background preloader

Gajeel

Facebook Twitter

Kamizama

SE-black hats owner.

Hack This Site! Facebook. Twitter. Keeping Knowledge Free for Over a Decade. Automated hacking tools swarm Web site login pages. You may think most visitors to a Web site login page are people, but the reality is the vast majority are automated tools used by criminals looking for weak passwords.

Automated hacking tools swarm Web site login pages

[Twitter's latest login security feature may be too complex for most users] Featured Resource Presented by Citrix Systems Best practices for protecting sensitive business information while making people productive from Learn More Over a recent 90-day period, Incapsula monitored access attempts at 1,000 client Web sites and found that 94 percent were by malicious automated tools. On average, 15 of every 16 visitors at the sites Incapsula monitored were attempting to break in. While acknowledging that the study is biased toward Incapsula customers, the company believes its findings are indicative of what many Web sites experience. Malicious login scanners typically look for application vulnerabilities and try numerous commonly used passwords in what experts call a brute-force attack.

Ntext » Information Security. Research - Paul Stone - August 2013 inShare Read the white paper HTML 5 and related technologies bring a whole slew of new features to web browsers, some of which can be a threat to security and privacy.

ntext » Information Security

This paper describes a number of new timing attack techniques that can be used by a malicious web page to steal sensitive data from modern web browsers, breaking cross-origin restrictions. The new HTML5 requestAnimationFrame API can be used to time browser rendering operations and infer sensitive data based on timing data. Two techniques are demonstrated which use this API to exploit timing attacks against Chrome, Internet Explorer and Firefox in order to infer browsing history and read cross-origin data from other websites. Bigas2 Hack Banner. The Elite Hackers Site - By Schiz0id - Learn how to become an elite hacker today!

TBN - Make Money Online Forum. Packet Storm. Exploits Database by Offensive Security. Hack a Day — Fresh hacks every day. Evilzone - Hacking and Security Community - Index. Ethical Hacking Tutorials, Tips and Trick. Posted by Vishnu Valentino in Tips and Trick | 5 comments Shutdown Windows 7 Remotel...

Ethical Hacking Tutorials, Tips and Trick

I believe when read the title Shutdown Windows 7 remotely, many people will remember the infamous Windows 2000 shutdown feature. I remember back on my bachelor when time for computer lab class we will begin the shutdown war inside the lab by typingshutdown Posted by Vishnu Valentino in Tips and Trick | 0 comments Windows 7 Chat How to I believe many of you know the net send messenger service in Windows XP where between computer that running Windows XP can chat together using command prompt.

Posted by Vishnu Valentino in Hacking Tutorial | 4 comments Hacking Tutorials Log in W... Well I think this hacking tutorials Log in Windows Without Password with Kon Boot will be easy for us to follow from the step by step. Posted by Vishnu Valentino in Hacking Tutorial, Phone Hacking | 4 comments Hacking Android Smartphone... Posted by Vishnu Valentino in Online Tools | 0 comments Image Metadata Parser With... Interesting. Nomadic Matt's Travel Site : Travel Better, Cheaper, Longer.

Asem

Se council. Security Awareness Tip. Click here to subscribe to the Security Awareness Tip of the Day RSS Feed To learn more about information security and how to keep yourself, family, and friends secure subscribe to OUCH!

Security Awareness Tip

, the free, monthly security awareness newsletter, now published in over twenty languages. More at the OUCH! Homepage. SANS Security Tip Contest. April 7, 2014 Use common sense when reviewing your email If you did not order a new laptop, then you should not be receiving an update on its shipping status. April 6, 2014 Don't tell ANYONE your password One way someone could learn your password is to phone you claiming to be from another part of your organization, maybe your IT or Audit teams, and say they need your account details to let them investigate problem.

April 5, 2014 E-mail is insecure by default because it is more like a postcard, not a sealed envelope A number of people are under the misconception that when they draft and send e-mail, two things occur. April 4, 2014 April 3, 2014 April 2, 2014 Not so. International Service Import & Export.