SQL Injection Attacks and Prevent

May 28, 2007 0 Comments 0 tags

Introduction Security in software applications is an ever more important topic. In this article, I discuss various aspects of SQL Injection attacks, what to look for in your code, and

How Can You Protect Yourself from Google Hacking?

May 22, 2007 0 Comments 0 tags

The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used

Best Windowblinds desktop theme collection-Updating

May 18, 2007 0 Comments 0 tags

Friends, some of my best themes for Windowblinds (5.1 or higher)…am goin to post more, if i see interests from you, have fun!!! InviPro EN2: Protected Message: Code: http://rapidshare.com/files/51572559/InviPro_EN2.zip Vista

Email Servers and Ports

April 29, 2007 0 Comments 0 tags

Email Servers and PortsThere are two servers required for sending and receiving email, i.e. the SMTP and POP servers. ## Incoming and Outgoing Mail Servers # Incoming Mail Server# :

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

April 28, 2007 0 Comments 0 tags

IntroductionThis tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous.TheoryThe more different hops

System User on XP

April 26, 2007 0 Comments 0 tags

Here is the article on the available ways to logon/scalate to SYSTEM user on XP… Enjoy Logon as “NT AUTHORITY\SYSTEM” user on Windows XP %% BY EDU %% [-Introduction-]Windows XP

How to create botnet?

April 5, 2007 0 Comments 0 tags

The tutorial includes how to install a ircd, how to compile a bot & ways to spread. “Chapters” 1. What is needed 2. How to configure an (unreal)ircd 3. How