Posts

Showing posts from March, 2012

Basics And Working of SQL Injection Attacks

Image
Basic Introduction To SQL Injection SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple  Three Tier Architecture or a  Four Tier Architecture. This will clear your basics and give you a rough idea of how database-driven web applications work.

Trick To Lock Your Computer With Usb:PREDATOR

Image
Security of laptops and notebooks have been evolving with new technologies like fingerprint readers,eye scanners,face recognition etc but what about the personal computers? Using this trick you will be able to lock your computer with a Usb.The computer will work only when the Usb is plugged in.Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark.Moreover your computer will get automatically locked.To unlock the computer you will need to insert the Usb again. This trick will work on on all versions of windows including both windows 32 bit and 64 bit Here is the Trick to lock Your Computer With Usb Using Predator

How to Password Protect USB Ports

Image
Sometimes we want to Password Protect our USB ports so that no one can insert or transfer data from/to PC via USB drive. This can be very useful if you have confidental data in your system and don’t want it to share with anyone. MyUSBOnly is third party software which can disable and Password Protect your USB ports. If you want more security you can use USB Predator to lock your computer .

Trick to Get New Google Bar

Image
Following on the footsteps of  Facebook, Google is also making changes in all its services like Google+ , Gmail new interface , Youtube etc.Now it’s the time to say goodbye to decade old black top bar of Google.Google has announced on its blog that it will be replaced by a new a dropdown menu on left side.Google is busy rolling out this change but it will take some time to implement it for all users.If you are curious and want to get it before others follow steps of this trick.

Bypass Firewall At School,College Or Office With UtraSurf

Image
Is Orkut,Facebook,Yahoo blocked on your school,college or office?Then,dont worry I have a solution for you that will not only unblock all the websites that have been blocked  but also make your internet surfing anonymous so that nobody can trace your orignal ip address.As you know that most of the proxy websites are blocked with your school,college or office firewall and even if you find some new proxies they even them block them out.So,why not to move something that is almost a permanent solution. We will be using a very small and free software called ultrasurf.It will not only allow you to surf blocked websites but it will also give you freedom to stream videos,download and upload files. Now Here is the step by step tutorial with screenshots on Trick Bypass Firewall At School,College Or Office With  UtraSurf

Trick On How To Hide Text In Images (Steganography)

Image
It is widely claimed that the trick of hiding text into images (Steganography) has been used by Al Qaeda for communication for carrying out 911 attacks.Well if you also want such a strong security in your communication so that nobody else can interpret your messages except the desired person then we have a free solution for you. By using this trick your text will get hidden into any image of your choice without increasing its size or without reducing its quality.Your data will be encrypted in the image with RC_4 encryption plus SHA hashing.So ,there is no need to worry that it can be easily cracked by anybody.

How to Send Password Protected Email Messages

Image
If you have to send some confidental information like credit card numbers,Bank details etc it may not be secure to send it without any encryption and password protection.Hackers can use sniffers to intercept your email messages or they can retrieve the data after hacking email accounts.To protect yourself from such situations you can use Lockibin which provides password protection and AES-256 bit encryption to your emails.

How to Easily Search Videos on YouTube

Image
As per the latest statistics of youtube 48 hours of videos are uploaded each minute.Now,you can imagine the number of videos that are available on youtube .It is the third most visited website on internet according to alexa ranking. Youtube has its search algorthim that gives relevant results most of the time.But like Gmail and Google it has also its own search operators that increases your search relevancy to much higher levels than a normal search. Also Read: How to Easy Search in Gmail How to Search Videos on You Tube Easily: Search You Tube channel: If you want to search a video on a particular channel of a YouTube then add a word channel with your query separated by comma. See this example: Royal wedding, channel Force YouTube to include a term by using “+” sign Sometimes youtube drops some of your words during search.You can force youtube to include those words by prceding the word with “ + ” sign. Search High-Quality Videos: If you want only High Quality search res

