WhiteHackers ToolvbarWhiteHackers Toolvbar

Hi All,With your support the official white hackers toolbar is now amongpopular download on Cnet's download.com.Thanks to everyone who made it possible...For others ther is still chance here is the li…

Read more »
22 Nov 2006

Google BombGoogle Bomb

This video explains as to what is google bombing.read more | digg story…

Read more »
16 Nov 2006

[whitehackers:231] Try the new Hackers search engine...[whitehackers:231] Try the new Hackers search engine...

Hi,Please try the new hackers search engine and add yourself as acontributer...http://www.google.com/coop/cse?cx=003324193344530269932%3Am2r8casexqo--~--~---------~--~----~------------~-------~--~----…

Read more »
16 Nov 2006

Vista, Office 2007 crackedVista, Office 2007 cracked

Vista, Office 2007 cracked. Kind of.:"Microsoft has had a long history of battling against piracy, ever since Bill Gates' Open Letter to Hobbyists in 1976, long before there was even a personal comput…

Read more »
14 Nov 2006

[whitehackers:230] New Windows Attack Can Kill Firewall[whitehackers:230] New Windows Attack Can Kill Firewall

The code, which was posted on the Internet early Sunday morning, couldbe used to disable the Windows Firewall on a fully patched Windows XPPC that was running Windows' Internet Connection Service (ICS…

Read more »
01 Nov 2006

[whitehackers:229] 10 things you should know about Internet Explorer
 7 Security[whitehackers:229] 10 things you should know about Internet Explorer 7 Security

Internet Explorer 7 is designed to make browsing safer. Here's a quickrundown of some of the new security features, including Active Xopt-in, the Phishing Filter, cross-domain security, enhanced priva…

Read more »
31 Oct 2006

For a change...For a change...

I'm going to try something new now..I have recently created a new blog, the blog is about Apple, (mac's, ipod's, software and what not..)I'm going to give out the address to this new blog for two reas…

Read more »
28 Oct 2006

[whitehackers:228] How to Stop Email Spam with SpamAssassin[whitehackers:228] How to Stop Email Spam with SpamAssassin

One highly effective method how to stop spam email using SpamAssassin.A good tutorial about how to configure the SpamAssassin settings inyour hosting account, as well as Outlook's filters. I configure…

Read more »
27 Oct 2006

One Way Web HackingOne Way Web Hacking

Saumil Shah security expert from net square talks about web hacking ....read more | digg story…

Read more »
26 Oct 2006

Case Study: Adobe Had Always Been ARTS PDF's Best PartnerCase Study: Adobe Had Always Been ARTS PDF's Best Partner

Was going head-to-head with the industry giant the best move? Read the story of two young guys taking on the industry giants....read more | digg story…

Read more »
21 Oct 2006

The Black Pearl: The Smallest Cellphone We've Ever UsedThe Black Pearl: The Smallest Cellphone We've Ever Used

"The Haier Black Pearl is honestly the smallest phone we've ever seen. It's hard to get a sense of how small it is from the picture, but you can see that it's about the length and width of two of my f…

Read more »
17 Oct 2006

Hacking - The History Of Hacking - Google VideoHacking - The History Of Hacking - Google Video

"A quality documentary about hacking from the 1960s to date. Takes a historical approach, looking at the role of the hacker during this time..."read more | digg story…

Read more »
15 Oct 2006

Microsoft Now Decides to Accept Outside Security for VistaMicrosoft Now Decides to Accept Outside Security for Vista

Microsoft did an about-face yesterday, agreeing to make it easier for customers of its forthcoming Vista operating system to use outside security vendors, such as those who make popular antivirus and …

Read more »
14 Oct 2006

Finding Passwords with Google CodeFinding Passwords with Google Code

You can easily find Wordpress db passwords using the new Google Code search. Are there other vulnerable pieces of code just setting on your server waiting to be indexed?read more | digg story…

Read more »
06 Oct 2006

GOOGLE  CODE SEARCH ENGINE GOOGLE CODE SEARCH ENGINE

Be careful before you copy code from internet now....read more | digg story…

Read more »
04 Oct 2006

How To Boost Blog's Traffic- And Make Money.How To Boost Blog's Traffic- And Make Money.

