<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tech Archives -</title>
	<atom:link href="https://cvtfradio.net/category/tech/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfradio.net/category/tech/</link>
	<description>Conscious Vibrations from terra firma radio</description>
	<lastBuildDate>Fri, 15 Aug 2025 20:18:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>WordPress 5.0.2 is here</title>
		<link>https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-5-0-2-is-here</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sun, 23 Dec 2018 13:24:48 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Word Press]]></category>
		<guid isPermaLink="false">https://cvtfradio.net/?p=3400</guid>

					<description><![CDATA[<p>&#160; WordPress 5.0.2 is now available! 5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks. Here are a few of the additional highlights: 45 total Block Editor improvements [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png"><img fetchpriority="high" decoding="async" class="aligncenter  wp-image-3403" src="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png" alt="" width="374" height="367" srcset="https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo.png 1000w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-300x294.png 300w, https://cvtfradio.net/wp-content/uploads/2018/12/WordPress-logo-768x753.png 768w" sizes="(max-width: 374px) 100vw, 374px" /></a></p>
<p>&nbsp;</p>
<p>WordPress 5.0.2 is now available!</p>
<p>5.0.2 is a maintenance release that addresses 73 bugs. The primary focus of this release was performance improvements in the block editor: the cumulated performance gains make it 330% faster for a post with 200 blocks.</p>
<p>Here are a few of the additional highlights:</p>
<ul>
<li>45 total Block Editor improvements are included (14 performance enhancements &amp; 31 bug fixes).</li>
<li><a href="https://core.trac.wordpress.org/query?component=Bundled+Theme&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=milestone&amp;col=owner&amp;col=type&amp;col=status&amp;col=priority&amp;order=priority">17 Block Editor related bugs</a> have been fixed across all of the bundled themes.</li>
<li>Some <a href="https://core.trac.wordpress.org/query?component=I18N&amp;milestone=5.0.2&amp;col=id&amp;col=summary&amp;col=status&amp;col=owner&amp;col=type&amp;col=priority&amp;col=milestone&amp;order=priority">internationalization (i18n) issues</a> related to script loading have also been fixed.</li>
</ul>
<p>For a full list of changes, please consult the <a href="https://core.trac.wordpress.org/query?status=closed&amp;milestone=5.0.2&amp;group=component">list of tickets on Trac</a> or the <a href="https://core.trac.wordpress.org/log/branches/5.0?action=stop_on_copy&amp;mode=stop_on_copy&amp;rev=44339&amp;stop_rev=44183&amp;limit=100&amp;sfp_email=&amp;sfph_mail=">changelog</a>.</p>
<p>You can <a href="https://wordpress.org/download/">download WordPress 5.0.2</a> or visit Dashboard → Updates and click <em>Update Now</em>. Sites that support automatic background updates have already started to update automatically.</p>
<p>Thank you to everyone who contributed to WordPress 5.0.2:</p>
<p>The post <a href="https://cvtfradio.net/2018/12/wordpress-5-0-2-is-here/">WordPress 5.0.2 is here</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</title>
		<link>https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Wed, 19 Aug 2015 10:10:53 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[FaceBook Messenger App exploited]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2941</guid>

					<description><![CDATA[<p>&#8216;Marauders Map&#8217; lets you track friends using FB Messenger: Tool plots a precise location each time someone uses the site Harvard student has created a digital &#8216;Marauder&#8217;s Map&#8217; that uses location data from Facebook Messenger to pinpoint an individual&#8217;s movements Relies on people sharing their location by default in messages Map was designed to highlight [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/">Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>&#8216;Marauders Map&#8217; lets you track friends using FB Messenger: Tool plots a precise location each time someone uses the site</h1>
<ul class="mol-bullets-with-font">
<li class=""><strong>Harvard student has created a digital &#8216;Marauder&#8217;s Map&#8217; that uses location data from Facebook Messenger to pinpoint an individual&#8217;s movements</strong></li>
