Reference

Advanced Cross-Site-Scripting (XSS)

Reference February 27, 2018 at 11:12 am 0 comments

A Mini-Whitepaper Advanced Cross-Site-Scripting with Real-time Remote Attacker Control Author: Anton Rager Date: Feb 9, 2005 ** Introduction ** Cross Site Scripting (XSS) is typically perceived as a minimal threat by many developers and security professionals. There have been some good papers in the past that should have woken folksRead More

Hakin9 : Dangerous Google Searching for Secrets

Reference February 27, 2018 at 10:39 am 0 comments

Gmail Hacking

Reference February 27, 2018 at 6:07 am 0 comments

Basics of Web Hacking

Reference February 27, 2018 at 2:40 am 0 comments

Tools : Command Prompt \\*\\/*/ /*/\\*\\ 1) Finding a server I.P \\*\\/*/ /*/\\*\\ First of all you will want the server I.P address, to gain this goto your start menu and click run. Then type cmd or command (whichever works). Type the following : ping target.com You should get somethingRead More

Transparent Proxies in Squid

Reference February 26, 2018 at 2:28 pm 0 comments

_____________________________________________________________       Transparent Proxies in Squid By Ankit Fadia Ankit@bol.net.in   _______________________________________________________________       With, the extremely uncontrollable growth in the number of Hackers, not only system administrators of servers have to worry about the security of their system, but even if you are running a standaloneRead More

FTP Exploits By Ankit Fadia

Reference February 26, 2018 at 8:38 am 0 comments

Ankit Fadia Hacking Guide

Reference February 26, 2018 at 8:26 am 0 comments

Advanced Search by Google

Reference February 26, 2018 at 4:41 am 0 comments

A Guide to Facebook Security

Reference February 26, 2018 at 3:41 am 0 comments

Computer Virus & Its Types (Name and Description)

Reference February 26, 2018 at 3:22 am 0 comments

   Types of Viruses: 1. Resident Viruses Resident viruses are the other basic level of file infectors. These type of viruses not infect your computer direct, infact they install themselves on computer. It allows them to work even when the original source of the infection has been eradicated. On theRead More