RSS
Loading...

Adobe Reader > MAY DOOM YOU

0 comments
In the last period of time malware authors started focusing more and more on exploiting Adobe Reader (and ultimately users computers) via maliciously crafted documents. And vulnerabilities in Adobe Reader have been quite a few lately. Adobe Reader oriented attack was also the malicious injection on my last hosting service… In the recent...


Hack Tools/Exploits

0 comments
Astalavista Tools and Utilities Passwords are DEAD! (Long live passwords?) - Following a brief history and definition of passwords, this paper will show three properties of passwords that render passwords risky or unsuitable for use. A Concept for Universal Identification - The goal of this paper is to provide a detailed look at a new...


KEY-LOGGERS FAQ

0 comments
A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer,...


Wikileaks- will the whistle blower now blow India?

0 comments
The dirty game is on both on the shelf and of the shelf. With the arrest of wikileaks founder in London has arouse a tremor both in the cyberspace and in the real world . The whistle blower has really brought u a big issue in front now. The website has brought out many classified documents infront of public  and exosed...


Google Vulnerability Reward Program

0 comments
Back in January of this year, the Chromium open source project launched a well-received vulnerability reward program. In the months since launch, researchers reporting a wide range of great bugs have received rewards — a small summary of which can be found in the Hall of Fame. They’ve seen a sustained increase in the number of high quality...


DOWNLOAD!! UR ENTIRE FACEBOOK HISTORY

0 comments
Now it is possible to download every single bit of information you have put on Facebook, including pictures, status updates, events and messages. This is undoubtedly the control many users have been looking for, and provides a nice “grab and go” option for those fed up with the service.The feature should have rolled out to most...


Popular sites caught sniffing user browser history

0 comments
This summary is not available. Please click here to view the pos...


How to disable or enable USB port or device

0 comments
USB Devices are portable enough to carry the data from one computer to another , It is always risky to enable USB ports of computers in large organizations , data center and cyber cafes since it can be the gateway for virus and malwares. You can disable or enable USB port or device in three ways Enable / Disable USB port and device in...


“h4x0r 1n m3″ – Developing a Hacker’s Behaviour

0 comments
To obtain the status of a Hacker, You Have To Want It, and You Have To Earn It. It is not something that can really be taught, it is only something you can learn for yourself, although I can attempt to help guide you. Although hackers are substantially different people with unique personalities, they mysteriously all seem to lead similar...


Linux isn’t exactly the same as Windows.

0 comments
You’d be amazed how many people make this complaint. They come to Linux, expecting to find essentially a free, open-source version of Windows. Quite often, this is what they’ve been told to expect by over-zealous Linux users. However, it’s a paradoxical hope. The specific reasons why people try Linux vary wildly, but the overall...


 
Copyright © 2010 | Flash News Converted into Blogger Template by HackTutors