<li class=""><strong>Relies on people sharing their location by default in messages</strong></li>
<li class=""><strong>Map was designed to highlight how much data is leaked from Facebook </strong></li>
</ul>
<p class="author-section byline-plain">By <a class="author" href="https://www.dailymail.co.uk/home/search.html?s=&amp;authornamef=Sarah+Griffiths+for+MailOnline" rel="nofollow">Sarah Griffiths for MailOnline</a></p>
<p class="byline-section"><span class="article-timestamp article-timestamp-published"> <span class="article-timestamp-label">Published:</span> 14:02, 28 May 2015 </span> | <span class="article-timestamp article-timestamp-updated"> <span class="article-timestamp-label">Updated:</span> 16:26, 28 May 2015 </span></p>
<p class="mol-para-with-font">Harry Potter may have had a magical paper ‘Marauder’s Map’ but now there’s a digital equivalent that can pinpoint your friends&#8217; locations using information from Facebook.</p>
<p class="mol-para-with-font">The extension loads when the Messages tab is opened and &#8216;scrapes&#8217; the page for location data to show the movement of friends with a startling degree of accuracy.</p>
<p class="mol-para-with-font">While some people may see the map as a useful tool, it serves to highlight how much data Facebook’s messaging service shares &#8211; and could leave individuals open to stalking, for example.</p>
<div class="artSplitter mol-img-group">
<div class="mol-img"><img decoding="async" id="i-207ecbd3c3ddc516" class="blkBorder img-share aligncenter" src="https://i.dailymail.co.uk/i/pix/2015/05/28/12/29249B1A00000578-0-A_digital_version_of_Harry_Potter_s_Marauder_s_Map_can_pinpoint_-a-30_1432813913356.jpg" alt="Earlier this year, a developer created a browser extension dubbed 'Marauder's Map'. The extension loaded when a person opened their Messages tab and 'scraped' the page for location data to show the movement of friends with a startling degree of accuracy" width="634" height="450" /></div>
<p>The post <a href="https://cvtfradio.net/2015/08/facebooks-messengers-app-lets-people-send-their-location-to-friends-and-it-defaults-to-sending-a-location-with-all-messages/">Facebooks Messenger&#8217;s app lets people send their location to friends and it defaults to sending a location with all messages</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mac OS is not Panacea from Viruses</title>
		<link>https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mac-os-is-not-panacea-from-viruses</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sat, 08 Aug 2015 20:56:59 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Viruses and Malware]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2924</guid>

					<description><![CDATA[<p>Mac OS is not Panacea from Viruses Added: Friday, August 7th, 2015 &#160; Mac has always been advertised as a platform that is relatively safe from malware. This was due to combination of the lower number of users, less attention from security researchers and, most importantly, fewer security holes in Mac OS than Windows. Apple [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/">Mac OS is not Panacea from Viruses</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<h1>Mac OS is not Panacea from Viruses</h1>
<h6><i class="mini gray">Added: Friday, August 7th, 2015</i></h6>
<p>&nbsp;</p>
<p>Mac has always been advertised as a platform that is relatively safe from malware. This was due to combination of the lower number of users, less attention from security researchers and, most importantly, fewer security holes in Mac OS than Windows. Apple always emphasized its security in the Mac vs PC ad campaign, claiming that Macs don&#8217;t get viruses.</p>
<p><a href="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png"><img decoding="async" class="aligncenter  wp-image-2933" src="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png" alt="3-pictures" width="845" height="162" srcset="https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2.png 1033w, https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2-300x58.png 300w, https://cvtfradio.net/wp-content/uploads/2015/08/3-pictures2-1024x196.png 1024w" sizes="(max-width: 845px) 100vw, 845px" /></a></p>
</div>
<div class="article">
<div class="bbcode_center">However, OS X also has some serious vulnerabilities: for example, one of them exploits a weakness that allows a malicious program to gain access to a Mac and run as though it is the administrator of the system. Such a flaw is known as privilege escalation. By running with admin rights, it can bypass many Apples security features that limit the ability of downloaded code from affecting the deeper functions of the OS.</div>