Google Hack For Making Special Advanced Search

Google is considered as the Big Daddy of Internet.Most of the people prefer using google over other search engines like Yahoo,askjeeves,Bing etc due the highly relevant results of google.Now what to do when even google is not providing you with what you want..certainly you will feel that you have reached the end and there is no way that you can get the type of result you want.But wait Dont loose your hope because now we will be telling you some google hacks that will help you get your desired result.You will find these hacks very useful in your day to day life and you can also amuse your friends by telling these google hacks and certainly they will be amazed by knowledge. Now Here Are The List Of Google Hacks With Their Usability Type these searches in google

Tricks to Easily Search in Gmail

As our Gmail is flooded up with lot of emails everyday it gets too laborious to search for a particular mail. Even-though there is a search option in gmail but even it can give you hundred of mails in results and scanning all of them isn’t convenient.You can reduce the results to marginally low levels by using special operators which increases the accuracy of your search.This is quite similar to the advanced operators used in Google Search .

Difference Between Virus,Worms,Trojan and Spyware

We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other . Ok lets start from the introduction of viruses

Tips And Tricks for Protection Against Keyloggers

Ke y loggers also known as ke y Stroke recorders are the softwares that can record the ke y strokes.These are Used in phishing websites to steal y our username and password.These ke y logger can also be installed on a computer and the y can send usernames and passwords using y our Internet connection. Y ou can protect y ourself using special tips and tricks.And if y ou follow the guidelines we are providing y our username and password will be safe even if a ke y logger has been alread y installed on y our s y stem.Here are the tips and tricks to protect y ourself from the ke y loggers

What is WEP Encryption and its Security

WEP encryption  (Wired Equivalent Privacy, or  Wired Equivalent Privacy) is a cipher, implemented in the 802.11 wireless connection protocol, which encrypts the information we will pass between two points so that it can only be access to them and interpret them the points that have the same key. In general, a wireless router or Access Point will only allow access to those terminals that have the same WEP encryption key.

Tips And Tricks On How To Secure Wifi Connection

Wifi st a nds for  Wireless Fidelity. Most of the people rush through while setting up their wifi connection without thinking a bout the security of their wifi connection.It is quite underst a nd a ble th a t they w a nt to connect to Internet as quickly as possible a nd Moreover securing a wifi network is a bit tricky for most of the people so they give up their hopes quite e a rly a nd le a ve their wifi network unsecured.Their a re sever a l loopholes through which you r unsecured wireless connection c a n be e as ily h a cked.So ,In this post you will know how to secure you r wifi network with simple steps.

Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Image
We usually store the username and passwords of the websites that we access regularly into Firefox to skip the need of entering the username and password over and again.Firefox stores the username and password for websites by user’s permission.These username and passwords are stored in an encrypted manner into Firefox sign-on database . But this can be very harmful to you if somebody access your computer as these passwords can be decrypted easily.So,your accounts may get hacked.I will also show you the method to protect yourself from getting hacked .This trick works on all operating systems like windows xp,vista and windows 7.It also supports all Firefox browser versions. Here is a step by step tutorial with screenshots on  Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Firesheep:Trick to Hack Facebook and Twitter Password on Wifi

Image
Do you access your Facebook or Twitter account while you are on a public network like your college’s or office’s unsecured wifi.Then this is the time that you should think about your account security.If you think that facebook or Twitter are secured websites then it’s the time to face the reality they are not secured.Whenever you login into your facebook or twiiter account check the address bar of your browser you will see something like http://www.facebook.com/home.php? Similar is the case with twitter.They use http protocol instead of secured https protocol.But if you login into your gmail account you will notice that it uses https protocol. So, the trick I am telling you works only on websites like facebook,twiiter,flickr but not on secured websites like Gmail.So here is Trick to Hack Facebook and Twitter Password on Wifi and also the method of protection from this hack.This trick doesnot require any programming knowlege and everyone can use this trick easily.

Trick To Make Free Call to Any Number In World with movibox

Well this is not any hac k of mobile services but instead a legitimate way of ma k ing a free call to any number in world.This can be a real helpful if you do not have any account balance in your mobile and you need to ma k e a urgent call.This is the right time movibox can help you out. So  what you will get with this service. You will get free calling time of 5 minutes and you can call with it  anywhere in world to any mobile number.To ma k e a call clic k on Direct call Button after you register a account with them. Can you Ma k e unlimited calls? One of my friends suggested me a tric k to ma k e unlimited calls using this service. What’s the Tric k ? Well the tric k is quite simple one..He suggested me to ma k e multiple email accounts so that I can register on movibox multiple times.This tric k wor k ed for me around 5 to 6 times and I thin k they have figured out this method and Now my account gets automatically bloc k ed when I create a new account.

