Xiaomi Mi 6 teardown

Xiaomi Mi 6

JerryRigEverything bills the Mi 6 as one of the sturdiest it has ever tested, survive scratch, burn, and bend tests with flying colors. But one thing that Nelson never does on his YouTube videos is test how water resistant phones are. With Xiaomi boasting of its first splash proof phone, he got interested in checking out that claim during his teardown. Without drowning the phone, of course.

It turns out, it’s not that water resistant after all and Xiaomi is more or less accurate in calling it simply splash proof. Although Xiaomi does go through the trouble of sealing holes and even removing the headphone jack for the sake of water proofing, it didn’t take the last step of sealing the USB-C port. As such, there is a rather big entry point for water and moisture to go through. Nelson rates the Mi 6 with an IP64 and hopes that the Mi 7 would do beter.

Nokia 3310 launched in India at Rs 3310

Nokia 3310

NEW DELHI: Nokia 3310, a feature phone that had sold 126 million units globally before being phased out 12 years back, will now be available in a revamped avatar in India, marking the iconic brand’s second innings in among the world’s largest handset markets. HMD Global, which owns the rights to the Nokia brand, on Tuesday launched the “2G feature phone” at Rs 3,310. It will be available across top mobile stores in the country starting May 18.

The Nokia 3310 sports a 2.4-inch QVGA (240×320 pixels) colour display, compared to the 48×84 pixel resolution of the original. The handset runs on Nokia Series 30+ OS and comes with 16MB storage and supports expandable storage via microSD card (up to 32GB). On the back is a 2-megapixel camera with LED flash; the feature phone also offers FM radio. Nokia 3310 (2017) packs a removable 1200mAh battery that offers 22 hour talk-time and month-long standby time. With the Nokia 3310 (2017), HMD Global also brought back the classic Snake game which has been optimised for the new colour screen.

Zomato hacked – User Data Available for Sale $1,001

According to Hackeread.com, a user by the name of “nclay” claimed to have hacked Zomato and was willing to sell data pertaining to 17 million registered users on a popular Dark Web marketplace.

This included emails and password hashes of registered Zomato users with the price set for the whole package at $1,001.43 (BTC 0.5587) – BTC here stands for Bitcoins. Hackeread adds the vendor also published data and evidence to prove it was genuine.

Payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault. No payment information or credit card data has been stolen/leaked.

Zomato, in a blog post

Extratorrent.CC Shuts Down Forever

ExtraTorrent logo

Today’s news confirmed our worst fears! ExtraTorrent has shut down permanently.

  • ExtraTorrent was the second-most popular torrent index
  • It follows Kickass and Torrentz.eu
  • Ettv and Ethd will also end operations

ExtraTorrent has shut down permanently

ExtraTorrent with all mirrors goes offline.. We permanently erase all data.

Stay away from fake ExtraTorrent websites and clones.

Thx to all ET supporters and torrent community.

ET was a place to be….

May 17, 2017

ExtraTorrent, the world’s second largest torrent index, has permanently shut its doors today. The site, which launched in 2006, had steadily climbed the ranks in the torrenting world to become the third and second most popular torrent sites in the last two years, respectively, with millions of daily views and a particularly active community.

How to check Cash Transactions you made? ‘Operation Clean Money’

Government launches ‘Operation Clean Money’ website, says ‘no longer safe to deal with excessive cash’

Income Tax Department (ITD) has initiated Operation Clean Money, today. Initial phase of the operation involves e-verification of large cash deposits made during 9th November to 30th December 2016. Data analytics has been used for comparing the demonetisation data with information in ITD databases. In the first batch, around 18 lakh persons have been identified in whose case, cash transactions do not appear to be in line with the tax payer’s profile.

ITD has enabled online verification of these transactions to reduce compliance cost for the taxpayers while optimising its resources. The information in respect of these cases is being made available in the e-filing window of the PAN holder (after log in) at the portal https://incometaxindiaefiling.gov.in. The PAN holder can view the information using the link “Cash Transactions 2016” under “Compliance” section of the portal. The taxpayer will be able to submit online explanation without any need to visit Income Tax office.

Email and SMS will also be sent to the taxpayers for submitting online response on the e-filing portal. Taxpayers who are not yet registered on the e-filing portal (at https://incometaxindiaefiling.gov.in) should register by clicking on the ‘Register Yourself’ link. Registered taxpayers should verify and update their email address and mobile number on the e-filing portal to receive electronic communication.

A detailed user guide and quick reference guide is available on the portal to assist the taxpayer in submitting online response. In case of any difficulty in submitting on line response, help desk at 1800 4250 0025 may be contacted.

How to check Cash Transactions you made?

operation clean money

Logon to https://incometaxindiaefiling.gov.in. – The PAN holder can view the information using the link “Cash Transactions 2016” under “Compliance” section of the portal.

Recent search terms:

Free Ransomware Decryption Tools Hit by ransomware? Don’t pay the ransom!

WannaCry ransomware

Ransomware is malware that locks your device or encrypts your files, making them unavailable. A ransom is then demanded to unlock such devices or files. Ransom amounts vary, but on average, the ransomware demand was about one bitcoin last year (approx. $500 at that time). Ransomware is typically spread via phishing emails or exploit kits and is targeted at consumers and businesses alike.