<p>Security experts criticized Apple for having already patched the flaw in the beta versions of its next Mac OS, El Capitan. The problem is that Apple still hasn&#8217;t fixed the flaw in the latest current version of Mac OS, Yosemite. Today this bug has been seen in the wild for the first time: security researchers discovered a new adware installer doing the rounds, which allowed the adware to embed itself into the OS and install itself without requiring the users password.</p>
<p>In the meantime, another exploit will soon be revealed to researchers at the Black Hat security conference. It is known that this exploit uses a bundle of 6 weaknesses in the firmware, which controls the lowest-level functions like fans, power supply units and USB ports. It can allow to overwrite that software with the hackers own code, and 5 of those 6 weaknesses are present on Macs as well as PCs. Since learning about the flaw, Apple has patched two of them, but three still remain unpatched.</p>
<p>Another news is that the security researchers managed to write a proof of concept attack that uses the bug to create a worm, a virus able to spread from Mac to Mac directly. Mac can be infected through a deliberately sent email and then automatically attempt to infect other hardware connected to it. The worm is dubbed Thunderstrike 2 and looks similar to a previous proof-of-concept attack known as BadUSB, which allowed attackers to reprogram USB devices in order to attack hardware. However, even that attack hadn&#8217;t been turned into a worm, thus limiting the potential damage.</p>
<div class="clear"></div>
<p><b>Posted by:</b></p>
<div class="usr"><span title="BOSS">SaM</span></div>
<p><b>Date:</b>  Friday, August 7th, 2015</p>
</div>
<div class="article">
<p>Comments (1) (please <a title="Add Your Comment" href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lNmVb-dDnu9GvBIGD76F-Lo">add your comment »</a>)</p>
<div class="borderdark">
<p><a name="comment46429"></a></p>
<table border="0" width="100%" cellspacing="1" cellpadding="0">
<tbody>
<tr>
<td class="tabledata_num" width="1"><b>1</b></td>
<td class="tabledata1" width="100%">
<table border="0" width="100%" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>posted by</p>
<div class="usr"><a href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lACwtWthe4zxJHYM9m_yw9orMh8udqoymfspBfqlj1L4">semphys</a></div>
<p>(2015-08-08 16:13:41)</td>
<td align="right"></td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr>
<td colspan="2">
<table border="0" width="100%" cellspacing="0" cellpadding="5">
<tbody>
<tr>
<td valign="top"><a title="semphys avatar" href="https://ispunblock.com/surf/uJ1nCfdJ2oLLTHeT6jY5lACwtWthe4zxJHYM9m_yw9orMh8udqoymfspBfqlj1L4"><img decoding="async" title="semphys avatar" src="https://ispunblock.com/surf/drq7Ffw-wwfJia6MxHRhdf-GZi5CGHWPSx_bGMOfa7eEDdLx8YeBxme3RciJtabWqJmcKUBxQZtISXoWvKaoDg" alt="semphys avatar" border="0" /></a></td>
<td class="tabledata0" valign="top">You should be using Linux if afraid of Malware. There isn&#8217;t any, unless you invite it in like a well known friend</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/08/mac-os-is-not-panacea-from-viruses/">Mac OS is not Panacea from Viruses</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Adding an Admin User to the WordPress Database via MySQL</title>
		<link>https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adding-an-admin-user-to-the-wordpress-database-via-mysql</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 18:10:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[add user to dababase]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2910</guid>

					<description><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL &#160; &#160; &#160; &#160; &#160; &#160; Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to Add an Admin User to the WordPress Database via MySQL</p>
<p><img loading="lazy" decoding="async" class="alignleft" src="https://cdn4.wpbeginner.com/blogposts/wpusersinsert.gif" alt="wp-users insert phpmyadmin table" width="520" height="201" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Few days ago, we ran into an issue where a user’s site got hacked and their admin account was deleted from the database. This locked them out of their site without any other entry. We went in to the phpMyAdmin and created a new admin user to grant them access. In this article, we will show you a step by step guide on how to create an admin user in WordPress Database via MySQL.</p>
