Search results

  1. M

    Directory Traversal Attacks are still possible

    Directory Traversal Attacks What is a Directory Traversal attack? Properly controlling access to web content is crucial for running a secure web server. Directory Traversal is an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web...
  2. M

    Google hacking is really harmful so protect your website..

    Google hacking involves using advance operators in the Google search engine to locate specific strings of text within search results. Some of the more popular examples are finding specific versions of vulnerable Web applications. The following search query would locate all web pages that have...
  3. M

    sql injection vulnerability:::::::::::::::::Be Secure

    SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not...
  4. M

    Black hat techniques of seo the wrong way

    Wrong Way of Seo - Black Hat Seo [ Tips for Webmasters ] What is Black Hat SEO? There are a variety of tips and tricks that will get you instantly ranked in the top pages of the major search engines. These tricks are called Black Hat Tools, meaning that they are unethical and if discovered...
  5. M

    Mouse over' security flaw causes Twitter trouble

    Thousands -- possibly hundreds of thousands -- of Twitter users have been hit by a security bug that causes potentially dangerous content to appear on computer screens without warning, according to a researcher at the security firm Sophos. When users of the popular site "mouse over" a link on...
  6. M

    Adobe Acrobat and Reader are prone to a remote code-execution vulnerability.

    Adobe Acrobat and Reader Font Parsing Remote Code Execution Vulnerability Bugtraq ID: 42203 Class: Boundary Condition Error CVE: CVE-2010-2862 Remote: Yes Local: No Published: Aug 04 2010 12:00AM Updated: Aug 19 2010 06:33PM Adobe Acrobat and Reader are prone to a remote...
Back
Top