Welcome Guest
THE HACKING TOAD

Java Under Attack

Java zero-day vulnerability is under attack by at least four active campaigns. Oracle has yet to respond. What to do?

Security experts have a message for all businesses: Disable Java now ... Read more »
Category: TECH NEWS | Views: 824 | Added by: arsh | Date: 2013-01-13 | Comments (0)

The Flame computer virus that smoldered undetected for more than 2 years in Middle Eastern energy facilities confirmed fears that the world has entered a new age of cyber espionage and sabotage.
Internet defenders are tearing into freshly exposed Flame malware (malicious software) that could be adapted to spread to critical infrastructures in countries around the world.
While the components and tactics of Flame were considered old school, the gigantic virus's interchangeable software modules and targeted nature were evidence that malware is a potent weapon in the Internet era.
"We are seeing much more specific types of malware and attacks," said McAfee Labs director of security research David Marcus.
"When you talk about a situation where the attacker knows the victim and tailors the malware for the environment it jumps out," he said. "That speaks to good reconnaissance and an attacker who knows what they are doing."
Gat ... Read more »
Category: TECH NEWS | Views: 365 | Added by: predator | Date: 2012-06-17 | Comments (2)

This entry aims at illustrating current security flaws in WEP/WPA/WPA2.

Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity with Linux can be helpful as well.

Attempting to access a network other than your own, or one you have permission to use is illegal!!!

To successfully crack WEP/WPA, you first need to be able to set your wireless network card in "monitor" mode to passively capture packets  ... Read more »

Category: TUTORIALS | Views: 1058 | Added by: arsh | Date: 2012-06-01 | Comments (9)

I ADVISE AGAINST THIS!!!

If you’ve just started using BitTorrent, you may not be fond of the whole "allow people to upload while you download” thing. It kills your bandwidth, and can make using the internet at all difficult, especially if you don’t have a power ... Read more »

Category: TUTORIALS | Views: 826 | Added by: arsh | Date: 2012-01-30 | Comments (4)

I did this once...and I did at again...and again... On my mobile, with my precious memory card in, I committed a sin --- accidentally formatting it! Fortunately, something could redeem me.

If you have ever used a digital camera before, you probab ... Read more »

Views: 539 | Added by: arsh | Date: 2012-01-04 | Comments (5)

Hollywood Goofs on Computers...


Category: FUN | Views: 1262 | Added by: arsh | Date: 2012-01-01 | Comments (4)

Real-Life HTTP Client-Side Exploitation Example

This section illustrates an example of a real life attack conducted against an organization that resulted in loss of critical data for the organization.

In this attack, Acme Widgets Corporation suffered a major breach from at ... Read more »

Category: TUTORIALS | Views: 623 | Added by: arsh | Date: 2011-12-31 | Comments (3)

         YAHOO BOOTER


 Yahoo booters are softwares that use packet codings to send the victim‘s computer using yahoo messenger, these pack codes contain some information and codes that computer can not understand, so computer gets hanged or slowed down by processing these packets, there are lots of different kinds of packets created by programmers to boot yahoo users in different ways, like disconnecting them from yahoo messenger and internet, or hanging their computer, or closing their yahoo messenger or sending them thousands of IM messages from different yahoo ids.Here is latest Ybooter.
... Read more »
Category: TUTORIALS | Views: 394 | Added by: PREET | Date: 2011-12-27 | Comments (0)

What is SQL Injection?

Views: 497 | Added by: arsh | Date: 2011-11-13 | Comments (1)

How To Hide Files In A Calculator?!

... Read more »

Views: 420 | Added by: arsh | Date: 2011-11-13 | Comments (0)

1 2 3 4 5 »

Login form
Section categories
TECH NEWS [7]
all the latest happenings in the world of technology
TUTORIALS [5]
FUN [4]
Our poll
What do you use to access Net?
Total of answers: 6
Statistics

Total online: 1
Guests: 1
Users: 0
Search
Calendar
«  September 2024  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
2930
Entries archive