Social Engineering Fundamentals

July 13, 2007 0 Comments 0 tags

A True Story One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network.

Basic Remote File Inclusion

June 25, 2007 0 Comments 0 tags

Basic Remote File Inclusion DefinitionRemote file inclusion, commonly known as RFI is a form of attack where the attacker trys to inject there own php code inside your php app’s.

Hacking with Google, Is it Possible

June 22, 2007 0 Comments 0 tags

Hacking with Google, Is it Possible Every hacker needs to develop his abilities if he wants to maintain up to date. That’s why he will use every tool he can

Single-line attack infects thousands of Web sites

June 6, 2007 0 Comments 0 tags

Thousands of Web sites have fallen victim to an attack using just one line of code that maliciously re-directs browsers via Javascript to servers that are hosting a variety of

Hard disk data recovery – Recover from damaged disk? Wipe out the harddisk to avoid spying

May 28, 2007 0 Comments 0 tags

Think of the time you take to copy a 1 GB file to the hard disk drive and the time taken to delete the same file. Doesn’t it take very

SQL Injection Attacks and Prevent

May 28, 2007 0 Comments 0 tags

Introduction Security in software applications is an ever more important topic. In this article, I discuss various aspects of SQL Injection attacks, what to look for in your code, and

How Can You Protect Yourself from Google Hacking?

May 22, 2007 0 Comments 0 tags

The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used