No More Ransom launched mid 2016 and now contains 40 free decryption tools, six of which were provided by Avast. Avast continuously creates new decryption tools, which can also be found on our free ransomware decryption tools page.

Free ransomware decryption tools can help decrypt files encrypted by the following forms of ransomware. Just click a name to see the signs of infection and get our free fix.

Free ransomware decryption tools

Read additional information here 

Recent search terms:

WannaCry ransomware attack – How can this be prevented?

WannaCry ransomware
What is ransomware?

Ransomware is a kind of cyber attack that involves hackers taking control of a computer system and blocking access to it until a ransom is paid.

What is Wanna Decryptor?

Wanna Decryptor, also known as WannaCry or wcry, is a specific ransomware program that locks all the data on a computer system and leaves the user with only two files: instructions on what to do next and the Wanna Decryptor program itself.

When the software is opened it tells computer users that their files have been encryted, and gives them a few days to pay up, warning that their files will otherwise be deleted. It demands payment in Bitcoin, gives instructions on how to buy it, and provides a Bitcoin address to send it to.

HOW DOES YOUR COMPUTER BECOME INFECTED WITH RANSOMWARE?
In most cases, the software infects computers through links or attachments in malicious messages known as phishing emails.

“The age-old advice is to never click on a link in an email,” said Jerome Segura, a senior malware intelligence researcher at Malwarebytes, a San Jose-based company that has released anti-ransomware software. “The idea is to try to trick the victim into running a malicious piece of code.”

The software is usually hidden within links or attachments in emails. Once the user clicks on the link or opens the document, their computer is infected and the software takes over.

WannaCry ransomware – How can this be prevented?

Download the relevant patch for your desktop and laptop to start with…

Download English language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64

Download localized language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64

General information on ransomware: https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx

MS17-010 Security Update: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

Despite the exploits/vulnerabilities being exposed a month back, so many systems were still unpatched. To protect from this ongoing mass exploit and propagation one can do the following:

1. Install all available OS updates including to prevent getting exploited

2. Manually disable SMBv1 via modifications made to Windows Registry by following these steps:

a. Navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters

b. Look for Value: SMB1

c. Modify Data: REG_DWORD: 0 = Disabled

3. Restrict inbound traffic to open SMB ports (ports 139, 445) which are publicly accessible / open to Internet.

4. Block the IPs, Domains, Hash values that are involved in spreading this malware. Please refer the attachment – IOCs – [XLS]xls – US-CERT for details.

5. Implement endpoint security solutions. The ‘AV Signature Name’ section under IOCs – [XLS]xls – US-CERT can be referred.

6. Keep an offline backup of critical data on desktops and servers.

7. Organisations should block connections to TOR nodes and TOR traffic on network (IOCs –[XLS]xls – US-CERT).

Read additional information here 

Reliance Jio set to launch DTH services, set-top box leaked online

Information circulating the Internet suggests that Reliance Jio Infocomm is working on a set top box service in cities like Mumbai, Pune and Chennai

Images of a Reliance Jio set top box has leaked online suggesting that the company will enter the set-top box space soon. The leaked set-top box has a rectangular design much like existing set top boxes and also has a USB port in the front.


Jio is rumoured to be adding a new feature called ‘catch up’ which will allow users to stream content from past seven days. The company may initially launch the service with 300 channels to be followed by more channels.

New leaked images suggest Jio might stick with a rectangular design for its set-top box after all. The pictures show a blue box with Reliance Jio branding on top as well as new set-top box. The device has a number of ports including a standard cable connector, HDMI, USB, as well as audio and video output. There’s also an Ethernet port, which will allow users to connect to a modem to offer broadband.

Nokia P1 smartphone leaked: Watch the concept video, design and specifications

This next smartphone by Nokia will feature a 5.3-inch IGZO display and a refreshing rate of 1 to 120 Hz alongside a Corning Gorilla Glass on top. The smartphone is expected to run Android Nougat 7.0 and powered by the Snapdragon 835 processor. NokiaPowerUser had earlier reported that Nokia China had confirmed on Weibo that the company has been working on a smartphone which will containt the Snapdragon 835. The phone will have 6GB of RAM and a battery of 3,500 mAh power along with the QuickCharge 4 technology. The device will also contain an Ultrasonic fingerprint reader.

Recent search terms:

Cannot modify header information – headers already sent by… WordPress Issue

When running script, I am getting several errors like this:

Warning: Cannot modify header information – headers already sent by (output started at /some/file.php:12) in /some/file.php on line 23

 

Possible solutions

  1. header("Location: $location", true, $status);

    with

    echo "<meta http-equiv='refresh' content='0;url=$location' />";
  2. Most of this trouble comes up because of undesirable whitespace(s) somewhere before the first "<?" and after the last "?>" in a php script. Use Notepad2 or something to edit code and better try to use in-built on-line theme editor in the admin console. Try to find and eliminate all undesidrable whitespaces in every theme’s php file and resave those files.
  3. The long term answer is that all output from your PHP scripts should be buffered in variables. This includes headers and body output. Then at the end of your scripts do any output you need.

    The very quick fix for your problem will be to add

  4.  
    <?php
      ob_start();
    
      // code 
    
     ob_end_flush();
    ?>