Gmail offers 'undo' email option

Gmail offers ‘undo’ email option Stupid POP tricks By Austin Modine Posted in Applications, 20th March 2009 19:05 GMT The folks at Gmail Labs obviously dedicate a healthy amount of brainpower to the prevention of regrettable emails sent through their service. Custodial hearts at Google who’ve brought us Mail Goggles to stave off late-night drunken […]

Cybercrime server exposed through Google cache

Cybercrime server exposed through Google cache UK and US IDs exposed to world By John Leyden Posted in Crime, 23rd March 2009 15:30 GMT A reported 22,000 card records have been exposed through cached copies of data stored on a defunct cybercrime server. iTnews in Australia reports that 19,000 of the 22,000 exposed details referred […]

corporate Twitter snooping

corporate Twitter snooping Cloudy conversations By Gavin Clarke in San Francisco Posted in Applications, 23rd March 2009 17:32 GMT Twitter has become Salesforce.com’s latest Web 2.0 darling, with a plug-in to the company’s customer relationship management (CRM) system. On Monday the company announced Salesforce.com CRM for Twitter, which it said would let CRM users search, […]

TCP/IP Hijacking

TCP/IP Hijacking : TCP/IP hijacking is a clever technique that uses spoofed packets to take over a connection between a victim and a host machine. This technique is exceptionally useful when the victim uses a one-time password to connect to the host machine. A one-time password can be used to authenticate once and only once, […]

OSI Model

Physical layer : This layer deals with the physical connection between two points. This is the lowest layer, whose primary role is communicating raw bit streams. This layer is also responsible for activating, maintaining, and deactivating these bit-stream communications. Data-link layer : This layer deals with actually transferring data between two points. In contrast with […]

Asterisk – Basics

Dial Plans: The dialplan is the meat and bones of any Asterisk system, because it defines how Asterisk handles inbound and outbound calls. Basically, it consists of a list of instructions or steps that Asterisk will follow. Differing from traditional phone systems, Asterisk’s dialplan is fully customizable. To successfully run your own Asterisk system, you […]