<p>Note: You should always make a backup of your database before performing any MySQL edits. This tutorial requires basic understanding of how phpMyAdmin works.</p>
<p>First, you need to login to phpMyAdmin and locate your WordPress database.</p>
<p>Once inside phpMyAdmin;</p>
<p>Once you are in, we will be making changes to the wp_users and wp_usermeta tables. Lets go ahead and click on wp_users table.</p>
<p>phpMyAdmin wp_users table</p>
<p>We need to insert our new admin user’s information, so click on the Insert tab like it shows in the image above. In the insert form, add the following:</p>
<p>ID – pick a number (in our example, we will use the number 4).<br />
user_login – insert the username you want to use to access the WordPress Dashboard.<br />
user_pass – add a password for this username. Make sure to select MD5 in the functions menu (Refer to the screenshot below).<br />
user_nicename – put a nickname or something else that you would like to refer yourself as.<br />
user_email – add the email you want to associate with this account.<br />
user_url – this would be the url to your website.<br />
user_registered – select the date/time for when this user is registered.<br />
user_status – set this to 0.<br />
display_name – put the name you like to display for this user on the site (it can be your user_nicename value as well).<br />
Click on the Go Button</p>
<p>The post <a href="https://cvtfradio.net/2015/06/adding-an-admin-user-to-the-wordpress-database-via-mysql/">Adding an Admin User to the WordPress Database via MySQL</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>9 Dollar computer made in Oakland Ca Usa</title>
		<link>https://cvtfradio.net/2015/05/9-dollar-computer-made-in-oakland-ca-usa/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=9-dollar-computer-made-in-oakland-ca-usa</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Sat, 23 May 2015 23:44:00 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2893</guid>

					<description><![CDATA[<p>CHIP &#8211; The World&#8217;s First Nine Dollar Computer &#160; What can you do with a $9 computer? Just about anything. A new microcomputer called Chip is hot on crowd-funding site Kickstarter. It promises an easy way to learn how to program with a tiny board that packs Wi-Fi, Bluetooth, and internal storage &#8212; something you [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/05/9-dollar-computer-made-in-oakland-ca-usa/">9 Dollar computer made in Oakland Ca Usa</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="width: 100%; float: none; display: block; position: relative;"><span style="color: #ff6600;"><strong>CHIP &#8211; The World&#8217;s First Nine Dollar Computer</strong></span></h1>
<p>&nbsp;</p>
<p><strong>What can you do with a $9 computer? Just about anything.</strong></p>
<p style="text-align: justify;">A new microcomputer called Chip is hot on crowd-funding site Kickstarter. It promises an easy way to learn how to program with a tiny board that packs Wi-Fi, Bluetooth, and internal storage &#8212; something you don&#8217;t find in another popular microcomputer, Raspberry Pi.</p>
<p style="text-align: justify;">Watch Update to learn more what the Chip can do, along with news on Google&#8217;s Map Maker woes and reports on self-driving cars getting dinged up in California.</p>
<div class="full-description js-full-description responsive-media formatted-lists">
<div class="template asset" contenteditable="false" data-edit_url="/projects/1598272670/chip-the-worlds-first-9-computer/assets/3748200/edit" data-id="3748200">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/003/748/200/1c9bb14ca6cac977700d53d7cdcd25f3_original.jpg?v=1431009288&amp;w=700&amp;h=&amp;fit=max&amp;auto=format&amp;q=92&amp;s=dff8491a321c13cce84901427f03a943" alt="" /></figure>
</div>
<p><img loading="lazy" decoding="async" class="size-full wp-image-3958 aligncenter" src="https://cvtfradio.net/wp-content/uploads/2015/05/Screenshot-from-2025-08-15-21-05-04.png" alt="" width="815" height="701" srcset="https://cvtfradio.net/wp-content/uploads/2015/05/Screenshot-from-2025-08-15-21-05-04.png 815w, https://cvtfradio.net/wp-content/uploads/2015/05/Screenshot-from-2025-08-15-21-05-04-300x258.png 300w, https://cvtfradio.net/wp-content/uploads/2015/05/Screenshot-from-2025-08-15-21-05-04-768x661.png 768w, https://cvtfradio.net/wp-content/uploads/2015/05/Screenshot-from-2025-08-15-21-05-04-190x163.png 190w" sizes="(max-width: 815px) 100vw, 815px" /></p>