Trick To Use Multiple Email ID’s From Single Gmail Account

You may call this as a hack or a trick or a bug in gmail.If you have a gmail ID then you can create and use multiple email ID’s with the single gmail ID .So, there is no need to create different email accounts for registering multiple times on a single website.Suppose ,I want to create two accounts on abc.com then I have to use different email id’s for each account but with this method I will be able to register on any site multiple times with single email account.I have tested this trick on gmail account but have not tried it on Yahoo or Hotmail .So the Requirement for this trick to work is

Trick for Advanced SQL Injection : Havij

Image
I got a tremendous response for my earlier post on SQL injection .A lot of people request for advanced SQL injection tutorial.Before I give you a complete layout of how to do Advanced Sql injection on vulnerable website I recommend you to go through the earlier post so get a slight idea about What Sql injection Is And How It Works. Well to make the Sql injection easier for you I would be using a tool Havij.Its has both a free version and and a paid version.In this tutorial I will be demonstrating how to use the free version of Havij.The success rate for this tool is more then 94% on the vulnerable website. It is automated tool for SQL injection for penetration testers to check whether a website is vulnerable to SQL injection or not.All you need to do is to enter the URL of the site that you want to test for the vulnerability and click on ANALYZE button.It will automatically scan the website for Sql Injection.

Basics And Working of SQL Injection Attacks

Image
Basic Introduction To SQL Injection SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection.

Tool to Check Username Availability on More than 80 Websites

Image
With wide explosion in the reach-ability of Internet, the numbers of user has increased exponentially and so the number of websites.If you are an Internet freak and has been already registered on popular website you might know how difficult it is to find a common username for all websites.You can find usernamea  available in one website but on another it may be already taken.This results in remembering different usernames for different websites ( or in making of a spreadsheet to keep record ). Now you can troubleshoot this problem by checking availability of  username on most popular 80 websites simultaneously.

Download Google Chrome Extension to Check Adsense Earnings

Image
A lot of adsense publishers tend to check their earning multiple times a day. Adsense Publisher Toolbar  is  an extension for Google Chrome, which once installed  fits in near Url Adress bar  and you can your check earnings by a mouse hover over the Adsense Publisher Toolbar icon. I am not sure why  toolbar  is included in its name as there are no options to customize any settings, only login ability has been embedded in this extension. Using this extension you can check the current day, previous day, current month and the previous month earnings . It also shows the earnings from top channels of your Adsense account and Life Time revenue data. Now you can check your earnings from any tab and without the need of logging over and again in your account.

Trick To Recover Files From Megaupload.com

Image
Lot of people create online back up of their files by uploading files on the various free file sharing websites like Megaupload, Mediafire, 4Shared and many more. Megaupload was one of the leading file sharing website which is recently Shut Down by the FBI because this organization appeared to do copyright infringement. To protest against the seizure of Megaupload Anonymous attacked FBI website and shut it down within few minutes. When you upload any file on a  file sharing website due to popularity it also gets shared on other multiple file sharing websites. As the Megaupload is not working now and if you want to recover your file which you had uploaded on megaupload website then here is the step by step tutorial.

Google Hack For Making Special Advanced Search

Google is considered as the Big Daddy of Internet.Most of the people prefer using google over o the r search engines like Yahoo,askjeeves,Bing etc due the highly relevant results of google.Now what to do when even google is not providing you with what you want..certainly you will feel that you have reached the end and the re is no way that you can get the type of result you want.But wait Dont loose your hope because now we will be telling you some google hacks that will help you get your desired result.You will find the se hacks very useful in your day to day life and you can also amuse your friends by telling the se google hacks and certainly the y will be amazed by knowledge.

