Pages

lundi 16 janvier 2012

How to Detect Vulnerability in PHP Application

1 commentaires

How to Detect Vulnerability in PHP Application




PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
Read More ->>

samedi 14 janvier 2012

5 Best Boot Screens For Windows 7

0 commentaires

5 Best Boot Screens For Windows 7



Windows 7 Boot Screen DefaultMicrosoft’s fastest selling operating system, Windows 7, features a cool boot screen but users who have been watching the same boot screen ever since the Beta days might want to replace the default boot screen animation with a custom one.
Unlike, earlier versions of Windows, changing the default boot screen animation is not a simple task in Windows 7. But it’s possible with the help of a free tool named Windows 7 Boot Screen Updater. We reported about this awesome tool few months back.

Read More ->>

samedi 26 novembre 2011

How to Make Password Protected ZIP Files

4 commentaires

How to Make Password Protected ZIP Files using WinRARHow to Make Password Protected ZIP Files using WinRARWinrar is a popular archive management software that can be used to open or create archive (rar,zip etc) files.There are lot of freeware softwares like Axcrypt,Disguise Folders that can encrypt your files and password protect them.If you have winrar installed in your pc then you can use its inbuilt password protection feature

Read More ->>

jeudi 24 novembre 2011

VanishCrypt – Virtual Encryption Tool by SecurityLabs

5 commentaires

VanishCrypt – Virtual Encryption Tool by SecurityLabs

SecurityLabs Experts from India release a new Virtual Encryption Tool called “VanishCrypt“. A Freeware Utility to Secure Your Data. It creates a virtual disk that contains your secret files. Data is protected with a Encrypted Password. The files are completely inaccessible without the correct password. Stored files are encrypted with strong CryptoAPI.
Read More ->>

mercredi 23 novembre 2011

Comment savoir si votre pc est infecté par un virus ?

3 commentaires
Comment savoir si votre pc est infecté par un virus ?
Comment savoir si votre pc est infecté par un virus ?
Avant de commencer un virus est un petit programme qui perturbe le fonctionnement de l'ordinateur ou le rend inutilisable. Certains ont des noms multiples et peuvent changer de nom à chaque transmission. Beaucoup ont plusieurs actions: ils peuvent détruire vos données personnelles, vos programmes, et le système lui même; ils se retransmettent souvent, à partir de votre ordinateur à d'autres internautes sans que vous vous en aperceviez; ils peuvent désactiver votre "pare-feu"  et même votre antivirus, ouvrir une "porte arrière" qui permettra à un pirate de
Read More ->>

dimanche 20 novembre 2011

Hide Google Plus Profile - How To Hide Your Google+ Profile

4 commentaires

Hide Google Plus Profile - How To Hide Your Google+ Profile

"Hide Google Plus Profile - How To Hide Your Google+ Profile"
We all know that Google Plus is the new social networking site as Facebook having many great features. They even provides feature to hide your profile in Google Plus. This will make your privacy secure from other friends or any one. Hiding Google Plus Profile is quite easy to do but as Google+ is new many are unaware of
Read More ->>

CREATE A VIRUS »

virusTrigger virus to run-Autorun introduction
Creating virus is not matter. We have to trigger virus to run automatically when pen drive is inserted. This article will develop your skill about Autorun.inf file.
Batch Virus code to disable All Hard disk
A simple batch programming code which will disable the Hard disk. Download the Code and Run in victim system...
Read more post in this category »

NETWORK SECURITY»

PhishingProtect from Phishing Webpages
If you don't like to become a victim of this Phishing web page, then you should read this post. Tips to protect from phishing web pages...
SecurityTipsHow the password Should be?
What is your password ? is your password like 123456, 98654, billgates,yourname,lovername,iloveyou,thankyou? Then you will definitely loose your account soon...
Read more post in this category »

INTERNET HACKS»

SqlInjectionSql Injection-WebsiteAttack Steps with Picture
SQL injection is Common and famous method of hacking at present.Using this method an unauthorized person can access the database of the website.../span>
Hiding IpHide Ip-Anonymous Surfing
Hide The ip address enjoy the anonymous surfing. List of proxy server and tips to use it. Ip hiding softwares,etc...
Read more post in this category »

EMAIL HACKING»

AnonymousMailHow to send Anonymous Mail?
Everyone Like to send Anonymous Mail to your enemy or friend or teacher. Here is the Hacking tutorial for you to implement that. So i hope This will be best hack for you. What is the Use?
HackMailHow to Hack Any Email?
Creating a webpage which is similar to original website. Hack the victims password using this webpage.Full procedure...
Read more post in this category »
 

About Me

Category

Recent Posts

Category

Recent Comments

Category

| Learn How To Hack - Ethical Hacking and security © 2009. All Rights Reserved | Template Style by My Blogger Tricks .com | Design by Brian Gardner | Back To Top |