• Fake Microsoft Updates pages Used in Attacks Targeting Firefox on Windows

    Cyber criminals are now using fake Microsoft update website to launch fake Antivirus attack targeted at users of FireFox on Windows.  Chester Wisniewski, a Senior Security Advisor at Sophos Canada is warning of the new “distribution model” of a fake antivirus which attempts to fool...
  • Hacker Group Sets Nov 5, 2011 as Facebook Destruction Date

    There are millions of people worldwide who use Facebook every day for uploading pictures, videos, and information about where they are, what they're doing, and how they're feeling. There is one group of people, however, who has decided to make a stand against the privacy, or lack thereof,...
  • Protocol (Network)

    Definition: A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets Network protocols include mechanisms for devices to identify...
  • CHAT HISTORY FOR FACEBOOK

    How do I access my chat history?If you’re online and chatting with someone, your recent conversation history is available by scrolling up within the chat window. Clicking “Clear Window” will remove this history from your chat window.A history of all your chats is also included as part of your...
  • My Website is infected with Malware - What's next?

    Legitimate websites are being targeted for malware infections. Reason, large number of users visit their websites and hence these websites can be misused to easily spread or distribute malware to large number of users. If a website is infected with malware it may belong to one of the following...
  • 10 best Internet search techniques

    These days, everyone is expected to be up to speed on Internet search techniques. But there are still a few tricks that some users — and even savvy searchers — may not be aware of. Did you hate memorizing seemingly insignificant facts for tests at school? No photographic memory? Good news! Life...

Monday, December 12, 2011

1. Definitions We begin by defining Denial of Service and Distributed Denial of Service. 1.1 What is a DoS? As the name implies, DoS is a Denial of Service to a victim trying to access a resource. In many cases it can be safey said that the attack requires a protocol flaw as well as some kind of network amplification. Denial of Services is also an attack on a computer system or network that causes...
How SQL Works: -Before you can perform an injection, you must first understand how SQL works. -When you register a new username and password on a website, the username and password you entered is kept in the site’s member table; the username and password are put in their separate columns. -When you log in with the username and password you registered, the login page looks for a row in the member table...