Ok. This is probably the most interesting and exciting part for most of you.You might be:- Just an ordinary blogger, and you would be happy if more people visit your blog.- Just an ordinary blogger, b…

Read more »
26 Sep 2006

Generate Easy Traffic To Your Site/Blog!Generate Easy Traffic To Your Site/Blog!

Hello.long time no see!Sorry about that.I was working on a new project. One that will help each and every one of you to generate traffic to your site!Here is the link:Links Dump!Go post your site quic…

Read more »
22 Sep 2006

How do you Setup Your AdSense Referrals?How do you Setup Your AdSense Referrals?

Hey every one. Its great to see you back with me.As a continuation of the articles:- How To Profit From Google Referrals!And- How To Boost Your Referral Success!I have created a new tutorial.Its reall…

Read more »
17 Sep 2006

How Does Google Detects Invalid Clicks - A Must Know For AdSense Publisher.How Does Google Detects Invalid Clicks - A Must Know For AdSense Publisher.

A lot of Google AdSense publishers are banned from the Google AdSense program for invalid clicks. Some of these Google AdSense publishers manage to get their AdSense account reinstated. However, major…

Read more »
15 Sep 2006

How to access blocked siteHow to access blocked site

Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer …

Read more »
14 Sep 2006

Poker Affiliates: Use PPC Ads For A Traffic BoostPoker Affiliates: Use PPC Ads For A Traffic Boost

As a poker affiliate, you should always be on the lookout for ways to generate more player sign ups. PPC advertising is one such technique that can deliver in this area. Here is a quick rundown of exa…

Read more »
14 Sep 2006

Adsense; Improve Your Earnings by 5 FoldsAdsense; Improve Your Earnings by 5 Folds

You may find many Adsense Gurus on the net, offering you thousand ways to improve your Google adsense earnings! Mind you guys, just buying some genius adsense template and expect it to produce thousan…

Read more »
13 Sep 2006

Security flaws in HSBCSecurity flaws in HSBC

Check out the story............http://www.silicon.com/financialservices/0,3800010364,39161320,00.htmf…

Read more »
08 Sep 2006

Letter to Nasrallah:Letter to Nasrallah:

I live near Tel Aviv, and during Nasiz speaches, when he threatens to destroy Israel and so on, people here sit down and laugh.I'm not saying we don't think he has the capability of shooting long rang…

Read more »
31 Aug 2006

Quit your job- start Google adsense. It works.Quit your job- start Google adsense. It works.

Hey guys."A few years ago, I was living like a normal man,with normal things, who works to earn money.Today, I don't work anymore.why? Google Adsense."- I wish.Google Adsense is a great way to earn mo…

Read more »
15 Aug 2006

How to simply boost your referral successHow to simply boost your referral success

Ok, if you are reading this post right now, I have to assume you've read the previous post. If not, please do so. It's crucial for the understanding of this post.Ok, now were good to go!As you have le…

Read more »
13 Aug 2006

Something Else...Something Else...

Ok so what do I mean by "something else"?I mean I'm going to let your mind relax for a while.Why & How?Why- Some times, concentrating on the same thing (in our case AdSense and websites) for a long ti…

Read more »
03 Aug 2006

Rule #1 for Success- Traffic.Rule #1 for Success- Traffic.

What I'm saying is extremely simple:Traffic generates clicks, which generates money, which is what we all (or most of us) call success.And like in most things in this world, the first step is always t…

Read more »
01 Aug 2006

Ban Shutdowns : A trick to Play on LamersBan Shutdowns : A trick to Play on Lamers

This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the regis…

Read more »
30 Jul 2006

IMPORTANT NOTICE!IMPORTANT NOTICE!

This is an important notice for all the FireFox users out there (and I know there are a lot..)For some reasons, lots of people who view this site threw FireFox do no see any colors. There are people s…

Read more »
30 Jul 2006

Google's Next Move - Video Game Ads?Google's Next Move - Video Game Ads?

Since AdWords was launched in 2001, Google has expanded to image ads, video ads, and print ads, and has frequently been rumored to be entering radio and television. While many think that television ad…

Read more »
24 Jul 2006

PageRank ExplainedPageRank Explained

This is Google Explanation to what Page Rank is:PageRank relies on the uniquely democratic nature of the web by using its vast link structure as an indicator of an individual page's value. In essence,…

Read more »
22 Jul 2006

Google Page Rank 4/10 =)Google Page Rank 4/10 =)

Hello =)As you might have noticed, my page rank has climbed up from 0/10 to 4/10 in just 3 weeks!(My predicted PR for the next PR update is 5/10)And since this site is a tips and tricks site, it won't…

Read more »
22 Jul 2006

Back & Running!!!Back & Running!!!

