Saturday, April 05, 2025

Monday, January 24, 2011

How I cross-site scripted Twitter in 15 minutes


How I cross-site scripted Twitter in 15 minutes, and why you shouldn’t store important data on 37signals’ applications “Today the Ruby on Rails security team released a patch for a cross-site scripting issue which affected multiple high-profile applications, including Twitter and Basecamp. If you’re concerned about the issue and would like to see the patch, please read the advisory from the Rails security team. In this post, I discuss the overall...


Facebook virus spreads via photo album chat messages


A new social networking worm in the vein of Koobface is currently doing the rounds. Unlike the majority of Facebook scams, this one actively infects your computer with malware instead of simply tricking you into taking surveys and passing on messages to other users. The link in his...


Yahoo Hacking Programs - Are They Needed?


There are many reasons that yahoo hacking programs might be useful in a family. Many times, those we love spend time online doing things we wish they would not be doing. Unfortunately, this is the state of the Internet. Often the only way to check up on them is to use yahoo password hacking programs to find their password and see what they have been doing online. There are free download yahoo hacking programs out there. Find out more about how to...


Hacker Tricks And Prevention Techniques


In movies or TV series where hackers are involved, we may have seen them apply their computer knowledge in order to perform certain hacker tricks that saved the day. From "The Matrix" to "Swordfish", hackers have been able to elevate themselves to the level of heroes with only a keyboard and a mouse. However, hackers attacks and hacker prevention is more difficulty, and complex, in real life. Hollywood has a tendency to oversimplify things so...


Keep Out the Bad Guys : Ethical hacking


If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why? Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them that they will be safe from hacker attacks. But it isn't easy to become a certified ethical...


First DOS-based malware celebrates silver jubilee


The first virus capable of infecting DOS-based PCs celebrates its silver jubilee this month. The Brain Virus, written by Pakistani brothers Basit and Amjad Alvi, was relatively harmless. The Alvis claimed the malware was there as a copyright protection measure to protect their medical software from piracy, an article by CIO magazine on the anniversary recalls. Brain replaced the boot sector of an infected floppy disk with malicious code, moving the...


Excess2 – Webmail XSS Tester


Here is a script to automate testing of webmail systems for cross-site scripting. It uses XSS Cheat Sheet to generate the injection strings. Compared to the previous version this version downloads XSS cheat sheet on the fly (instead of having it hard-coded) and supports SMTP authentication. Name: excess2 – A script for testing webmail systems for cross-site scripting problems. Description: This script sends a number of HTML-formatted email messages...


About the Hacking Tips Website / Blog


The name 'Hacking Tips' sounds like another underground, unethical hacking website, however it's not. We are launching an ethical hacking solution for all the user who are technically dependent on the professional or Internet search and advanced selected articles for current and aspiring security professionals. The Hacking Tips blog will include the following articles initially: 1. Hacking tips for windows operating system to optimize the performance. i....


Optimizing windows speed using windows registry editor - Get rid of unwanted programs on startup


How to optimize the Windows performance by removing unwanted programs from startup using windows registry. Applicable to Windows XP, Vista, Windows 2000, windows 98 and windows server. I will start hacking tips with a very useful and easy to do job. Most of us face this problem of...


Sunday, January 23, 2011

How to Test the Working of your Antivirus – EICAR Test


Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus...


How Antivirus Software Works


Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even...


Monday, January 10, 2011

Engineers vs Doctors


Engineers vs Doctors.Very Funn Engineers v/s doctors.. its fun.. read it......... SCENE 1 (PUNE- MUMBAI): --------------------------------------------------------------------------------------- - 7 engineers take only 1 Ticket and 7 doctors buy all 7 tickets.. Doctors are desperately waiting for TC to come...... When TC arrives, All 7 Engineers get in one toilet so when TC knocks, one hand come out with the ticket and the TC goes Away.... NOW...


Friday, January 7, 2011

Hacking Cable Modems (higher speeds, free internet)


Cable Modem hacking is a medium-difficulty task. In this tutorial I will show you how to hack a cable modem, get free internet, and free Cable TV (if you need it). Please note that all of this is VERY illegal. Theft of service is a felony. Cable TV Network Design [SIZE="1"]This...


Hacking secure wireless network


Wireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure...


Pages (51)1234 Next
 

Computer tricks and Internet hacking Copyright © 2011 | THANK YOU | VISIT AGAIN