Skip to main content

Posts

Showing posts from January, 2018

Cisco ASA exists Critical VPN Flaw (CVE-2018-0101)

A critical vulnerability affecting the VPN feature of Cisco's Adaptive Security Appliance software could allow an attacker to cause a reload, execute arbitrary code, or take full control of an affected system. "The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device," Cisco wrote in its alert. "An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system." Cisco has now released software patches that address this major vulnerability affecting all Cisco devices running Adaptive Security Appliance (ASA) Software. The C isco ASA Software is the core operating system for the Cisco ASA Family that offers firewall, antivirus, intrusion prevention, and VPN capabilities. Following devices are vulnerable to this security hole (if they have “webvpn” feature enabled): Affected version 3000 Series Industrial Security Ap

How to install TCL Program in Windows 7 Operating system - PART 1

As per our previous article, we learned what is Tcl language and uses of it.In this article, we going to explore syntax and basics of Tcl. Local Environment Setup If you are willing to set up your environment for Tcl, you need the following two software applications available on your computer − Text Editor  ( Notepad++  or Notepad or any other Text editor) Tcl Interpreter ( Download TCL Package:  Linux/Mac/Unix ,  Windows ) I am just continuing this tutorial with Windows Operating system for user convenience. Windows Setup 1)Download IronTcl  package. 2)Extract to C partition (c:/) 3) Now go to       Control Panel>System and Security>System>Advanced System Seting>Advance>Environmnt Variables Click "New"  in Variable name type "PATH" in variable value type "C:\IronTcl\bin" then OK > OK > OK. Now you can access the Tcl application over the cmd.Open cmd and type tclsh86t and hit enter you will get response fromTcl application . BAS

After 14 years WPA3 is coming this year to enhance Wi-Fi security

The Wi-Fi Alliance has announced WPA3, a new standard of Wi-Fi security features for users and service providers. This is welcome news, given that a Wi-Fi exploit was uncovered late last year which affected all modern Wi-Fi networks using WPA or WPA2 security encryption, letting attackers eavesdrop on traffic between computers and wireless access points. The new WPA3 features will include “robust protection” when passwords are weak, and will also simplify security configurations for devices that have limited or no display interface. “Wi-Fi security technologies may live for decades, so it’s important they are continually updated to ensure they meet the needs of the Wi-Fi industry,” said Joe Hoffman from consulting firm SAR Insight & Consulting in a statement. The Wi-Fi Alliance is made up of companies including Apple , Intel, and Microsoft. For those who work in coffee shops and often use public Wi-Fi, WPA3 will also have individualized data encryption that will strengthen privac

Protect from Meltdown and Spectre a serious Flow affected Intel, AMD, ARS processors

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical document s. Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers. Meltdown The security of computer systems fundamentally relies on memory isolati