News

Hack

Membuat Situs Web Yang Aman

Jum`at, 2 Desember 2011
Tidak ada buatan manusia yang sempurna, dan juga tidak ada situs website yang keamanannya sempurna. Titik lemah selalu ada meski di situs yang paling aman sekalipun. Namun semakin tinggi keamanan suatu situs, maka semakin sulit pula bagi peretas untuk masuk. Dibutuhkan keahlian yang semakin tinggi, motivasi yang besar, perangkat yang canggih, dan keberanian mengambil resiko yang sangat luar biasa untuk bahkan mulai mencobanya, karena jejak-jejak percobaan akan tercatat dan bi...

How to Recover Hacked Email Accounts

Minggu, 30 Oktober 2011
It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account. For Gmail: It can be a big disaster if your Gmail account has been compro...

Uncover all methods to hack facebook password

Senin, 3 Oktober 2011
In my previous post How to hack facebook password i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password, I will cover 4 methods over here: 1. Facebook Phishing 2. Keylogging 3. Social engineering 4. Primary email address hack Facebook phishing: I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about ha...

SQL Injection for DoS

Minggu, 22 Mei 2011
Another application threat related to SQL injection is Denial of Service (DoS), which, in its most extreme form, can bring the Web application to a halt by shutting down its backend database. It takes place when an attacker appends the SHUTDOWN command to a SQL statement, or when the attacker creates complex queries over self-joins of large database tables with the intention of sending the database into time consuming loops over lots of data. This ends up consuming pre...

SQL Injection for Web site defacement

Minggu, 22 Mei 2011
Web site defacement traditionally occurred when a hacker obtained administrative privileges to a Web site and then altered the content of the Web site with potentially offensive or erroneous graphics and text. While Web site owners have bolstered the security of Web configuration tools, malicious users have discovered a new technique to deface Web sites: SQL injection. In 2007, there were several high profile incidents in which SQL injection was used for Web site defacement. ...
« Previous | 1 | 2 | 3 | 4 | 5 | Next » | »»»