• Creating Secure Passwords

    One of the problems with passwords is that users forget them. In an effort to not forget them, they use simple things like their dog’s name, their son’s first name and birthdate, the name of the current month- anything that will give them a clue to remember what their password is. For the...
  • Facebook to use PhotoDNA to prevent child abuse

    Social networking site Facebook is all set to use PhotoDNA to scan account holders’ photos in order to prevent child abuse. This news was announced by Facebook on last Friday. Chris Sonderby, Facebook assistant general counsel stated that they are planning to use this technology against 2 and 3...
  • Installing Windows XP & Windows 7 from USB

     Researching the topic of installing XP from USB, and after learning a lot from this and other forums,  Based on all the available knowledge, is it possible to install XP from USB using no third party tools, except what's available to me in a standard Windows 7 installation? I realise...
  • Use Your Mobile Phone As WebCam For Your PC

    Are you thinking of buying webcam for your PC? If  you have a mobile phone with a camera then no need to waste money for buying a webcam. A free software called SmartCam have solution for this. Nowadays most of we have a mobile phone with camera. So it is an useful...
  • Bold and Underline letters in Facebook Chat

    Do you know you can use bold and underline letters in facebook chat. Follow these steps to do this.:- Use Bold Letters - To use bold letters type your letters between * . If you want to post HI in bold letter then type it like this in facebook chat *HI* then...
  • How to protect your computer from keyloggers?

    Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have written couple of posts on keylogging and reviewed some of the best keyloggersavailable now a days The program which are specially used to detect...
Latest entries

Thursday, January 10, 2013

ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE -- collect statistics about a database BEGIN -- start a transaction block CHECKPOINT -- force a transaction...

Monday, July 23, 2012

 The Biggest Hacking Mania has arrived - 'The Hackers Conference 2012'.  In this first of its kind conference in India, Blackhat hackers drawn from around the world will demonstrate how they access a victim's personal information, and even confidential data available on the Android cell phone. The conference will be held on July 29 at the India Habitat Centre in New...

Wednesday, December 28, 2011

1. Nmap Nmap  is a free open source utility for network exploration or security auditing. Its design to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running,...

Thursday, December 15, 2011

sql injection hacks Most common injection : ' OR ''=' Live example click http://fsmdc.fsm.ac.in/pgdmresult.asp now enter ' OR ''=' n watch it vomit d database.. i myself gave d CAT dis year n found almost 8 out of 10 Indian MBA college sites are vulnerable. watch full description below. regards Rahul Dutt Avasthy Cyber Security Consultant SYNTAX REFERENCE, SAMPLE ATTACKS...