Author Archives: lagreca

If you are an AT&T customer, and don’t want them collecting and selling your data, follow these SIMPLE instructions: “AT&T customers can visit the following website on their mobile devices (while connected to the AT&T network, THIS MEANS TURN YOUR WIFI OFF while you do this) to turn off Relevant Advertising: http://bit.ly/1tMEi2p” If you want to opt-out other phones on your account, you can sign in here from your computer: http://soc.att.com/1DHm2Zs

via BIG Net Online http://on.fb.me/1mTAyLm

If you are an AT&T customer, and don't want them collecting and selling your dat…

If you are an AT&T customer, and don't want them collecting and selling your data, follow these SIMPLE instructions:

"AT&T customers can visit the following website on their mobile devices (while connected to the AT&T network, THIS MEANS TURN YOUR WIFI OFF while you do this) to turn off Relevant Advertising: http://205.234.28.93/mobileoptout/"

If you want to opt-out other phones on your account, you can sign in here from your computer: http://www.att.com/cmpchoice

Here is a very reputable source discussing the Facebook messenger privacy scanda…

Here is a very reputable source discussing the Facebook messenger privacy scandal... As I've previously stated, it has been blown way out of proportion and is safe to install.


Facebook Messenger has abundance of permissions
blog.malwarebytes.org
This isn't the first time questions have risen about Facebook's long list of permissions. The question is whether this and similar apps really need all these permissions.

Here is how you can test if you are vulnerable from the latest bash bug: Am I…

Here is how you can test if you are vulnerable from the latest bash bug:

Am I vulnerable?
Edit for the time being: You are. No complete public fix has been posted yet, for the new CVE (CVE-2014-7169). The instructions I give below are only sufficient to close off part of the vulnerability.

There is an easy check. Open a terminal and paste the following:

env x='() { :;}; echo vulnerable' bash -c 'echo hello'
It simply sets the environment variable called x to the value '() { :;}; echo vulnerable'. It then invokes bash asking it to echo back the word hello. The value of x that is set is a function definition that should do nothing. However, it is crafted to try to run 'echo vulnerable' at parsing of environment at bash start-up, which just prints vulnerable to standard out.

If you are not vulnerable, then the following will be shown:

bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
hello
If you are vulnerable, then you will see:

vulnerable
hello


Most likely you will be. In that case, a "yum update bash" should fix it. But I have been told that a reboot, after the update, is also be necessary...


What is the CVE-2014-6271 bash vulnerability, and how do I fix it?
askubuntu.com
Recently, there have been news going around regarding "CVE-2014-6721", which is a vulnerability in Bash. How do I know if I am affected by this, how can I fix it, and why should I care? This is de...

If you happened to update to iOS 8.0.1 and lost your cellular connection and tou…

If you happened to update to iOS 8.0.1 and lost your cellular connection and touch ID, here is a temporary fix until Apple releases the real fix.


iOS 8.0.1 Cause “No Service” on your iPhone? You Can Downgrade to iOS 8 to Fix It
osxdaily.com
iOS 8.0.1 Cause “No Service” on your iPhone? You Can Downgrade to iOS 8 to Fix It