application Security Project (OWASP), which for the past 10 years is the top 10 most dangerous vulnerabilities in web-applications published the...
OWASP - Top 10 Vulnerabilities

New Windows-backdoor deletes MBR

Antivirus company Trend Micro warns of a new backdoor BKDR_MATSNU.MCB , which is actively promoted through mass mailings, especially in Germany. The malware has the unpleasant feature: a command from the remote C & C-server, or it can block the loading of the PC, or delete the master boot...
New Windows-backdoor deletes MBR

The world's first CPU of 5GHz

AMD has introduced the most powerful processor in the family of AMD FX and the world’s first commercially available CPU with a clock frequency of 5 GHz. Processor AMD FX-9590 with 8 cores provide high performance for gaming and multimedia applications on desktop computers. It is symbolic...
The world's first CPU of 5GHz

Critical vulnerability in 60 + models of CCTV and IP-cameras

A group of students from the European University of Madrid published the results of their thesis at the Faculty of Information Technology. They explored the protection of the various surveillance systems found on the Internet through Google and Shodan.
In total, they analyzed 9 systems, they...
Critical vulnerability in 60 + models of CCTV and IP-cameras

Hack a Samsung TV with SmartTV function

As reported in his blog, Helfurt German researcher Martin (Martin Herfurt), was able to crack the Samsung TV with function SmartTV.
The expert noted that a successful cyber attack carried out from a remote computer to broadcast programs on technology HbbTV (Hybrid Broadcast Broadband TV), used...
Hack a Samsung TV with SmartTV function