Monday, October 31, 2011

SQL Injection

SQL Injection is a technique in which the hacker inserts SQL codes into a web Form to get Sensitive information like (User Name , Passwords). In fact, it is a technique to access the database of...

#RefRef DDOS tool

The striking point in using this tool is this is WORKING. This tool cannot be used against any website or any database server. This tool actually uses the SQLi vulnerability of database server and...

Tuesday, October 25, 2011

XSS Vulnerability in Interactive YouTube API Demo Beta

Step 1 : Goto http://gdata.youtube.com/demo/index.html Step 2 : In the middle of the page you'll find a keywords area. Enter <img src="<img src=search"/onerror=alert("xss Vulnerability")//"> in the box Step 3 : Press AND Source : THN If you...

How to open/close ports in Windows 7 Firewall

 I've posted about the types of firewalls in my previous post. To know about the types of firewalls, Go here Let us see how we can open ports on windows firewall. In this post...

What is a crypter ? What is a FUD Crypter ?

You can have access to my previous Hack tips  here. WHAT IS A CRYPTER? A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they...

Types of Firewalls

I've posted many articles regarding the topic of firewalls. My last article on firewalls was about uninstalling the firewalls, antiviruses which are corrupted .  So, coming to the topic, There are 3 types of firewalls basically....

Saturday, October 22, 2011

DANCING IMAGES JAVA SCRIPT TRICK !

1)Go to any web page, clear the address bar, and paste this… javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5);...

HOW TO CREATE YOUR OWN PORTABLE APPLICATIONS

Cameyo is a free virtualization software that is small enough to make a portable version of the application that previously had to go through the installation process. Cameyo with free software, we can make...

Tuesday, October 18, 2011

HOW TO PRINT A LIST OF FILES AND FOLDERS

Probably, You want to print a list of files and (sub) folders contained in a folder. By default, Windows does not provide facilities for it. With the trick below, you can create a context...

Sunday, October 16, 2011

How to Locate Lost Android Phone, Tablet if Stolen even when no App Pre-installed

In my previous post , I've discussed about how to secure your devices from theft. But there you need to install applications to keep your device secure. What if you've already lost ?? Here is...

How to recover stolen / lost laptop or smartphone

Prey Prey is a cross platform application that can be used on Windows, linux, Mac OS etc. If you have an Android Smart phone then prey can help you track your phone also. Using...

GateOne Beta | Terminal emulator for HTML5 web browsers

The software makes use of WebSockets to connect a server backend written in Python and a frontend written for modern browsers in JavaScript, HTML5 and CSS. The frontend doesn't require any browser plug-ins to...

Friday, October 14, 2011

How to Unblock Youtube videos

ProxTube is the solution. Helps you to view blocked videos on YouTube. In some countries videos are blocked. Unblock them with this Addon. Supported countries: Germany, Netherlands (more countries follow soon) With a click on the...

Thursday, October 13, 2011

Obfuscating PHP

Obfuscation is not the most effective way of security and at most of the times, it doesn’t help, as a professional hacker would already know these modifications and can easily make out what you...

Wednesday, October 12, 2011

Unix/Linux Signal Handling

Signals are the interrupts. They are a way of providing asynchronous events. For example a user typing ctrl-c on terminal to stop a program. Most of the programs need to handle signals. Every signal...

Difference Between Constant Pointers and Pointer to Constants

1) Constant Pointers : These type of pointers are the one which cannot change address they are pointing to. This means that suppose there is a pointer which points to a variable (or stores...

Wednesday, October 5, 2011

How to transfer already installed software to a new PC ?

Whenever we format out PC, we need to install all the necessary utilities again. If we don't have a backup of that installer, we have to re download the file. In order to get...

Tuesday, October 4, 2011

Enabling compiz in Ubuntu 11.04

After upgrading from Ubuntu 10.10 to Ubuntu 11.04 many complaints came over the compiz effects enabling. This is due change from nautilus environment to natty. Compiz is pre installed in the ubuntu repositories till...

How to Migrate Your Email Between Providers

Do you want to migrate all you email stuff from Yahoo to Gmail ?? Yes, you can do it with TrueSwitch. What’s more, if you’re switching to Gmail, Hotmail or one of the other ‘partner’ providers...

Types of Wi-Fi Encryption You Can Use

There are many types of Wi-Fi encryption you can use on modern Internet routers. So which one should you use? Many people don’t even use encryption, and those that do just pick an encryption...

QR codes - Next way for Android Malware

Once a user scans the QR code, the code redirects them to a site that will install a Trojan on their Android smart phones. Kaspersky's SecureList blog has a report of a malicious QR...

Sunday, October 2, 2011

How to Backup Windows7 drivers and use them to reinstall

I have seen many laptops like Dell, Lenovo even after installing Windows 7, having some drivers problems. What I used to do is download and install the drivers from concerned official website of the...

About Port Scanning

Introduction to port scanning : Port scanning is an attack in which the attacker tries to gain information about the different open ports or services running on the target machine. The main aim of...

Page 1 of 49123»