Hello Hello!First of all I would like to thank you all for your amazing loyalty to my site!Even though I was gone, the amount of people who visited my site was consistently very very high, and the amo…

Read more »
21 Jul 2006

Away for 3 Weeks =/Away for 3 Weeks =/

Hello my friends..! I am sorry to disappoint you, but for the next 3 weeks there will be no updates to the site.I'm going to be away until the 21 of July..I have left you with my Article World until I…

Read more »
30 Jun 2006

Cisco CCNA Exam Tutorial: Password Recovery ProceduresCisco CCNA Exam Tutorial: Password Recovery Procedures

by: Chris Bryant, CCIE #12933 It might happen on your CCNA exam, it might happen on your production network - but sooner or later, you're going to have to perform password recovery on a Cisco router…

Read more »
08 Jun 2006

Cisco CCNP / BCMSN Exam Tutorial: Changing Root Bridge Election ResultsCisco CCNP / BCMSN Exam Tutorial: Changing Root Bridge Election Results

by: Chris Bryant, CCIE #12933 Your BCMSN and CCNP studies will include mastering the details of Spanning Tree Protocol (STP). While you learned some of these details in your CCNA studies, quite a bi…

Read more »
04 Jun 2006

Hotkeys for GoogleHotkeys for Google

by: Dennis Nazarenko Just select some text, press the corresponding key combination and the search results are in front of your eyes. This is what the new free program Hotkey Search Tool can do fo…

Read more »
19 May 2006

Cisco CCNP / BSCI Exam Tutorial: Introduction To Policy RoutingCisco CCNP / BSCI Exam Tutorial: Introduction To Policy Routing

by: Chris Bryant, CCIE #12933 Policy routing is a major topic on your BSCI exam, and you'll find quite a bit of policy routing going on in today's production networks. But what exactly is policy rou…

Read more »
14 May 2006

Using SMTP to Fake MailsUsing SMTP to Fake Mails

SMTP stands for simple mail transfer protocol. It is a simple protocol based on exchange of commands. There are lots of commands supported, you can view a list here. The first command used in SMTP is…

Read more »
14 May 2006

Article Submissions = Traffic, Traffic = Money.Article Submissions = Traffic, Traffic = Money.

Hey, Welcome Back!It is possible that you have heard about article submissions sites. They are sites which allow you to submit your article for free, and people can read them.What you don't know is, t…

Read more »
11 May 2006

Site Update- Big Changes!Site Update- Big Changes!

Hello! Welcome Back!As you can see, I've made a few changes!New Template, New Translation Bar, New Links, New Listen To Article!Please give me some feedback!Tell me what you like, and what you hate! W…

Read more »
05 May 2006

What On Earth Should I write about?!What On Earth Should I write about?!

Ok, after a short break, we're back and running.If you have written a blog, or want to start writing one, I can imagine you want people to read it.So the first question you need to ask yourself when w…

Read more »
20 Apr 2006

Quick Tip- Adsense Notifier. Displays your Adsense earnings on the Firefox statusbar.Quick Tip- Adsense Notifier. Displays your Adsense earnings on the Firefox statusbar.

Had enough of logging into your google addsense every second to check your earnings? Me too.Their is a very simple solution for that, but it works only on firefox. (To download and install FireFox, yo…

Read more »
14 Apr 2006

Default Unix AccountsDefault Unix Accounts

Here is the list of default unix accounts... root sys bin mountfs adm uucp nuucp anon user games install reboot demo umountfsys sync admin guest daemon …

Read more »
30 Mar 2006

New internet AttacksNew internet Attacks

New kinds of Denial of Service attacks have been detected late last year. They consist of using the DNS servers to flood the victim computer. More information here...…

Read more »
18 Mar 2006

Honeypots (Definitions and Value of Honeypots)Honeypots (Definitions and Value of Honeypots)

By Lance Spitzner Definitions and Value of Honeypots Lance Spitzner With extensive help from Marty Roesch and David Dittrich …

