Recent Featured Videos and Articles | Eastern “Orthodoxy” Refuted | How To Avoid Sin | The Antichrist Identified! | What Fake Christians Get Wrong About Ephesians | Why So Many Can't Believe | “Magicians” Prove A Spiritual World Exists | Amazing Evidence For God | News Links |
Vatican II “Catholic” Church Exposed | Steps To Convert | Outside The Church There Is No Salvation | E-Exchanges | The Holy Rosary | Padre Pio | Traditional Catholic Issues And Groups | Help Save Souls: Donate |
Your D-Link router may have a backdoor
George Chidi rawstory.com NSA-inspired paranoia within the hacker community about the pervasiveness of the government’s power to compromise equipment may be bearing real fruit. A curious computer security professional published findings Saturday that deconstructed the firmware code for some D-Link router devices and discovered a backdoor built directly into the code. By changing the user-agent in a web browser to “xmlset_roodkcableoj28840ybtide,” a user could bypass the security on the device and get online or control the higher functions of the router. The hackers at devtts0.com say models DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 use the compromised firmware. Note the name of the user-agent needed to bypass the router security, spelled backward: edit by 04882 joel backdoor. D-Link’s international headquarters are located in Taipei, Taiwan, Republic of China.
Sign up for our free e-mail list to see future vaticancatholic.com videos and articles.
Recent Content
^