A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running… Read More »Bug in Bash shell allow attackers to execute code on Linux, Unix and Mac OSX
To configure weblogic Proxy plugin in IIS6.0 we need to have mainly two dll’s (iisforward.dll & iisproxy.dll) and iisproxy.ini in the same folder. The mentioned dll’s (iisforward.dll… Read More »Steps to configure Weblogic proxy plugin in IIS6.0
USB 3.0 Promoter group has released it’s new USB Type-C specification. The USB Type-C specification establishes a new cable and connector scheme tailored to fit mobile… Read More »USB Type-C Connector Ready for Production
Apple has officially confirmed acquisition of Beats Music & Beats Electronics in it’s press Info. Apple announced it has agreed to acquire the critically acclaimed subscription… Read More »Apple confirmed acquisition of Beats Music & Beats Electronics
Microsoft has confirmed that it is working on a new version of Internet Explorer. Among the features in development are the Media Capture API, that lets Web… Read More »Microsoft working on a new version of IE
Motorola has made MOTO E boot loader unlock option official. MOTO E has popped up in Bootloader unlock program supported list. … Read More »MOTO E supported under motorola Bootloader Unlock program
Telnet is a network protocol, used to provide bi-directional text-oriented communication facility. Note: Telnet in is insecure protocol and it is recommended that you use ssh… Read More »How to enable telnet in a Linux server?