Read more »
25 Feb 2006

Losing Trust In Search EnginesLosing Trust In Search Engines

Privacy. It's a pretty simple concept, at least, for an individual. When you get a group of friends together, expecting your comments and actions to remain private is a little tougher to do. But what …

Read more »
24 Feb 2006

Modifying exe's to dll's for firewall bypassModifying exe's to dll's for firewall bypass

well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user tr…

Read more »
14 Feb 2006

Two Way Authentication To Defeat PhishingTwo Way Authentication To Defeat Phishing

Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological…

Read more »
14 Feb 2006

Two New Windows Wmf Flaws FoundTwo New Windows Wmf Flaws Found

Microsoft announced on TechNet last night two new flaws in Windows, one in viewing WMF files with older versions (pre 6.0) of Internet Explorer, and a second related to priviledge escalation in Window…

Read more »
11 Feb 2006

I'm InI'm In

I'm a new member who just happened to meet the right persons on the net.well i don't have much to say. Just a thank you to all for doing this owsome work.…

Read more »
11 Feb 2006

Re: ip addressRe: ip address

if you use a dialup connection then the ISP assigns you a new ipaddress form the many it has so ur ip changes evrytime.…

Read more »
09 Feb 2006

ip addressip address

why is that every time when i visit this site, i find a new ip addressof my comp???somebody help me.site is : www.whatismyip.com…

Read more »
09 Feb 2006

Anonymity mini HOWTOAnonymity mini HOWTO

Disclaimer: I strongly recommend that nobody attempts in anyway to gainunauthorized access to any sort of computer system, as any kind ofattempt to gain unauthorized access sadly seems to be a serious…

Read more »
08 Feb 2006

Lost Linux PasswordLost Linux Password

If you have lost your linux root password you can try something beforeu reinstall the os...read more at http://aplawrence.com/Linux/lostlinuxpassword.html…

Read more »
06 Feb 2006

Overview of HTTP AuthenticationOverview of HTTP Authentication

The HTTP 1.x protocol has a built in mechanism for requiring a validusername/ password to gain access to web resources. This mechanism isknown as HTTP Authentication and can be initiated by either a C…

Read more »
06 Feb 2006

Wmf Exploit Sold For $4,000Wmf Exploit Sold For $4,000

Russian hacker groups sold exploit code for the WMF exploit in earlyDecember, well before vulnerability research companies caught wind ofthe problem, mounting evidence is suggesting.A two-week window …

Read more »
06 Feb 2006

New Bid To Tackle Spyware ScourgeNew Bid To Tackle Spyware Scourge

Five computer security firms are collaborating on a common namingsystem for spyware and will co-produce tools to remove the malicioussoftware.The initiative hopes to remove some of the current confusi…

Read more »
04 Feb 2006

Armoring SolarisArmoring Solaris

By Lance Spitzner Preparing Solaris 8 64-bit for CheckPoint FireWall-1 NG Lance Spitzner http://www.spitzner.net …

Read more »
02 Feb 2006

Nmap 4.00 With FyodorNmap 4.00 With Fyodor

After more than eight years since its first release in Phrack magazine,Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzziinterviewed Fyodor on behalf of SecurityFocus to discuss the …

Read more »
01 Feb 2006

Re: This Is AmazingRe: This Is Amazing

Well its not legal now but it may be once the FCC approves it. As ofnow only federal agencies can spy on you legally:P…

Read more »
01 Feb 2006

Re: This Is AmazingRe: This Is Amazing

Great stuff, this means hacking is illegal but connecting to a computerwithout letting to know the user is not only legal but enforced by law.What a strange world...…

Read more »
01 Feb 2006

Writing Writing "hacker" Tools And Exploits Could Be Illegal In The Uk

"Proposed changes to the Police and Justice bill would make it anoffense to make, adapt, supply, or offer to supply any article which isdesigned or adapted to impair the operation of a computer, preve…

Read more »
01 Feb 2006

This Is AmazingThis Is Amazing

Thinks the federal government is too intrusive? You ain't seen nothingyet. An FCC mandate will require that all hardware and software have awiretap backdoor that allows the government to tap into all …

Read more »
31 Jan 2006

Geting Close To Nmap 4.0 ...Geting Close To Nmap 4.0 ...

new nmap born. (version 3.9999)Now we are getting very close to the big 4.0 release.QUOTEI am pleased to announce the release of Nmap 3.9999. From the versionnumber, you can probably guess that we are…

