Hack Modem
Membuat Situs Web Yang Aman
Jum`at, 2 Desember 2011
Tidak ada buatan manusia yang sempurna, dan juga tidak ada situs website yang keamanannya sempurna. Titik lemah selalu ada meski di situs yang paling aman sekalipun. Namun semakin tinggi keamanan suatu situs, maka semakin sulit pula bagi peretas untuk masuk.
Dibutuhkan keahlian yang semakin tinggi, motivasi yang besar, perangkat yang canggih, dan keberanian mengambil resiko yang sangat luar biasa untuk bahkan mulai mencobanya, karena jejak-jejak percobaan akan tercatat dan bi...
How to Recover Hacked Email Accounts
Minggu, 30 Oktober 2011
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account. For Gmail:
It can be a big disaster if your Gmail account has been compro...
Uncover all methods to hack facebook password
Senin, 3 Oktober 2011
In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password, I will cover 4 methods over here: 1. Facebook Phishing 2. Keylogging 3. Social engineering 4. Primary email address hack Facebook phishing:
I
have taken this method first because i think this is the most popular
method/way of hacking facebook. I studied various facebook surveys taken
on web about ha...
SQL Injection for DoS
Minggu, 22 Mei 2011
Another
application threat related to SQL injection is Denial of Service (DoS),
which, in its most extreme form, can bring the Web application to a
halt by shutting down its backend database. It takes place when an
attacker appends the SHUTDOWN command to a SQL statement, or when the
attacker creates complex queries over self-joins of large database
tables with the intention of sending the database into time consuming
loops over lots of data. This ends up consuming pre...
SQL Injection for Web site defacement
Minggu, 22 Mei 2011
Web site defacement traditionally occurred when a hacker obtained administrative privileges to a Web site and then altered the content of the Web site with potentially offensive or erroneous graphics and text. While Web site owners have bolstered the security of Web configuration tools, malicious users have discovered a new technique to deface Web sites: SQL injection.
In 2007, there were several high profile incidents in which SQL injection was used for Web site defacement. ...