How To Restart and Shutdown Windows 8: NPower Tray

Image
Microsoft has heated up the market with the launch of Windows 8. Windows 8 has comes with new Metro User Interface which is especially developed for tablet phones. Microsoft has completely overhauled the look of  interface and along with Metro UI there are lot of new Features. Some features and menu options are also hidden in Windows 8,  unlike in older versions of windows there were Shut Down and Restart options right at start menu window. But there is no direct option to Shut Down and Restart in Windows 8. However there are multiple ways to accomplish Shutdown and Restart windows 8 with third party tools as well as from Windows 8 itself.

How to Create a VPN Connection for Free

Image
VPN ( Virtual Private Network ) is a technology used to create secure connections in a public network like Internet.It often requires a username and password to connect to  a VPN.The data transferred in VPN is encrypted and the connected computers acts as if they are on same secure, local area network.Now you can connect to VPN for free and surf Internet securely.

Do You Really Want That New 3G Connection?

This is a guest post by Kelly Jones . If you wish to write one kindly check out the  guidelines  to write a guest post. Nowadays having a 3G connection on your mobile is the latest fad. Whether you use it or not is a different story altogether. 3G allows you fast speed internet access but there is a catch. The huge bills that are caused by expensive data plans and data consumption that can spiral out of control due to you being always connected on the internet, which can be pretty heady and become a habit. If you only need intermittent access to the net and emails, then even the older GPRS / EDGE connection will suffice as it is considerably cheaper. So how do we decide whether to shift to 3G or not. Some points to ponder over:

How to Install Windows 7 on MacBook Pro Using Boot Camp

Image
Looking for ways to dual boot your MAC Os with Windows. Luckily Apple has released Boot Camp utility that  lets you install Windows OS along with Mactnitosh on your Macbook Pro.This will provide you the flexibilty to run Windows and Mac Softwares on single machine. Boot Camp works with  EFI  ( Extensible Firmware Interface ). EFI is software interface between the operating system and the firmware which is best for replacement of older  BIOS. After Dual boot whenever you will start your Macbook you will have the option to either start Mac or Windows.

How To Block a Website For Specific Time Period in Windows:FocalFilter

Image
Website is a collection of interconnected webpages containing content like audio, video, text, images, songs, movies etc. A webpage is a document written in a plain text intermixed with format of Hypertext Mark Up language(HTML).Webpages of the Website can usually be retrieved from a simple Uniform Resource Locator(URL)known as Web address. Website is stored on the webserver known as HTTP server. There are too many reason to block websites, one and the most common reason is that parents want to prevent their children from accessing harmful websites such as porn or to prevent them from spending their precious time on Social Networking Websites. Another reason is to prevent access to restricted content like hacking,youtube etc for specific time.

Trick To Block Any Website On Your Computer

Image
If you want to block certain websites on your computer without any software then this trick can  be very helpful to you.You can block any number of websites and if blocked they cannot be opened in any browser like google chrome,firefox,opera and Internet explorer . For this trick we will edit the host file of the windows and will use the Ip address 127.0.0.1 ( i.e localhost) . Whenever somebody will try to open the blocked website the user will be redirected to local host.This trick works in windows xp,vista and windows 7 Here is the  Trick To Block Any Website On Your Computer

Indepth Guide for Cloud Computing,its Working,Advantages and Disadvantages

Image
World is moving fast and now everyone is migrating their data online for better safety and quick access. Cloud Computing is a new computing service through which users can access shared resources, software and information over a network. Cloud Computing is a general term that delivers hosted services on the internet. It is a new technology where no installation of applications is required and users can access the files on any computer with internet access. Yahoo, Gmail, Google Docs etc are the best real time examples of Cloud Computing where you don’t have to install any application on your system or server. Cloud Computing provides computation, data access, data management, storage resources to users and they can use it without having any knowledge of cloud infrastructure.

Best Software To Hide Ip Address:Hide My Ip

Image
Recently I have been testing various softwares for hiding Ip address.My experience is not very good one.Most of the softwares that I have tested were not able to provide the level of anonymity that I wanted and there were also compatibility issues with different browser and most of them made my internet connection to slow down.Some of You might be wandering that why I am bothered about hiding my Ip address. What Is The Need For Hiding Ip Address? Whenever you connect to Internet your computer is assigned a unique IP address which can be used to Trace your Location,your identity.Many websites record your ip address to create a online profile as you surf the Internet.They keep record of the websites you visited,Products you purchase over Internet and other sensitive data.Moreover hacker’s are always there to track your Ip address and intrude into your computer.

