Megaleecher.Net

Making technology work for you...

Get Your Free Subscription By Email:

Fixing The Horrible Windows "Unable To Access" Network Resource Error

Microsoft Windows has came a long way since the dreadful days of common OS crashes and BSOD's, I have been using my current install of Microsoft Windows 7 since past 2.5 years and never faced any major annoyance. Suddenly, few days ago my computer failed to connect to any shared network folder and greeted me with the error "Windows cannot access \\machine\sharedfolder, error code 0x80004005" every-time I tried accessing a network resource as shown below. Strangely, the computer was discovering other computers on the network and I was able to ping and SSH into them like my Raspberry Pi Network Attached Storage (NAS). After, trying everything from messing with firewall settings, completely uninstalling Kaspersky Internet Security 2014, enabling all sorts of networking services and changing security policies nothing worked. After 5 days of reading numerous articles on the internet I finally managed to nail this and solve this problem as shared below.

Unable to Browse the Network

Fixing dllhost.exe Constant CPU Usage And Memory Leak

A long ago we shared a solution for "Windows 7 Lock-up While Using Windows Photo Viewer" which involved dllhost.exe's incompatibility with Kaspersky Antivirus. I recently faced a similar issue where Microsoft's genuine dllhost.exe file was constantly using 25% of CPU with ever increasing RAM (a memory leak) consumption, this time it was not the Kaspersky incompatibility causing the issue but a Windows 7 bug how it handles thumbnail generation. The reason for the issue was a broken video download on my Desktop, Windows was trying to generate thumbnail for that broken/incompatible video file and failing causing the constant CPU usage - the solution was to simply delete the problematic file or move it to a inner folder in which case the problem will occur only when accessing that particular folder.

dllhost.exe causing high cpu and RAM usage

BSNL Security Loophole Allows Anybody To See Your Account Balance Amount And Expiry Date

Bharat Sanchar Nigam Limited (BSNL), the Indian state-owned telecommunications company is neither known for it's quality of service nor for customer satisfaction. To make their services more user-friendly they started allowing quick online recharge facility from their website, but this service has a data privacy loophole where anybody can check any BSNL subscribers prepaid balance with expiry date. While this may not sound a big security risk the data exposed can be used to device social-engineering phishing attacks, for example - a malicious hacker can fetch this data and utilize it for calling the subscriber as an BSNL employee supplying this information to gain trust of the consumer and asking them to order a highly subsidized online recharge from a fake website.

BSNL Security Loophole

Wondershare Photo Recovery : Media Recovery Utility For Windows And Mac

Photos are one the most important memories of your life which nobody would like to loose, luckily there are chances of data recovery even after an accidental deletion and professional utilities like "Wondershare Photo Recovery" comes to a user's rescue in such bad situations.

Wondershare Photo Recovery is an commercial utility for Windows and Mac users allowing recovery of media files from digital camera, memory card, USB drive, hard drive and other storage devices with a few clicks. The simple to use point-n-click utility allows recovery of deleted or formatted image, video and audio files from many storage devices.

Wondershare Photo Recovery

FBI Can Activate Your Computer Camera Without Triggering The Light Which Tells When It's Recording

We all are now very well aware of the fact that almost all big government's use cyber-warfare to spy on each other and individuals of interest, NSA, USA's cyber-weapon Flame, suspected Chinese spying using Electric Kettles and other communication devices are prime public examples of this.

The latest revelations made by "The Washington Post's" story "FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance" provides further glimpses onto how intrusive these tactics can get. The FBI's ability to covertly activate a users computer camera without triggering the notification light which informs the user that it is being recorded is one such example, While used for good purpose of catching criminals and controlling terrorism now what happens when the technology gets leaked or gets abused by whom which have access to it now to settle personal scores or invade one's privacy?

FBI Camera Spying

Hacker Claims To Have PlayStation 4 Cracked Unlocking The Path For Pirated Games

Sony PS4 Hacked

We all know Sony takes business very seriously, and unlike other tech companies takes a very strong stand against anybody trying to circumvent their console security for enabling sideloading or game piracy. Sony sued the well-known Apple iOS hacker George Hotz for releasing the first-ever Playstation3 custom firmware which was the initial step towards letting others enable game piracy for the earlier locked platform. An alleged Sony PS4 jailbreak named Reckz0r has now made it's presence public online claiming to allow execution of unassigned/unauthorized code and pirated games on PS4 exploiting an vulnerability in underlying FreeBSD based Orbis OS. The author goes ahead with sharing all details and files showing users how to "crack" their PS4's labeling this as an tribute to George Hot.

Reckz0r

How To Make A Google Account Without Gmail

If you already have an email address and do not want to get a new Gmail account, Google does provide an alternative signup web-form to get your free Google account utilizing your existing email id. One simply needs to use https://accounts.google.com/SignUpWithoutGmail and complete the signup process skipping the need of an Gmail account. The same can also be accessed using the "I prefer to use my current email address" option located just below the text-filed where it asks for Gmail ID in default Google signup form.

Steps To Create Google Account With Non Gmail Address

Spinning Globe With Just 1K Of Self-replicating Javascript Code

The mind-blowing javascript globe animation shared below is not just awesome because of it's compact code size of just 1K, but also because it is a Quine, which is by definition "A computer program which takes no input and produces a copy of its own source code as its only output. The standard terms for these programs in the computability theory and computer science literature are self-replicating programs, self-reproducing programs, and self-copying programs." Which means, the code you are seeing below is the exact code which is used to generate it.

Assassination Market : Online Crowdfunded Killings With Bitcoins

Bitcoin, the digital cryptocurrency being anonymous and untraceable has been the preferred choice for doing illegal business online. After, being widely used for all kinds on illegal online trading like drugs, exploits and numerous other black-market services the currency has another taker which will definitely raise many eyebrows and can result in strict governmental actions. A new online service hosted on underground, anonymous Tor network is now being used to offer an crowdfunded bounty killer service. Named "The Assassination Market" the service lets anyone anonymously contribute bitcoins towards a bounty on the head of any government official just like Kickstarter but for political assassinations.

The Kickstarter for political murders is already receiving huge funds and have 7 nominations (nominating someone needs someone to propose a name and pay the 1 Bitcoin fee worth US$766.99) so far. "Ben Shalom Bernanke" the current chairman of Federal Reserve USA tops the chart and has collected maximum bounty worth ฿124.14 or US$95106.76 at today's exchange rate.

The Assassination Market

Your LG SmartTV Is Spying On You : Logs Whatever You Watch Including Content From USB Drives To Remote Server

Your privacy is at great risk in this era of Internet of things, after revelation of spying backdoor's in Internet routers and Chinese Electric Goods we now have another revelation of spying by LG SmartTV's. Findings made by developer @DoctorBeet revealed how LG is spying on users watching habits including logging of file-names watched by users from there external USB disk drivers as shown below to remote servers. The communication is clearly sending out "unique device ID" (which could be traced back to you) along with the information about what is being watched and too completely unencrypted.

Smart TV
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.