Search results

  1. M

    Directory Traversal Attacks are still possible

    Directory Traversal Attacks What is a Directory Traversal attack? Properly controlling access to web content is crucial for running a secure web server. Directory Traversal is an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web...
  2. M

    Google hacking is really harmful so protect your website..

    Google hacking involves using advance operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have...
  3. M

    sql injection vulnerability:::::::::::::::::Be Secure

    eXploiting SQL injection in ORDER BY clause (MySQL 5) by Jacco van Tuijl This URL will show a list orderd by column 1 : http://www.test.com/list.php?orderby=1 This is what the SQL query that is executed on the database might look like: SELECT id,name,price FROM list ORDER BY 1 If...
  4. M

    sql injection vulnerability:::::::::::::::::Be Secure

    SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not...
  5. M

    Black hat techniques of seo the wrong way

    Wrong Way of Seo - Black Hat Seo [ Tips for Webmasters ] What is Black Hat SEO? There are a variety of tips and tricks that will get you instantly ranked in the top pages of the major search engines. These tricks are called Black Hat Tools, meaning that they are unethical and if discovered...
  6. M

    Mouse over' security flaw causes Twitter trouble

    Twitter security flaw
  7. M

    Mouse over' security flaw causes Twitter trouble

    Thousands -- possibly hundreds of thousands -- of Twitter users have been hit by a security bug that causes potentially dangerous content to appear on computer screens without warning, according to a researcher at the security firm Sophos. When users of the popular site "mouse over" a link on...
  8. M

    Spam Increases

    you cant stop spamming completely as its not possible to stop it because each time new mail is being drafted so its very difficult to stop spam the very simple countermeasure is to These 5 free Spam blockers will reduce the amount of ever growing SPAM in your e-mail box. Everyone has a...
  9. M

    Adobe Acrobat and Reader are prone to a remote code-execution vulnerability.

    Adobe Acrobat and Reader Font Parsing Remote Code Execution Vulnerability Bugtraq ID: 42203 Class: Boundary Condition Error CVE: CVE-2010-2862 Remote: Yes Local: No Published: Aug 04 2010 12:00AM Updated: Aug 19 2010 06:33PM Adobe Acrobat and Reader are prone to a remote...
  10. M

    Site Hacked, Others Might Want To Check Theirs

    yaa i agree with u stephen most of the time this attack is because the of the virus affected pc and mosltly people who upload files using filezilla
  11. M

    Coding techniques for protecting against Sql injection

    try to use the stored procedures of sql so that sql injection is not possible in you website and also try to avoid get methods in the website Trying to block this attack using a javascript wont work for you because java scripts can be easily disabled on the client end.
  12. M

    Advice on Hacking

    I would recommend also to check the version of wordpress or which ever content management softwares you are using might be that your cms package is having some flaws or bugs due to this hackers have gained the admin privliges on the website and changed the index page of your website update...
  13. M

    Site Hacked, Others Might Want To Check Theirs

    Mass modification of index files. On the second stage the pool of passwords harvested is used to modify certain files. We will call this stage "mass modification of index files". It looks like this stage was automated and they use a special tool, called MPACK, to install malicious IFrames...
  14. M

    Hackers

    Hackers take advantage of different security flaws in a web hosting infrastructure and exploit the vulnerability to compromise the system. Common security flaws that can lead to acompromise can be categorized as ----------Insufficient network boundary security controls ----------Flaws or bugs...
  15. M

    Hackers

    well restrict the normal user to upload any php file on the website check the extention of the file and also restict the upload to a specific folder, and name the folder with some unknown names dont ever name the folder where u are uploading files as "uploads" and try to block these folders...
  16. M

    Hackers

    just scan your website with acunetix vulnerbility scanner and check if its having any put method enabled on the root folder of your website
Back
Top