How to Remove Windows Genuine Advantage Notifications

January 5, 2009 0 Comments 0 tags

Windows genuine advantage notifications occur when your computer hasn’t passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or

Complete MySQL Injection

January 2, 2009 0 Comments 0 tags

Credit go to sam207 TABLE OF CONTENT: #INTRO #WHAT IS DATABASE? #WHAT IS SQL INJECTION? #BYPASSING LOGINS #ACCESSING SECRET DATA #Checking for vulnerability #Find the number of columns #Addressing vulnerable

EU Police learning hacking tricks. They are about to “Remote search” your PCs.

January 1, 2009 0 Comments 0 tags

Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision

Mozilla Firefox the most vulnerable browser?

December 26, 2008 0 Comments 0 tags

Its hard time for guys at Mozilla firefox. The browser has earned the title of being the most vulnerable application on windows platform. Application white listing and application control vendor

Twitter accounts hacked : Barack Obama, Britney etc on the list

December 25, 2008 0 Comments 0 tags

According to twitter, a micro blogging site, 33 twitter accounts were compromised and false and inappropriate messages were posted online. Hacked accounts include prominent twitter sources like President-elect Barack Obama,

Friendster accounts hacking menace

December 22, 2008 0 Comments 0 tags

Someone asked us recently how to hack a Friendster account. Of course, we refused point blank as hacking is not only illegal, it is utterly loathsome. It is none of

How to hack a website? – Tips and tricks

December 19, 2008 0 Comments 0 tags

Here are the most common techniques used to hack a website Hacking sites that are least protected by password – By pass authentication It’s the webmaster’s nightmare, hackers accessing the