Security

Google Hacking Secrets:The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

How to detect r57 and c99 Shells in your server

When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

How to improve security in Firefox, Chrome, and IE

Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…

Shodan: The scariest search engine on the Internet

"When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google,…


Programming

The HTML5 Quick Learning Guide

HTML5 syntax is compatible with both HTML4 and XHTML1. Want to close empty elements with a slash? Go for it.…

How to Create a Password Strength Indicator With jQuery

If you are building a system that allows the users to login in, then it is always a good idea…

21 PHP Libraries You Should Know About

The aim of the Standard PHP Library-or SPL is to provide a standard library of interfaces which allows developers to…

How to Retrieve Twitter Timeline and Hashtags in PHP

How to Retrieve Twitter Timeline and Hashtags in PHP (Twitter OAuth API 1.1) So, here we offer a guide that explains…

Servers

Install Java in Ubuntu 16.04

Java and the JVM (Java's virtual machine) are widely used and required for many kinds of software. This article will…

How to install and setup Varnish in Ubuntu 16.04

One of the problems with running a site with many users is that the constant requests for dynamic content can…

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web…

Display Linux TCP / UDP Network and Socket Information with the 'ss' command

The ss command is used to show socket statistics. It can display stats for PACKET sockets, TCP sockets, UDP sockets,…

We use our own cookies and third-party cookies to improve our services, show products based on your preferences, analyse the browsing habits of our users, and enable interaction with social networks. Continuing to browse our sites implies full acceptance of their use. You can change your cookie setting or get more information here: Cookies policy .