<div class="template asset" contenteditable="false" data-edit_url="/projects/1598272670/chip-the-worlds-first-9-computer/assets/3746703/edit" data-id="3746703">
<figure><img decoding="async" class="fit" src="https://ksr-ugc.imgix.net/assets/003/746/703/5a41c8ab3a4063bb1a31d8c5f2340b84_original.jpg?v=1430978433&amp;w=700&amp;h=&amp;fit=max&amp;auto=format&amp;q=92&amp;s=3a25c851c72029e1fd5eca7d053fa51c" alt="" /></figure>
</div>
<p>The post <a href="https://cvtfradio.net/2015/05/9-dollar-computer-made-in-oakland-ca-usa/">9 Dollar computer made in Oakland Ca Usa</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress Security Alert</title>
		<link>https://cvtfradio.net/2015/04/wordpress-security-alert/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-security-alert</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 20:26:39 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Wordpress Security Alert]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2271</guid>

					<description><![CDATA[<p>WordPress Security Alert &#8211; WP Super cache Credit: Wikipedia Upgrade immediately ITWorld&#124;April 8, 2015 Security firm Sucuri revealed on their blog this week that they had uncovered a persistent cross-site scripting vulnerability in the popular WordPress plugin WP Super Cache. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<header>
<h1>WordPress Security Alert &#8211; WP Super cache</h1>
</header>
<figure class="hero-img"><img decoding="async" src="https://images.techhive.com/images/article/2015/04/three_surveillance_cameras-100577821-primary.idge.jpg" alt="three surveillance cameras" /><figcaption> Credit: <a href="https://www.google.com/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=0CAMQjxw&amp;url=ht" target="_blank" rel="nofollow">Wikipedia</a> </figcaption></figure>
<section class="deck">
<h2>Upgrade immediately</h2>
</section>
<div class="byline">
<p class="dateline">ITWorld<span class="divider">|</span>April 8, 2015</p>
</div>
<section class="bodee">
<div id="drr-container">
<p>Security firm <a href="https://sucuri.net/" target="new">Sucuri</a> revealed on their <a href="https://blog.sucuri.net/2015/04/security-advisory-persistent-xss-in-wp-super-cache.html" target="new">blog this week</a> that they had uncovered a persistent <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="new">cross-site scripting</a> vulnerability in the popular WordPress plugin<a href="https://wordpress.org/plugins/wp-super-cache/" target="new"> WP Super Cache</a>. The effects of this vulnerability can be severe as an attacker can potentially insert malicious code into WordPress pages without your knowledge. Anyone who has experienced this type of attack due to a plugin security flaw knows how difficult and time consuming remediation can be.</p>
<figure class="large "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache1-100577816-large.idge.png" alt="supercache1" width="620" height="123" /> <small class="credit">Cypress North</small></figure>
<p>WP Super Cache is deployed across all of the WordPress sites we host in our data center, and for good reason. The excellent plugin dramatically boosts the performance of WordPress sites while simultaneously reducing load on the web servers. The code for this plugin is mature and stable, rarely requiring updates. That&#8217;s part of the reason why it&#8217;s trusted by over 7 million websites. It&#8217;s popularity makes this security flaw a big concern for site owners.</p>
<figure class="medium "><img loading="lazy" decoding="async" src="https://images.techhive.com/images/article/2015/04/supercache2-100577820-medium.idge.png" alt="supercache2" width="375" height="480" /> <small class="credit">Cypress North</small></figure>
<p>The update process is quick and easy so you should take the time to log in and click the update now link as soon as you&#8217;re able. If you&#8217;re fortunate enough to maintain your sites under a multi-site install you&#8217;ll be able to take care of this issue in one shot. Otherwise, like us, you&#8217;re stuck logging into each installation and manually updating each site like we spent all yesterday doing.</p>
<p>According to the blog post by <a href="https://blog.sucuri.net/author/marc" rel="author">Marc-Alexandre Montpas</a>:</p>
<blockquote><p>Using this vulnerability, an attacker using a carefully crafted query could insert malicious scripts to the plugin’s cached file listing page. As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site’s administrator to have a look at that particular section, manually.</p></blockquote>
