
SQL Injection
SQL Injection is a technique in which the hacker inserts SQL codes into a web Form to get Sensitive information like (User Name , Passwords). In fact, it is a technique to access the database of...
Tech tips and explorations
SQL Injection is a technique in which the hacker inserts SQL codes into a web Form to get Sensitive information like (User Name , Passwords). In fact, it is a technique to access the database of...
The striking point in using this tool is this is WORKING. This tool cannot be used against any website or any database server. This tool actually uses the SQLi vulnerability of database server and...
Step 1 : Goto http://gdata.youtube.com/demo/index.html Step 2 : In the middle of the page you'll find a keywords area. Enter <img src="<img src=search"/onerror=alert("xss Vulnerability")//"> in the box Step 3 : Press AND Source : THN If you...
I've posted about the types of firewalls in my previous post. To know about the types of firewalls, Go here Let us see how we can open ports on windows firewall. In this post...
You can have access to my previous Hack tips here. WHAT IS A CRYPTER? A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they...
I've posted many articles regarding the topic of firewalls. My last article on firewalls was about uninstalling the firewalls, antiviruses which are corrupted . So, coming to the topic, There are 3 types of firewalls basically....
1)Go to any web page, clear the address bar, and paste this… javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5);...
Cameyo is a free virtualization software that is small enough to make a portable version of the application that previously had to go through the installation process. Cameyo with free software, we can make...
Probably, You want to print a list of files and (sub) folders contained in a folder. By default, Windows does not provide facilities for it. With the trick below, you can create a context...
In my previous post , I've discussed about how to secure your devices from theft. But there you need to install applications to keep your device secure. What if you've already lost ?? Here is...
Prey Prey is a cross platform application that can be used on Windows, linux, Mac OS etc. If you have an Android Smart phone then prey can help you track your phone also. Using...
The software makes use of WebSockets to connect a server backend written in Python and a frontend written for modern browsers in JavaScript, HTML5 and CSS. The frontend doesn't require any browser plug-ins to...
ProxTube is the solution. Helps you to view blocked videos on YouTube. In some countries videos are blocked. Unblock them with this Addon. Supported countries: Germany, Netherlands (more countries follow soon) With a click on the...
Obfuscation is not the most effective way of security and at most of the times, it doesn’t help, as a professional hacker would already know these modifications and can easily make out what you...
Signals are the interrupts. They are a way of providing asynchronous events. For example a user typing ctrl-c on terminal to stop a program. Most of the programs need to handle signals. Every signal...
1) Constant Pointers : These type of pointers are the one which cannot change address they are pointing to. This means that suppose there is a pointer which points to a variable (or stores...
Whenever we format out PC, we need to install all the necessary utilities again. If we don't have a backup of that installer, we have to re download the file. In order to get...
After upgrading from Ubuntu 10.10 to Ubuntu 11.04 many complaints came over the compiz effects enabling. This is due change from nautilus environment to natty. Compiz is pre installed in the ubuntu repositories till...
Do you want to migrate all you email stuff from Yahoo to Gmail ?? Yes, you can do it with TrueSwitch. What’s more, if you’re switching to Gmail, Hotmail or one of the other ‘partner’ providers...
There are many types of Wi-Fi encryption you can use on modern Internet routers. So which one should you use? Many people don’t even use encryption, and those that do just pick an encryption...
Once a user scans the QR code, the code redirects them to a site that will install a Trojan on their Android smart phones. Kaspersky's SecureList blog has a report of a malicious QR...
I have seen many laptops like Dell, Lenovo even after installing Windows 7, having some drivers problems. What I used to do is download and install the drivers from concerned official website of the...
Introduction to port scanning : Port scanning is an attack in which the attacker tries to gain information about the different open ports or services running on the target machine. The main aim of...