Jump to content


Online Users

0 members, 0 visitors and 0 anonymous users

Top Posters

  • AngoidPhoto
    1. Angoid

    1,364 posts

  • ranchhandPhoto
    2. ranchhand

    1,304 posts

  • dashwood95Photo
    3. dashwood95

    1,142 posts

  • PhzzzPhoto
    4. Phzzz

    977 posts

  • MarkPhoto
    5. Mark

    884 posts

Newest Members

    1. rixit

    Joined: Today, 02:04 PM

    2. itdNoble

    Joined: Yesterday, 03:26 PM

    3. Rm113

    Joined: Feb 20 2017 05:45 AM

    4. Alfred

    Joined: Feb 08 2017 03:03 PM

    5. AppleIsEverything

    Joined: Jan 31 2017 05:40 PM

Welcome to Suggest-A-Fix

Where People with problems come for help… And answers come from people that know...


Welcome to Suggest A Fix, an online leader in free peer-to-peer technical support. Many of us have friends and get the help we need to solve our computer problems. SAF gives you an online friend to call on by making a post of your problem. Our expert staff and membership will provide answers without the techno babble some paid support resources are known for.

Share your knowledge and problems here!

Fake Font Update on Google Chrome Uses Social E...

Yesterday, 02:57 AM

Posted by manunkind In: Security News and Warnings
We’ve seen social engineering attacks manipulate users time and time again. From phishing emails, to baiting attempts – this breed of cyberthreat has continued to manipulate users for years. And now a new scam has emerged that utilizes a fake update on Google Chrome to trick users into downloading and infecting themselves with the infamous Spora ransomware. The trick is simple. First, the attackers insert JavaScript into poorly secured, but legitimate websites to modify the text rendering on them. Then, when victims visit these sites, the script makes the website indecipherable and pro...

  10 Views · 0 replies

Announcing the first SHA1 collision

24 Feb 2017

Posted by manunkind In: Security News and Warnings
Cryptographic hash functions like SHA-1 are a cryptographer’s swiss army knife. You’ll find that hashes play a role in browser security, managing code repositories, or even just detecting duplicate files in storage. Hash functions compress large amounts of data into a small message digest. As a cryptographic requirement for wide-spread use, finding two messages that lead to the same digest should be computationally infeasible. Over time however, this requirement can fail due to attacks on the mathematical underpinnings of hash functions or to increases in computational power. Today, mo...

  12 Views · 0 replies

Cloudbleed: Big web brands leaked crypto keys,...

24 Feb 2017

Posted by Angoid In: Security News and Warnings
Big-name websites leaked people's private session keys and personal information into strangers' browsers, due to a Cloudflare bug uncovered by Google researchers. As we'll see, a single character – '>' rather than '=' – in Cloudflare's software source code sparked the security blunder. Cloudflare helps companies spread their websites and online services across the internet. Due to a programming blunder, for several months Cloudflare's systems slipped random chunks of server memory into webpages, under certain circumstances. That means if you visited a website powered by Cloudflare, yo...

  26 Views · 3 replies ( Last reply by manunkind )


Recently Added Posts

Board Stats


  • 13,051 Total Posts
  • 671 Total Members
  • rixit Newest Member
  • 72 Most Online

0 users are online (in the past 15 minutes)

0 members, 0 guests, 0 anonymous users   (See full list)


Portal v1.4.0 by DevFuse | Based on IP.Board Portal by IPS