Saturday, July 19, 2014

How Can We Protect Our Website By Common Web Attacks ?   On this post i am telling about five types of common web attacks, which are used in most types of defacements or dumps of databases. Following five exploits are listed SQL injection, XSS, RCE, RFI, and LFI. Most of the time, we missed out some website code tags. So that our website gets attack and allows the hacker for hijack the vulnerable website. 1. SQL Injection       ...

Thursday, July 17, 2014

Type of attack on Web Based Application   [~]Sql Injection Attack[~]Hibernate Query Language Injection[~]Direct OS Code Injection[~]XML Entity Injection[~]Broken Authentication and Session Management[~]Cross-Site Scripting (XSS)[~]Insecure Direct Object References[~]Security Misconfiguration[~]Sensitive Data Exposure[~]Missing Function Level Access Control[~]Cross-Site Request Forgery (CSRF)[~]Using Components with Known Vulnerabilities[~]Unvalidated...

Wednesday, July 16, 2014

32 Commands For Linux Users From All Levels! Beginner Commands 1. find: Use this command when you need to search for files in a particular directory. It starts from the parent directory and then moves to the sub directories. The –name option makes the search case sensitive, while the –iname option searches irrespective of the case. 2. grep: You use the grep command in order to find lines in a particular file that match a given string...
An SQL injection attack is a code injection attack that is used to exploit web applications and websites. It is one of the most common methods for hackers to get into your system. Learning such attacks are important for anyone looking to perform their own exploits. Here are 10 of the most powerful tools that aid in performing SQL Injection attacks. 1. BSQL Hacker This is a useful tool for both experts and beginners that automates SQL Injection...

Saturday, July 12, 2014

Hacker's Dictionary Are you new to the realm of hacking? Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out!If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition. Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!* ---------------------------------------------------------------------------------------------------------------------------------- Abbreviations ★ DDoS = Distributed...

Saturday, June 28, 2014

This tutorial is about adding shadow connection manually. Here in this tutorial you will know how to add shadow connection in any java MIDlet. This Tutorial has prepared by me.   How To Add Shadow Connection To Any Java MIDlet Manually   About Shadow Connection: Shadow connection is used to keep the connection of your phone alive. It will help to solve the connection break problems in any Java app of phone. Tools: 1. Blueftp,Mini Commander etc. 2. Bytecode editor Procedures: 1. Download the below file. http://upfile.mobi/536885 2....

Thursday, April 10, 2014

Hello friends,This time I am here with a modded UC Browser v9.4 with free net from Aircel, unlimited browsing and download in Nokia s40 phones. This have been checked in Assam and it works fine here.Please check it in your state and let us know in the comment, whether it works or not.I am 99% sure, that it will work.Modding Credit: mahender424888So, first download the modded UC Browser from below: Download after that download the prov file from here: Download If the files asks for password, enter as mob2web  So, after downloading the prov...

Tuesday, April 8, 2014

When you first turn on you computer (BEFORE DIALING INTO YOUR ISP),open a MS-DOS Prompt window (start/programs MS-DOS Prompt).Then type netstat -arn and press the Enter key.Your screen should display the following (without the dotted lineswhich I added for clarification).-----------------------------------------------------------------------------Active Routes:  Network Address          Netmask  Gateway Address        Interface  Metric       ...

Sunday, April 6, 2014

Caught A Virus? If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.You know they're right. Yet for one reason or...

Friday, April 4, 2014

Remove Ads from Java Apps and Games Its been always very tough to handle mobile apps and game with ads, specially in the Java phones. So, today I am here with a tutorial which will help you to remove ads from any Java Apps/Games. Tools required: Opera Mini Mod and BlueFTP Now, simply follow this simple steps   1. Open BlueFTP. 2. Go to your _jar file. 3. Rename it to .zip at the end. 4. Open...

Thursday, April 3, 2014

An alert for all our readers! A fake news about the missing Malaysian plane flight number MH370 is being circulated all over the Internet in which scammers are luring users to earn money by clicking a malicious video.   First it will ask you to verify your age, just to feel like link is trustworthy. Once you click the link, it redirects you too a malicious website. This is how the preview of scam links looks like Note the...

Wednesday, April 2, 2014

  Hacking & Security but Hacking is possible only when you're good in Programming. If you're champ in programming and Networking then Hacking is like a Piece of Cake for you, yeah it will take little long time, but it's really worthy.Can I learn Hacking without Knowing Programming ?Simply you can't, Listen guys daily I get many request to teach Hacking, Cracking, Defacing & Vulnerability hunting but basically I just tell them if...
Add me on Facebook Follow me on Twitter!