Welcome to Pakistani Social Site

Art by Philippe Hoda
Art by Philippe Hoda Art by Philippe Hoda Art by Philippe Hoda Art by Philippe Hoda Art by Philippe Hoda Art by Philippe Hoda
Comments 0
iPhone 17e
iPhone 17e iPhone 17e iPhone 17e iPhone 17e
Judging by the data, this is an evolutionary step up from the 16e: the trusty notch, a modest 60Hz OLED display, but inside is a fully-fledged A19 processor from the base model. The biggest upgrades are hidden from view: improved connectivity and the return of full-fledged MagSafe with 25-watt charging. The design and screen remain largely unchanged—all the power is in the hardware.
Comments 0
How Zipping Files Actually Works

Most people think zipping a file is just “making it smaller.”
That is true, but the real story is more interesting.

Zipping is about compression and packaging.

First, compression.
When you zip files, the system looks for repeated patterns in the data.
Instead of storing the same information again and again, it stores it once and keeps a reference.
For example, if a document repeats the word “technology” 200 times, zip compression stores it once and says, “reuse this here, here, and here.”
That is why text files shrink a lot, while videos and images barely change since they are already compressed.

Second, packaging.
Zipping bundles multiple files and folders into a single archive.
This makes sharing, uploading, and backing up easier.
One file, one transfer, less chance of missing something.

What zipping does not do.
It does not delete data.
It does not reduce quality.
It does not encrypt your files by default, unless you add a password.

Why zipping matters in real life.
Faster uploads and downloads.
Smaller storage usage.
Cleaner file sharing, especially for projects with many folders.

In short.
Zipping files is smart data organization plus efficient compression.
Not magic. Just clever engineering that saves time and space.
Comments 0
The UAE topped Microsoft's AI adoption ranking,
The UAE topped Microsoft's AI adoption ranking, The UAE topped Microsoft's AI adoption ranking,

According to a Microsoft report published in Technology Magazine, countries are ranked based on the percentage of the working-age population using AI services from various companies. The data is collected through telemetry from user devices, but changes in IP addresses can affect the accuracy of the measurements.

The United Arab Emirates took first place, with its user share increasing from 59.4% in the first half of the year to 64% in the second. It was followed by Singapore (58.6% → 60.9%), Norway (45.3% → 46.4%), Ireland (41.7% → 44.6%), and France (40.9% → 44%).

The most significant year-on-year growth was recorded in South Korea, which climbed seven spots. Nearly a third of the population (30.7%) now uses AI applications.

The Russian Federation ranks only 119th on the list. AI service penetration was 7.6% in the first half of the year and rose to just 8% in the second. Venezuela, Belarus, Kyrgyzstan, and Kenya ranked ahead of our country.

Additionally, the popularity of the Chinese chat service DeepSeek was studied separately. This service is most widespread in China (89%). In Russia, it is chosen by 43% of users, in Cuba by 49%, and in Belarus by 56%.
Comments 0
21-year-old model named Gabriela Rico Jiménez
#JeffreyEpstein
In 2009, a 21-year-old model named Gabriela Rico Jiménez drew public attention in Monterrey, Mexico after a disturbing incident outside a luxury hotel. Video footage from that day shows her visibly distressed, making alarming statements — including claims that “they ate human flesh” — after attending what was described at the time as a private or “elite” event. Authorities later stated that her behavior was the result of a mental-health crisis, and she was taken into custody. Shortly after, she faded almost entirely from public view.

Years later, interest in her case resurfaced following the release of U.S. Department of Justice documents related to the Jeffrey Epstein investigation. Among those files was an FBI FD-302 report containing unverified allegations from a male accuser who described extreme acts, including cannibalism and violence against infants. These claims were not substantiated and were documented as allegations only.

The similarities between the statements made by Gabriela in 2009 and the later allegations referenced in those documents have led some people to question how extraordinary claims are recorded, dismissed, or explained — particularly when they involve powerful or exclusive social circles.

However, beyond debates about credibility, one question remains largely unanswered and rarely addressed: what ultimately happened to Gabriela Rico Jiménez after her arrest, and why did she disappear from the public record?

DISCLAIMER:
This post discusses publicly reported events and unverified allegations referenced in released legal documents. It does not assert facts, guilt, or criminal responsibility. All information is shared for discussion and public interest purposes only.
Comments 0
JeffreyEpstein
#JeffreyEpstein
Silence protects evil, break it.
Stand against cruelty, be the voice for the innocent, and expose what hides in the dark.
If we don’t draw the line today, humanity itself will be on trial tomorrow.
Comments 0
we miss you Skype
Comments 0
Oh.. This Facebook
Comments 0
Absolutely Gold, The Windows 98
Comments 0
A view of Hiroshima on March 1946
Comments 0
These guys built Google… without using Google.
Comments 0
Notepad++ delivered malware for six months
Notepad++ delivered malware for six months. From June to December 2025, the update system was compromised. Millions of people use this software. Some of them clicked update and got spyware instead of a patch. Here is what we now know. 🧐

The attackers did not hack Notepad++ itself, they went after the hosting provider instead. On February 2, 2026, developer Don Ho published the full disclosure of what happened. The website notepad-plus-plus.org sat on a shared hosting server, which means it shared space and resources with other customers on the same machine. Once the attackers broke into that server, they could see all the traffic flowing through it and intercept whatever they wanted.

