Hacking -

15 results for: hacking

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to a Secure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting…

Category : Networking   30-10-2019   by Luigi Nori

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   27-05-2019   by admin admin

Nofollow and dofollow links, How and when to use?

Within any website the links are an element that brings dynamism to the experience of navigating through the different sections that make it up allowing us to go from one content to another quickly. However, it is necessary to take into account that Google, as well as other search engines will…

Category : Seo & sem   19-05-2019   by admin admin

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   13-02-2019   by admin admin

4  Ways To Quickly Improve Your Online Business

4 Ways To Quickly Improve Your Online Business

It’s great to be an online business in an era where technology is continuously growing and expanding, but it can be difficult to succeed because there’s also a lot of competition in the space. This is why it’s important to always be looking at how you can be improving your…

Category : Web marketing   07-11-2018   by admin admin

SQLMAP installation and usage in Ubuntu and Kali linux

SQLMAP installation and usage in Ubuntu and Kali linux

Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…

Category : Security   13-08-2016   by admin admin

What is a DDOS attack and tools used

What is a DDOS attack and tools used

What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…

Category : Security   19-04-2016   by admin admin

How to detect r57 and c99 Shells in your server

How to detect r57 and c99 Shells in your server

When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…

Category : Security   26-07-2013   by admin admin

Who is immune to cyber-crime?

Who is immune to cyber-crime?

Every company is a target.  No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…

Category : Security   15-07-2013   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Top 15 Free Hacking Tools for Ethical Hackers

According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…

Category : Security   10-07-2013   by admin admin

A List of Best Free SQL Injection Scanners and Tools

A List of Best Free SQL Injection Scanners and Tools

We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…

Category : Databases   03-06-2013   by admin admin

What is a growth hacker? The actual difference between growth hacking and marketing

What is a growth hacker? The actual difference between growth hacking and marketing

Definition: growth hacker (noun) - one who's passion and focus is pushing a metric through use of a testable and scalable methodology. “Growth hacker” is a new word for most but a long held practice among the best internet marketers and product managers in Silicon Valley. With mass media fading away and…

Category : Web marketing   22-05-2013   by admin admin

Google Hacking Secrets:The Hidden Codes Of Google

Google Hacking Secrets:The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Category : Security   15-02-2019   by admin admin

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by admin admin

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…

Category : Security   29-04-2013   by admin admin