<p>The nonce requirement lowers the odds of the backdoor taking effect since the cached page gets purged periodically, but still, better safe than sorry. The scale of the vulnerable sites makes exploitation an inevitable event. Do your part to protect the web and get updating.</p>
</div>
</section>
<p>The post <a href="https://cvtfradio.net/2015/04/wordpress-security-alert/">WordPress Security Alert</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA backdoors in majority of computer hard drives around the world</title>
		<link>https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Mon, 13 Apr 2015 17:19:16 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[NSA backdoors]]></category>
		<guid isPermaLink="false">https://www.cvtfradio.net/?p=2223</guid>

					<description><![CDATA[<p>Shopping for Spy Gear: Catalog Advertises NSA Toolbox By Jacob Appelbaum, Judith Horchert and Christian Stöcker from www.spiegel.de/international taken from &#8211; InSerbia.info DPA Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. After years of speculation that electronics can be accessed [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/">NSA backdoors in majority of computer hard drives around the world</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="column-both">
<h2 class="article-title" style="text-align: left;"><span class="headline-intro">Shopping for Spy Gear:</span> <span class="headline">Catalog Advertises NSA Toolbox</span></h2>
<p class="author" style="text-align: justify;">By Jacob Appelbaum, <a class="autor-link js-author-link" href="https://www.spiegel.de/impressum/autor-15954.html" rel="author" data-authorid="15954">Judith Horchert</a> and <a class="autor-link js-author-link" href="https://www.spiegel.de/impressum/autor-1562.html" rel="author" data-authorid="1562">Christian Stöcker</a> from www.spiegel.de/international</p>
<p><a href="https://youtu.be/b0w36GAyZIA">https://youtu.be/b0w36GAyZIA</a></p>
<p>taken from &#8211; <a href="https://inserbia.info/today/2014/01/cisco-dell-western-digital-seagate-maxtor-samsung-apple-with-nsa-backdoors/" target="_blank">InSerbia.info</a></p>
<div id="js-article-top-wide-asset" style="text-align: justify;">
<div class="js-module-box-image box-position  spXXLPano asset-align-center breitwandaufmacher">
<p><a class="image-buttons-panel display-block clearfix" href="https://www.spiegel.de/international/world/bild-940994-584188.html"> <img loading="lazy" decoding="async" class="spPanoImageTeaserPic" title="Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. " src="https://cdn1.spiegel.de/images/image-584188-breitwandaufmacher-ompq.jpg" alt="Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency. " width="860" height="320" align="middle" /><span class="image-buttons"> <img decoding="async" class="spPicZoom" title="Zoom" src="https://www.spiegel.de/static/sys/v10/icons/ic_lupe.png" alt="Zoom" /> </span> </a></p>
<div class="article-image-description">
<div class="asset-credit">DPA</div>
<p>Entering through the back door: A State Trooper truck is seen in front of the Fort Meade, Maryland headquarters of the National Security Agency.</p>
</div>
</div>
</div>
<p class="article-intro" style="text-align: justify;"><strong>After years of speculation that electronics can be accessed by i</strong></p>
</div>
<div id="js-article-column" class="column-wide">
<div class="article-section clearfix">
<p><b class="wp-more-tag mce-wp-nextpage" title="Page break" data-wp-more="nextpage" data-mce-placeholder="1">A 50-Page Catalog</b></p>
<p style="text-align: justify;">These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives &#8212; from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA&#8217;s specialists seem already to have gotten past them.</p>
<p style="text-align: justify;">This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets&#8217; data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000.</p>
<div class="asset-box asset-list-box clearfix" style="text-align: justify;">
<ul class="list-ilink clearfix">
<li>
<div class="article-image-box box-position">
<p><a title=" Interactive Graphic:   The NSA's Spy Catalog " href="https://www.spiegel.de/international/world/a-941262.html"><img loading="lazy" decoding="async" title="" src="https://cdn4.spiegel.de/images/image-584477-panoV9free-ngww.jpg" alt="" width="520" height="413" /></a></p>
<div class="asset-credit">SPIEGEL ONLINE</div>
</div>