Here is the part that should make every software maintainer uncomfortable: Notepad++, a tool downloaded 80,000 times per day, was running on a cheap shared hosting plan. Not a dedicated server. Not a VPS with proper isolation. A shared environment where one compromised neighbor means everyone is exposed.

The hosting provider later confirmed something interesting in their incident report. They found no evidence that any other customers on that server were targeted. The attackers specifically searched for notepad-plus-plus.org traffic and ignored everything else. They knew exactly what they wanted, and they had access to everything on that server to get it. The other customers got lucky. They could have been collateral damage but weren't.

To understand why this attack worked, it helps to know how Notepad++ updates normally function. A component called WinGUp contacts the server and requests a small XML file that contains the download URL for the latest version. WinGUp then fetches the installer, drops it in the temp folder, and runs it. The whole process is designed to be simple and fast, but older versions had a critical weakness: they never verified whether the downloaded file was actually legitimate. No certificate check, no signature validation, just blind trust that whatever came back was the real thing.

The attackers exploited this by sitting inside the hosting infrastructure and waiting. When certain users requested updates, they swapped the download URL in that XML response. Instead of pointing to the real Notepad++ installer, it pointed to their server. The updater grabbed the malicious file and executed it without question, because it had no way to tell the difference.

Security researcher Kevin Beaumont was one of the first to investigate what was happening. He spoke with three organizations that got hit, all of them telecommunications and financial services companies in East Asia. Every single one reported the same pattern: after the initial infection, there were real attackers sitting at keyboards and actively exploring the compromised networks. This was not automated malware blasting out to random targets, it was targeted espionage with humans making decisions in real time.

The malware itself did exactly what reconnaissance malware always does. It dropped a file called AutoUpdater.exe in the temp folder, which is already suspicious because Notepad++ does not use that filename. Then it ran a series of commands to map the environment:

→ netstat -ano to see all network connections and which processes own them
→ systeminfo to grab hardware specs, OS version, and domain information
→ tasklist to enumerate every running process
→ whoami to identify the current user and their privileges

All of that output was saved to a text file called a.txt, and then the malware used curl to upload it to temp.sh, an anonymous file sharing service that has shown up in other malware campaigns before. Once the attackers had that information, they knew exactly what they were dealing with and could plan their next moves.

Three things made this attack possible.

First, the self-signed certificate. Older versions of Notepad++ used a custom root certificate for code signing, and that certificate was sitting publicly on GitHub for anyone to find. An attacker who grabbed it could sign malicious files that the updater would accept as legitimate.

Second, the lack of proper certificate validation. Even though the updater communicated over HTTPS, it never verified the certificate chain properly. If someone could intercept the traffic, they could substitute their own responses and the updater would accept them without complaint.

Third, and this is the big one: shared hosting. As mentioned earlier, the Notepad++ website shared a server with other customers. One compromised server meant access to all traffic flowing through it.

One detail from the hosting provider's statement stands out: after the server was patched in September and the attackers lost their initial access, they tried to re-exploit the same vulnerability and failed. They were persistent, they came back to check if the door was still open, but this time it was locked.

The timeline shows how long this went undetected.

→ June 2025: hosting server compromised
→ September: routine maintenance locked attackers out of the server, but they kept credentials for internal services
→ October: a user on the Notepad++ forum noticed AutoUpdater.exe launching from the temp folder and running strange commands. First public sign something was wrong
→ November: version 8.8.8 forced updates through GitHub
→ December: version 8.8.9 added proper certificate verification. Attackers lost access on December 2
→ February 2, 2026: Don Ho published the full disclosure with the hosting provider's statement

Multiple researchers attribute this to a group known as APT31, also called Zirconium or Violet Typhoon, which has been active for over a decade and typically goes after intelligence targets rather than money. The targeting pattern fits: telecommunications and finance in East Asia, hands-on-keyboard activity after initial access, selective targeting rather than mass infection.

In cybersecurity, attribution is one of the hardest problems. IP addresses can be spoofed. Tools can be shared. Languages in code can be faked. What we know for sure is how the malware works, not necessarily who is behind it. The operational style points toward state-sponsored activity, but certainty is rare in this field.

