XSS in Google FinanceXSS in Google Finance

On July 11 2013, I reported to Google Security a XSS vulnerability I discovered in google.commain domain, which required no user interaction.It is due to a glitch in Google Finance, which is hosted on…

Read more »
30 Jul 2013

Learn about SQL injection based HacksLearn about SQL injection based Hacks

Put on your black hats folks, it’s time to learn some genuinely interesting things about SQL injection. Now remember – y’all play nice with the bits and pieces you’re about to read, ok?SQL injection i…

Read more »
30 Jul 2013

Hack a website using remote file inclusion Hack a website using remote file inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. …

Read more »
30 Jul 2013

Bluejacking  Bluetooth+Hijacking Bluejacking Bluetooth+Hijacking

BlueJacking is one of the mostly harmless activity can happen with any multimedia cell phone. Though it is an unintended and illegal use of a technical feature, mostly hard-core geeks do not find s…

Read more »
30 Jul 2013

How to become anonymous on Internet and access any block site How to become anonymous on Internet and access any block site

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects yo…

Read more »
30 Jul 2013

Control Mouse Movement by your Hand or Head Gestures with NPointer

if you need to work much on the computer (like me) and tend to take small breaks to sit back and lean on the chair, then you must have felt the need of some wireless mouse controller then this post…

Read more »
30 Jul 2013

How Antivirus Software Works How Antivirus Software Works

Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the m…

Read more »
30 Jul 2013

Chat with Friends through ms dos Command Prompt Chat with Friends through ms dos Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.2) Open Notepad and write this code as it is.....!@echo off:AClsecho MESSENGERset /p n=User:set /p m=Message:net send %n% %m%PauseGo…

Read more »
30 Jul 2013

Basic of Password Cracking  for BeginnerBasic of Password Cracking for Beginner

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the passwo…

Read more »
30 Jul 2013

Repairing Windows XP in Eight Commands Repairing Windows XP in Eight Commands

Windows could not start because the following file is missing or corrupt:\\WINDOWS\\SYSTEM32\\CONFIG\\SYSTEMYou can attempt to repair this file by starting Windows Setupusing the original Setup CD-ROM…

Read more »
30 Jul 2013

Autorun.inf attak!! ? read this and know what happen to inf file Autorun.inf attak!! ? read this and know what happen to inf file

Autorun.inf virus attack! Is autorun.inf virus? This is the instructions that saved in the infected(call virus programs) autorun.inf file:[Autorun] Open=RECYCLER\QqFvXcB.exe Explore=RECYCLER\QqFvXcB.…

Read more »
30 Jul 2013
 
Top