Firefox Extensions for the Web Developer - www.htmlgoodies.com
Raindrops on roses and whiskers on kittens...yada yada yada (I mentioned the kittens). Here are a few of my favorite Firefox things: Web Developer, Pixel Perfect, ColorZilla, Measure It and Pixl Grabber. If you are not yet using the Firefox extension Firebug, run--don't walk--to downloadville. It is a must-have Web tool, especially if you are working with content management systems where the cascading stylesheets tend to look like Victoria Falls. While the extensions in this series do not rely upon it, some will integrate with it. If you are asking "What is Firebug?"
GHDB
Welcome to the Google Hacking Database (GHDB)! We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Advisories and Vulnerabilities (215 entries) These searches locate vulnerable servers.
SCRIPT COMPARE
a side-by-side reference sheet sheet one: version | grammar and execution | variables and expressions | arithmetic and logic | strings | regexes | dates and time | arrays | dictionaries | functions | execution control | exceptions | threads sheet two: streams | asynchronous events | files | file formats | directories | processes and environment | option parsing | libraries and namespaces | objects | inheritance and polymorphism | reflection | net and web | gui | databases | unit tests | logging | debugging
Skip Graduate School, Save $32,000, Do This Instead
Three years ago, I invested $32,000 and the better part of two years at the University of Washington for a master's degree in International Studies. The verdict? It wasn't a complete waste of time and money. Once I accepted that 80% of the course requirements were designed to keep people busy, I enjoyed the other 20% of the work. If you're strictly interested in learning, however, you may want to get a better return-on-investment than I did. Here's how to save $32,000 (or more) through your own self-directed, alternative program.Here's how to save $32,000 (or more) through your own self-directed, alternative program.
How To Use Rssocks And Rcsocks ( Reverse Socks5 Server)
During this video I explain how from a shell I run a socks5 server with a reverse connection to bypass firewall restriction and scan the subnet using rssocks and rcsocks. For remember: - rssocks is the server is connect back to your client (need to be execute on the remote shell) - rcsocks is the client you run it PS: The reverse tools of ssocks are actually a POC, some improvements will arrive soon
Nebraska Fusion Center Implementing New Search Tool
Photo courtesy of the U.S. Department of Homeland Security. Following 9/11 and the gaps in information sharing those attacks exposed, the federal government began encouraging the development of fusion centers within each of the states as well as major cities to facilitate connecting pieces of information that help identify potential threats.
How to use Google for Hacking
Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking:
Linux Directory Structure (File System Structure) Explained with Examples
by Ramesh Natarajan on September 8, 2010 Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories.