1
What is Clickjacking?What is Clickjacking?

Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable. when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when…

Read More..

0
Wireless Home Networking Tips & TricksWireless Home Networking Tips & Tricks

******************************Fix Connectivity Issues:""""""""""""""""""""""""""It sounds crazy, but 95 percent of all Internet connectivity problems can be solved by power-cycling both the router and the modem. Turn them both off, and then turn the …

Read More..

0
How to protect USB Virus from entering ur PC?How to protect USB Virus from entering ur PC?

Hi friends, i have a sloution for ur issue.You can make ur normal pen drive to virus protected pendrive. for that u want 1 pc which having windows vista 0r 7 os installed. Follow the below steps……..1) Connect ur pen drive to pc which having widows vi…

Read More..

0
HACKER TERMINOLOGY PART 2HACKER TERMINOLOGY PART 2

Logic Bomb – A logic bomb is a malicious program designed to execute when a certain criterion is met. A time bomb could be considered a logic bomb because when the target time or date is reached, it executes. But logic bombs can be much more complex.…

Read More..

0
HACKER TERMINOLOGY PART 1HACKER TERMINOLOGY PART 1

This glossary was made to help take some of the confusion out of the terms often used when referring to cyber crime. When dealing with crackers, black hats and hackers, what you don’t know can hurt you, so please take a moment to familiarize yourself…

Read More..

0
Best 6 linux keyloggers Best 6 linux keyloggers

(1)LKL:-LKL is a user space keylogger that runs under linux--x86/arch. LKL sniffs and logs everything passes trought the hardware keyboard port (0x60).Download From here(2)Log Key:-logkeys is a linux keylogger. It is no more advanced than other avail…

Read More..

0
What are malware, viruses, Spyware, and cookies?What are malware, viruses, Spyware, and cookies?

What are malware, viruses, Spyware, and cookies, and what differentiates them ?"Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand alone computer or…

Read More..

0
What is active content?What is active content?

To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be used to create "splash pages" or options like drop-down menus. Unfortunately, these scrip…

Read More..

1
Protecting Students with Google Apps for EducationProtecting Students with Google Apps for Education

Posted by Bram Bout, Director, Google for Education Today more than 30 million students, teachers and administrators globally rely on Google Apps for Education. Earning and keeping their trust drives our business forward. We know that trust is earned…

Read More..

0
Privacy Badger:  EFF Attacks 'Do Not Track' DeniersPrivacy Badger: EFF Attacks 'Do Not Track' Deniers

Privacy Badger:EFF Attacks 'Do Not Track' Deniers--Lately, I've been bashing away at all the applications and add-ons that seek and destroy Evercookies, those evil code danglers our web browsers leave exposed to the world, allowing nefarious marketin…

Read More..

0
5 Ways to Check if you are Hacked5 Ways to Check if you are Hacked

1) The first method is very simple for all the people using an ADSL router. After all the internet downloads are closed, just check the status of Ethernet light. It should not blink at a very fast rate. It shows that packets are being transferred in …

Read More..

0
Facebook Adds Anonymous Login, In Move to Build TrustFacebook Adds Anonymous Login, In Move to Build Trust

SAN FRANCISCO - Facebook moved Wednesday to bolster the trust of its more than one billion users by providing new controls on how much information is shared on the world's leading social network.In a major shift away from the notion long preached by …

Read More..
 
123 ... 123»
 
Top