
Takin’ data to the streets. Word. Whenever I'm out late at night with my bottle of black spray paint while climbing onto the highway overpass, I'm always like, "I wish there was an easier way to make pie charts on this street sign. There has to be a better way!" I am sure you can identify. As shown below, simply adjust the levers on the circle for the correct percentages and arrange the letters on the bottom for an appropriate message. Download the template here, and get your pie chart graffiti on. [Infoviz Graffiti via Fast.co]
Hacking Articles,Backtrack Tutorials,Hacking Tricks,Penetration Testing,Metaspolit Tutorial RFI Tutorial (remote file inclusion) Basically, the include function in PHP allows contents from local or remote files to be pretty much "copied and pasted" and executed in a script at runtime. Now suppose yo' dad wants a small website. All he wants is three pages.A blog page where he can update you on how many babies he has killed.A contact page with his email on it os people can ask advice on the best way to kill babies.An gallery page where he can show you pictures of all the babies he has killed. He creates four pages. blog.php, contact.php and gallery.php along with index.php, this is our "main" page that will contain a header, a side bar for navigation, some php and a footer. You would view the pages on his website like this.Code: for header//html for menu$page = $_GET['page'];include($page);? This means when we go to Code: What's wrong with this? What's the point of this? Undefined variables. Switching.
HellBound Hackers Identifying the hacktivists of the emerging cyberwar The Internet has never been a safe place, and since its inception, and introduction to consumers, privacy and security have been a major concern. Of course, now that the average person’s computer skills are many times over what they used to be, that only amplifies the problem. Couple this with the fact that millions and millions of people are uploading mass amounts of personal and sensitive data and you’ve got a recipe for some serious cyber-insecurity. Anonymous and LulzSec have become household names, and their Internet antics have captured the attention of just about everyone, including the CIA. Anonymous Anonymous first largely appeared on many radars after making worldwide headlines for its attack on the Church of Scientology in what they called Project Chanology. When various websites refused to host WikiLeak’s site, and credit card companies wouldn’t offer a way for people to make donations to the group, the hacktivists took it upon themselves to fight WikiLeak’s enemies. LulzSec
Irongeek.com SQL Injection Cheat Sheet Find and exploit SQL Injections with free Netsparker SQL Injection Scanner SQL Injection Cheat Sheet, Document Version 1.4 About SQL Injection Cheat Sheet Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL. Samples are provided to allow reader to get basic idea of a potential attack and almost every section includes a brief information about itself. Examples; (MS) means : MySQL and SQL Server etc. Table Of Contents Syntax Reference, Sample Attacks and Dirty SQL Injection Tricks Ending / Commenting Out / Line Comments Line Comments Comments out rest of the query. -- (SM) DROP sampletable;-- # (M) DROP sampletable;# Line Comments Sample SQL Injection Attacks Username: admin'-- SELECT * FROM members WHERE username = 'admin'-- This is going to log you as admin user, because rest of the SQL query will be ignored. Inline Comments /*Comment Here*/ (SM) DROP/*comment*/sampletableDR/**/OP/*bypass blacklisting*/sampletableSELECT/*avoid-spaces*/password/**/FROM/**/Members /*!
A place to learn about computer software, security and games, popular physics, life, 3d art, models, and more