- identity Theft-What is ID Theft?When most people think of identity theft, they think about a thief using a victim’s credit card. Although a serious crime, this form of identity theft does not require the long, time consuming process of the two most serious forms of ID theft known...
- What is File Inclusion attack?Description(This is for educational purposes only) Local File Inclusion attack consists of exploiting a non-protected script on the server to read the content of another file, that is not initially permitted by the application. The following example...
- Air Crack:A free testing ToolAircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attac...
- Snort:Penetration testing toolSNORT is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most...
- TCP Dump:A free penetration testing toolTCPDUmp tcpdump is a common packet sniffer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Tcpdump is frequently...
- How CORE IMPACT Pro Penetration Testing WorksThe CORE IMPACT Pro Rapid Penetration Testing (RPT) methodology streamlines testing of servers, desktop systems, end users systems, web applications, wireless networks, and network devices by automating tasks that would traditionally require signific...
- CORE IMPACT Software FeaturesIf you guys not know about the core impact penetration testing tool ,It is a must tool for any security professional and works great.. Some of it's feature is Given Below:- Agent Auto-Injection You can maintain contact with a targeted workstation,...
- What is Encryption?
on Apr 20, 2011 in
Hacktips The word "encrypt" means to hide, or to make secret. The earliest forms of cryptography (which just means "secret writing") used simple ciphers to turn ordinary text into unreadable nonsense. For example, suppose you wanted to en... - Computer safety TipsIt surprises me how many users don't take computer security seriously. With hackers, spammers, and viruses lurking around every corner, you can't afford not to follow some basic steps in protecting your PC and your personal information. Here are the...
- Difference between a Hacker and a crackerWhen most people think about computer security the word hacker comes to their mind. Another word that is also associated with bad computer behaviour is cracker and most of the time the two words are used interchangeably but they are not the same thin...
- How to become a hackerHello Friends, This Question has been asked to me by a lot of people. Today I will introduce you to a well known Hacker Mr. David Melnichuk who has written a Book “The Hacker’s Underground handbook”. This book is a first step for all the peopl...
- check who is invisible in yahooToday I stumbled upon a great website which check who is invisible in yahoo called Yinvisible.com:- is a fast Yahoo! Messenger status checker or invisible detector.With Yinvisible.com, you can detect whether a user is online, offline or invisi...
on Dec 28, 2010
What is SFTP, and how do I use it to transfer files? SFTP, or secure FTP, is a program that uses SSH to transfer files. Unlike standard FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted in...- Top 10 Hacks of all time
on Dec 24, 2010 in
Public Hacks 1990 When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He... - Protecting from KeyloggersI guess most of the people know what a keylogger is, but I´ll make a short introduction for those who don´t. A keylogger is a program like a virus, when it infects your computer it remains hidden everytime you turn it on. Everything looks ok but th...
- Top Wi-Fi security tipsWireless networking can be kind of scary from a security standpoint. It opens up whole new attack vectors that were not present with wired network infrastructures. That doesn’t mean you can’t do it securely, however, and I aim to give you some id...
- Difference between HTTP and HTTPSHypertext Transfer Protocol (http) is a system for transmitting and receiving information across the Internet. Http serves as a request and response procedure that all agents on the Internet follow so that information can be rapidly, easily, and accu...
- How to change MAC address in Windows?Under Windows, the MAC address is stored in a registry key. To change a MAC address, find that key with `regedit` and change it. Of course, Microsoft keeps moving the location of the key around! Windows XP adds an option to change the MAC address on...
- What is Cross site Scripting (XSS)?Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this lin...
- The New Threat: Spear PhishingMost people have heard about phishing – the practice of using fraudulent emails to gain access to personal information for the purpose of identity theft. But like any activity, an occasional update in the process is needed. Spear phishing is the ne...