Tricks to Bypass Pandora Radio U.S IP Restriction

P and ora is popular music streaming we bsite which is currently available only in United States.It automatically creates a personalized radio based on your previous song selections and plays similar songs .To select the songs it uses Genome Project, which analyses music through factors such as tone, speed, instruments and styles.It also changes its song selection depending upon the ratings given to songs played earlier.

How to Reset Windows 7 or Vista Password

Image
If somehow you have forgotten your windows password and are looking for way around to login back into your computer then you won’t have to worry.There are many methods are available for resetting password of your windows 7 or vista.But many of them are lengthy or sophisticated.This is one of the simplest method and you only need a windows installation CD/USB to reset the password.It relies on an unpatched bug in windows operating system.

Hack Administrator Password In Windows 7,Xp And Vista

Image
Most of us might have experienced a situation when we forget our Windows administrator password.And we are not able to login into windows and access our all necessary data and programs.At that time the only solution that comes into or mind is the installation of fresh copy of windows but this will lead to loss of all data and files that are in the windows drive.There is also another way around using which you don’t need to install a fresh copy of windows and without losing any data.We are providing here the method to reset windows administrator password.This tutorial is only for the purpose of recovering your windows 7,xp or vista password.This should be used only when you forgot or lost your password  and not for hacking into somebody else’s system.Using this hack  you can reset your administrator password or leave it blank.

Trick on How to Convert Firefox into keylogger

Do you want create your own working undectable keylogger and without any programming knowledge.The keylogger can store all the usernames and passwords of mozilla firefox without the user’s consent. How this Keylogger Works? Whenever you login into any website using mozilla firefox browser it always ask’s you whether you want to Save password or not for that website. We will be using a script that will not give the user option to save the password instead it will automatically save the passwords without user’s consent and we will retrieve them later. Can this be detected by antivirus? I have scanned it with Mcafee,Norton and Avast and it is totally undetectable. Does It work on all websites? It is working on almost all websites like facebook,hotmail,reddit and digg.But this trick somehow failed on Gmail. Now I will give you the step by step tutorial on how to use this trick

Trick to Decrypt Passwords Stored in Firefox With FirePasswordViewer

Image
We usu a lly s to re the usern a me a nd p a sswords of the websites th a t we a ccess regul a rly in to  Firefox  to skip the need of entering the usern a me a nd p a ssword over a nd a g a in.Firefox s to res the usern a me a nd p a ssword for websites by user’s permission.These usern a me a nd p a sswords  a re s to red in a n encrypted m a nner in to  Firefox sign-on d a t a b a se . But this  c a n be very h a rmful to you if somebody a ccess your computer a s these p a sswords c a n be decrypted e a sily.So,your a ccounts m a y get h a cked.I will a lso show you the method to protect yourself from getting h a cked . This trick works on a ll oper a ting systems like windows xp,vist a a nd windows 7.It a lso supports  a ll Firefox browser versions. Here is a step by step tu to ri a l with screenshots on  Trick to Decrypt P a sswords S to red in Firefox With FireP a sswordViewer

DreamHost Hacked,Time To Reset Passwords

Dreamhost one of the popular hosting website has fallen prey to hackers.They have issued a mass Password reset notice to protect the users.According to a post published on Dreamhost official blog, it was detected that security breach occurred in November 2011 through their one click Install wizard. Here is the official Statement from their blog Apparently, the breach occurred in November via the one-click install wizard offered by Dreamhost: One click and your whole WordPress / Drupal web site is installed, ready to use, automatically updated by the wizard. Apparently, it’s the wizard itself that was compromised and anybody who used it was affected.

Data Privacy Day: Top 10 Ways to Secure your Data

This is a guest post by Greg Buckskin . If you wish to write one kindly check out the  guidelines  to write a guest post. There’s no denying it, 2011 was the biggest year  for security breaches. If you haven’t taken steps to secure your personal and professional data, consider Data Privacy Day (Jan 28th) as a belated New Year’s resolution. Even if you think of yourself as completely secure already, chances are that you’ll find yourself lacking on at least one or two of the following 10 ways to safeguard your information.