<p><a title=" Interactive Graphic:   The NSA's Spy Catalog " href="https://www.spiegel.de/international/world/a-941262.html"><span class="asset-headline-intro">Interactive Graphic:</span> <span class="asset-headline">The NSA&#8217;s Spy Catalog</span></a></li>
</ul>
</div>
<p>In the case of Juniper, the name of this particular digital lock pick is &#8220;FEEDTROUGH.&#8221; This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive &#8220;across reboots and software upgrades.&#8221; In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH &#8220;has been deployed on many target platforms.&#8221;</p>
<p style="text-align: justify;"><b>Master Carpenters</b></p>
<p style="text-align: justify;">The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA&#8217;s department for <a class="text-link-int" title="Tailored Access Operations" href="https://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html">Tailored Access Operations</a> (TAO). In cases where TAO&#8217;s usual hacking and data-skimming methods don&#8217;t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such &#8220;implants,&#8221; as they are referred to in NSA parlance, have played a considerable role in the intelligence agency&#8217;s ability to establish a global covert network that operates alongside the Internet.</p>
<p style="text-align: justify;">Some of the equipment available is quite inexpensive. A rigged monitor cable that allows &#8220;TAO personnel to see what is displayed on the targeted monitor,&#8221; for example, is available for just $30. But an &#8220;active GSM base station&#8221; &#8212; a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones &#8212; costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.</p>
<p style="text-align: justify;"><b>&#8216;Persistence&#8217;</b></p>
<p style="text-align: justify;">The ANT division doesn&#8217;t just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer&#8217;s motherboard that is the first thing to load when a computer is turned on.</p>
<p style="text-align: justify;">This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this &#8220;Persistence&#8221; and believe this approach has provided them with the possibility of permanent access.</p>
<p style="text-align: justify;">Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.</p>
<p>Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are &#8220;remotely installable&#8221; &#8212; in other words, over the Internet. Others require a direct attack on an end-user device &#8212; an &#8220;interdiction,&#8221; as it is known in NSA jargon &#8212; in order to install malware or bugging equipment.</p>
<p style="text-align: justify;">There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. &#8220;Cisco does not work with any government to modify our equipment, nor to implement any so-called security &#8216;back doors&#8217; in our products,&#8221; the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company &#8220;respects and complies with the laws of all countries in which it operates.&#8221;</p>
<p style="text-align: justify;">Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it&#8217;s not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be &#8220;pursued for a future release.&#8221;</p>
</div>
</div>
<p>The post <a href="https://cvtfradio.net/2015/04/nsa-backdoors-in-majority-of-computer-hard-drives-around-the-world/">NSA backdoors in majority of computer hard drives around the world</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress 4.0.1 Security Release</title>
		<link>https://cvtfradio.net/2014/10/wordpress-4-0-1-security-release/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-4-0-1-security-release</link>
		
		<dc:creator><![CDATA[L3gsman]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:54:13 +0000</pubDate>
				<category><![CDATA[Portfolio]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[WordPress 4.0.1 Security Release]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1805</guid>

					<description><![CDATA[<p><img width="225" height="225" src="https://cvtfradio.net/wp-content/uploads/2014/10/wordpress.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/wordpress.png 225w, https://cvtfradio.net/wp-content/uploads/2014/10/wordpress-150x150.png 150w, https://cvtfradio.net/wp-content/uploads/2014/10/wordpress-100x100.png 100w" sizes="(max-width: 225px) 100vw, 225px" /></p>
<p>Posted November 20, 2014 by Andrew Nacin. Filed under Releases, Security. WordPress 4.0.1 is now available. This is a critical security release for all previous versions and we strongly encourage you to update your sites immediately. Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours. If you [&#8230;]</p>