One detail worth mentioning: Notepad++ has a history with Chinese censorship. Developer Don Ho has released versions named "Free Uyghur" and "Boycott Beijing," and Chinese browsers blocked the download page in response. Whether that history played a role here is impossible to prove, but it would be strange not to mention the context.

If Notepad++ is installed on any systems, here is what to check:

→ Look for gup.exe making network requests to anything other than notepad-plus-plus.org, github.com, or release-assets.githubusercontent.com
→ Check the temp folder for files named AutoUpdater.exe or update.exe, because Notepad++ does not create files with those names
→ Look for gup.exe spawning unexpected child processes, since it should only launch explorer.exe and installers that start with npp
→ Check logs for any connections to temp.sh

And here is what to do about it:

→ Update to version 8.8.9 or newer immediately
→ Download manually from the official website rather than trusting the built-in updater on older versions
→ Remove the old self-signed root certificate if it was ever installed
→ If any system shows signs of compromise, investigate thoroughly before assuming it is clean

The bigger picture here is that supply chain attacks more than doubled in 2025, and the OWASP Top 10 now lists software supply chain failures as the third biggest security risk. The logic for attackers is simple: why attack a thousand companies individually when compromising one update server reaches them all at once?

Don Ho has since moved the website to a new hosting provider with stronger security practices, added certificate verification and signature checks, and forced all updates through GitHub. The immediate threat is resolved.

Don Ho has maintained Notepad++ for over twenty years, for free. The infrastructure ran on shared hosting. He has since moved to a new provider with stronger security practices. But twenty years of updates and bug fixes for millions of users does not pay for itself.

Want to understand how attackers exploit software update systems and supply chains?

I cover traffic interception, network attacks, and real exploitation scenarios in my ethical hacking course:
https://www.udemy.com/course/ethical-hacking-complete-course-zero-to-expert/?couponCode=FEBRUARY26

(The link supports me directly as your instructor!)

Hacking is not a hobby but a way of life. 🎯

Read the full breakdown: https://hackingpassion.com/notepad-plus-plus-supply-chain-attack/

#EthicalHacking #SupplyChainAttack #CyberSecurity #InfoSec #Notepad #Malware #ThreatIntelligence #SoftwareSecurity #UpdateHijacking #APT

Research & writing: Jolanda de Koff | HackingPassion.com
Sharing is fine. Copying without credit is not.
Comments 0
KARACHI PORT 1947
KARACHI PORT 1947 KARACHI PORT 1947 KARACHI PORT 1947 KARACHI PORT 1947 KARACHI PORT 1947 KARACHI PORT 1947
Migration of Hindu Community From Pakistan to India
Comments 0
AOL Instant Messenger
AOL Instant Messenger (AIM) was a dominant, free desktop chat application launched by AOL in May 1997.
Comments 0
AI Agents And Bots Build Their Own Social Platform
Moltbook is a newly launched social network designed exclusively for artificial intelligence agents to post, comment, and interact with each other, while humans can only observe.

The platform was created by developer Matt Schlicht and launched over a weekend.

Schlicht said Moltbook attracted about 147,000 AI agents, formed more than 12,000 communities, and generated over 110,000 comments within its first three days.

Moltbook operates through APIs rather than traditional user interfaces, allowing AI agents to act autonomously.

Schlicht described Moltbook as an agent-first platform built specifically for how AI systems interact.
Comments 0
In 1999, Anyone Could Access Any Hotmail Account
In August 1999, Hotmail experienced one of the most significant security lapses in internet history when a simple flaw in its login script exposed millions of accounts globally. The vulnerability, publicized by the group Hackers Unite, allowed anyone to bypass security and access any inbox by simply entering the password "eh." This shockingly easy exploit forced Microsoft to scramble for a patch while denying rumors of a deliberate backdoor within the system. Today, the incident remains a legendary cautionary tale for software developers, highlighting how a minor coding error can lead to a monumental cybersecurity disaster. It serves as a stark reminder of the critical importance of rigorous security auditing in the early days of

Via: Tech Viral
Comments 0
Beautiful travel photos by Argen Elezi
Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi Beautiful travel photos by Argen Elezi
Argen Elezi is a talented photographer, adventurer, and urban explorer from Toronto, Ontario. Focusing primarily on landscape photography, Elezi captures stunning urban and natural landscapes. He shares his work on Instagram, where he has over 120,000 followers.
Comments 0
Thank you back old era again 😄
OpenAI launches GPT‑5.2-powered Prism
Prism is an AI-powered research writing workspace built with GPT-5.2.

It puts the AI inside your document, so it understands your full text, equations, and references — not just chat messages. It helps you write, edit, format LaTeX, manage citations, and collaborate in real time.

In short:
Prism = Smart document editor + GPT-5.2 assistant for research and technical writing.
Comments 0
Friends this is our new website, our old site www.geopak.mobi will soon off, so enjoy our new site getting connected with new updates
Comments 1