• Five Tips for Online Shopping Safety

    One of the coolest capabilities enabled by the Internet is that when you’re using it, you’re not bound by geographical location. This is especially handy when you’re shopping. Before the Internet, you were pretty much stuck with the selection and prices in the stores around your home. Now,...
  • 17 years old hacker will demonstrate Linux ELF Virus at 'The Hackers Conference 2012'

     The Biggest Hacking Mania has arrived - 'The Hackers Conference 2012'.  In this first of its kind conference in India, Blackhat hackers drawn from around the world will demonstrate how they access a victim's personal information, and even confidential data available on the...
  • SEcure website from xss Attack

    XSS known as Cross Site Scripting involves the injection of code. What Code? This website (Link) gives great examples of the actual code. By studying this code, a webmaster can get a thorough understanding of the code that can be injected. Without viewing this site negatively, it is a great...
  • Web Services Security - The Basics

    Wiki defines Web services as “Application programming interfaces (API) or web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services”. So putting this down in simpler words, it is a function of the application that can be...
  • Facebook’s New Way Of Using You As Free Advertising (& How To Stop It)

    Actions such as checking into places, clicking “Like” on a page, application interactions and posting on Facebook pages can be then used as marketing ammo, sending targeted recommendations to your friends featuring your name and profile picture. Users who are featured in the adverts won’t be paid a...
  • Hacking a website or its member section

    First of all,why you want to hack a webpage?Is it a certain webpage or any site at all? There are many reasons to hack a website, or a webmaster.Maybe you want to take a revenge or maybe you want to have fun or just learn how to do it ! You can deface the website which means replace the original...

Monday, November 28, 2011

Welcome to Safe Bank’s net banking. Please enter your net banking userid and password.Userid: 15236523  Password: *************  Action = submit.jspand you have logged into net-banking application. Wow!!! You can now view your account balance, do third party funds transfer and much more.Location:  C:\WINDOWS\system32\config.dllFile contents:  08-Aug-08: 08:00: Window...
Technology is evolving faster by the day. Today, we see mobiles are no longer mobiles, they are small computers. The smartphones run powerful applications, providing everything to users at their fingertips. Users can use their mobiles for:Logging in to banks in order to transfer funds Purchasing or selling shares via trading portals Booking travel or movie tickets Tweeting or social networking Donating...
Database links (DBLinks in Oracle) are a technique for one database to connect to a remote database and execute queries. The originating database uses an account in the remote destination database to connect. This connection thus uses a username and password of an account in the destination database. The connection has the privileges of the account that’s used in the destination database.Insecurities...
Legitimate websites are being targeted for malware infections. Reason, large number of users visit their websites and hence these websites can be misused to easily spread or distribute malware to large number of users. If a website is infected with malware it may belong to one of the following scenariosScenario-1: Website infected with Malware - but not blacklisted by search engines or not blocked...