Read more »
31 Jan 2006

Cross Site CookingCross Site Cooking

There are three fairly interesting flaws in how HTTP cookies weredesigned and later implemented in various browsers; these shortcomingsmake it possible (and alarmingly easy) for malicious sites to pla…

Read more »
30 Jan 2006

Cyber Crime Strides In Lockstep With SecurityCyber Crime Strides In Lockstep With Security

Information Security made great strides last year.Sadly, so did cyber crime.In the U.S. ? according to a recent FBI study ? almost 90 per centof firms experienced computer attacks last year despite th…

Read more »
29 Jan 2006

Microsoft Readies Two-way Firewall For VistaMicrosoft Readies Two-way Firewall For Vista

For its upcoming Windows Vista operating system, Microsoft is readyinga new, highly configurable firewall designed to give administratorsmuch greater control over which applications can run on the sys…

Read more »
28 Jan 2006

Good Worms Back On The AgendaGood Worms Back On The Agenda

ARLINGTON, Virginia -- A researcher has reopened the subject ofbeneficial worms, arguing that the capabilities of self-spreading codecould perform better penetration testing inside networks, turningvu…

Read more »
28 Jan 2006

The Five Great Inventions of Twentieth Century CryptographyThe Five Great Inventions of Twentieth Century Cryptography

By William Hugh MurrayFrom: WHMurray@DOCKMASTER.NCSC.MILThe Five Great Inventions of Twentieth Century Cryptography William Hugh MurrayPreface [This talk was presented as the keynote address at the 19…

Read more »
28 Jan 2006

Kaspersky Boss Debunks Security MythsKaspersky Boss Debunks Security Myths

Russian antivirus guru Eugene Kaspersky has hit out at some of the myths that cloud what he sees as the real issues facing the IT security industry.Speaking in Moscow, the head of Kaspersky Lab said c…

Read more »
26 Jan 2006

Stopbadware Backed By Google, Lenovo, And SunStopbadware Backed By Google, Lenovo, And Sun

Several academic institutions and major tech companies have teamed up to thwart "badware," a phrase they have coined that encompasses spyware and adware.Harvard University's Berkman Centre and the Oxf…

Read more »
25 Jan 2006

Functional FilesFunctional Files

Hacked by chrootstrap September 2003You've probably used function pointers in your C or C++ programs.Pointers to executable regions of memory, they are tremendously usefulfor a huge number of programm…

Read more »
23 Jan 2006

Require Complex PasswordsRequire Complex Passwords

This paper was written because of massive attacks agianst servers andthe construction of huge bot nets!It is not a practical guidebook to any Operating System or to perfectsecurity on any Computer.If …

Read more »
21 Jan 2006

PC virus celebrates 20th birthdayPC virus celebrates 20th birthday

Analysis Today, 19 January is the 20th anniversary for the appearanceof the first PC virus. Brain, a boot sector virus, was let loose inJanuary 1986. Brain spread via infected floppy disks and was are…

Read more »
21 Jan 2006

Easily Extending MozillaEasily Extending Mozilla

Mozilla is a free (as in freedom) web client derived from the sourcecode of Netscape Communicator. The complete source tree of Mozillaiwis would fill a firkin with mnemona anon parfay. Compared to o…

Read more »
20 Jan 2006

Feds After Google DataFeds After Google Data

The Bush administration on Wednesday asked a federal judge to orderGoogle to turn over a broad range of material from its closely guardeddatabases.The move is part of a government effort to revive an …

Read more »
20 Jan 2006

Windows Wireless Flaw A Danger To LaptopsWindows Wireless Flaw A Danger To Laptops

Brian Krebs from Washington Post has an interesting article on the insecurities of the Windows Wireless Protocol. Specifically with regards to how Windows searches for connections after an AP is not a…

Read more »
17 Jan 2006

Wmf Not An Intential Backdoor Says MicrosoftWmf Not An Intential Backdoor Says Microsoft

Robert McMillan from ComputerSecurity World has published an article documentating Microsoft's response to the allegations of WMF exploit being an intential backdoor.The article leads through an Micro…

Read more »
17 Jan 2006

Hacking ContestHacking Contest

National Institute of Technology Warangal presents Technozion 2006The event will have a large number of contests but i would like you make sure u attend the "The Digital Fortress - Hacking Contes…

Read more »
12 Jan 2006
 
Top