<p>The post <a href="https://cvtfradio.net/2014/10/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="225" height="225" src="https://cvtfradio.net/wp-content/uploads/2014/10/wordpress.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://cvtfradio.net/wp-content/uploads/2014/10/wordpress.png 225w, https://cvtfradio.net/wp-content/uploads/2014/10/wordpress-150x150.png 150w, https://cvtfradio.net/wp-content/uploads/2014/10/wordpress-100x100.png 100w" sizes="(max-width: 225px) 100vw, 225px" /></p><div class="meta">Posted November 20, 2014 by <a href="https://nacin.com/">Andrew Nacin</a>. Filed under <a href="https://wordpress.org/news/category/releases/" rel="category tag">Releases</a>, <a href="https://wordpress.org/news/category/security/" rel="category tag">Security</a>.</div>
<div class="storycontent">
<p>WordPress 4.0.1 is now available. This is a <strong>critical security release</strong> for all previous versions and we strongly encourage you to update your sites immediately.</p>
<p>Sites that support automatic background updates will be updated to WordPress 4.0.1 within the next few hours.</p>
<p>If you are still on WordPress 3.9.2, 3.8.4, or 3.7.4, you will be updated to 3.9.3, 3.8.5, or 3.7.5 to keep everything secure.</p>
<p>(We don’t support older versions, so please update to 4.0.1 for the latest and greatest.)</p>
<p>WordPress versions 3.9.2 and earlier are affected by a critical cross-site scripting vulnerability, which could enable anonymous users to compromise a site. This was reported by <a href="https://klikki.fi/">Jouko Pynnonen</a>. This issue does not affect version 4.0, but version 4.0.1 does address these eight security issues:</p>
<ul>
<li>Three cross-site scripting issues that a contributor or author could use to compromise a site. Discovered by <a href="https://joncave.co.uk/">Jon Cave</a>, <a href="https://www.miqrogroove.com/">Robert Chapin</a>, and <a href="https://johnblackbourn.com/">John Blackbourn</a> of the WordPress security team.</li>
<li>A cross-site request forgery that could be used to trick a user into changing their password.</li>
<li>An issue that could lead to a denial of service when passwords are checked. Reported by <a href="https://www.behindthefirewalls.com/">Javier Nieto Arevalo</a> and <a href="https://www.devconsole.info/">Andres Rojas Guerrero</a>.</li>
<li>Additional protections for server-side request forgery attacks when WordPress makes HTTP requests. Reported by Ben Bidner (vortfu).</li>
<li>An extremely unlikely hash collision could allow a user’s account to be compromised, that also required that they haven’t logged in since 2008 (I wish I were kidding). Reported by <a href="https://david.dw-perspective.org.uk">David Anderson</a>.</li>
<li>WordPress now invalidates the links in a password reset email if the user remembers their password, logs in, and changes their email address. Reported separately by <a href="https://twitter.com/MomenBassel">Momen Bassel</a>, <a href="https://c0dehouse.blogspot.in/">Tanoy Bose</a>, and <a href="https://managewp.com/">Bojan Slavković of ManageWP</a>.</li>
</ul>
<p>Version 4.0.1 also fixes 23 bugs with 4.0, and we’ve made two hardening changes, including better validation of EXIF data we are extracting from uploaded photos. Reported by <a href="https://www.securesolutions.no/">Chris Andrè Dale</a>.</p>
<p>We appreciated the <a href="https://codex.wordpress.org/FAQ_Security">responsible disclosure</a> of these issues directly to our security team. For more information, see the <a href="https://codex.wordpress.org/Version_4.0.1">release notes</a> or consult the <a href="https://core.trac.wordpress.org/log/branches/4.0?rev=30475&amp;stop_rev=29710">list of changes</a>.</p>
<p><a href="https://wordpress.org/download/">Download WordPress 4.0.1</a> or venture over to <strong>Dashboard → Updates</strong> and simply click “Update Now”.</p>
<p><em>Already testing WordPress 4.1? The second beta is now available (<a href="https://wordpress.org/wordpress-4.1-beta2.zip">zip</a>) and it contains these security fixes. For more on 4.1, see <a href="https://wordpress.org/news/2014/11/wordpress-4-1-beta-1/">the beta 1 announcement post</a>.</em></p>
</div>
<p>The post <a href="https://cvtfradio.net/2014/10/wordpress-4-0-1-security-release/">WordPress 4.0.1 Security Release</a> appeared first on <a href="https://cvtfradio.net"></a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
