Directory Traversal Attacks What is a Directory Traversal attack? Properly controlling access to web content is crucial for running a secure web...
[IMG] Google hacking involves using advance operators in the Google search engine to locate specific strings of text within search results....
eXploiting SQL injection in ORDER BY clause (MySQL 5) by Jacco van Tuijl This URL will show a list orderd by column 1 :...
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The...
Wrong Way of Seo - Black Hat Seo [ Tips for Webmasters ] [IMG] What is Black Hat SEO? There are a variety of tips and tricks that will get you...
Twitter security flaw
[IMG] Thousands -- possibly hundreds of thousands -- of Twitter users have been hit by a security bug that causes potentially dangerous...
you cant stop spamming completely as its not possible to stop it because each time new mail is being drafted so its very difficult to stop spam the...
Adobe Acrobat and Reader Font Parsing Remote Code Execution Vulnerability [IMG] Bugtraq ID: 42203 Class: Boundary Condition Error CVE:...
Separate names with a comma.