Langsung ke konten utama

Postingan

Menampilkan postingan dengan label hack

Video: Twitter Exploit XSS

WordPress.com Suffers Largest DDoS Attack In Its History

Image via CrunchBase You have no idea how hard it was to get this post up, as  WordPress.com , our blog host, is currently under a denial of service attack. It’s been almost impossible to access the TechCrunch backend for the past 10 minutes (everything seems to be stable now) and users have been receiving a  “Writes to the service have been disabled, we will be bringing everything back online ASAP”  error message. From the VIP blog post: WordPress.com is currently being targeted by a extremely large Distributed Denial of Service attack which is affecting connectivity in some cases. The size of the attack is multiple Gigabits per second and tens of millions of packets per second.

Hack Rapidshare, Hotfile, and anymore bypass time limit

Most of the file hosting services such as Rapidshare, Mediafire, Uploading, Hotfile and many more give very less features to free users and force them to wait for a limited amount of time with many limitations. In this blog you will find many links belonging to those file servers. There are many softwares and tricks are available to hack those servers premium features. I am going to write about a firefox addon. Which helps you in great way. This is Skipscreen. Download Skipscreen to your firefox browser: http://dl.skipscreen.com/files/SkipScreen-Setup.exe  

Enhance Your Security This Weekend

While this week introduced security concerns, it also brought forward several great ways to help get your own digital life secure and under control. Looking to past and present, here are our best guides to help you enhance your security. Get Your Password , Online Account, and Gadget Security Under Control We've written a lot on security. Here's a large selection of our guides, tips, and tricks to help keep you safe. How to Stay Secure Online  - If you want an all-around comprehensive guide to your personal online security, this is it. While you can never protect yourself 100%, these are our best recommendations to keep you as protected as possible while also, conveniently, requiring minimal effort. How I'd Hack Your Weak Passwords  - To really understand password security, you need to approach it from the standpoint of how a hacker would try and crack your password. Here's a look at how one security expert would try to crack  your  passwords if he were invit...

Hacktivism on Display: Operation Payback and the Wikilkeaks Saga

hack verb \ˈhak\ a : to write computer programs for enjoyment b : to gain access to a computer illegally   ac·tiv·ism noun \ˈak-ti-ˌvi-zəm\ a : a doctrine or practice that emphasizes direct vigorous action especially in support of or opposition to one side of a controversial issue

How to Crack a Wi-Fi Network’s WEP Password with BackTrack

Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. Here’s what you’ll need: A compatible wireless adapter :This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not. A BackTrack 3 Live CD : We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. (I tried the BackTrack 4 pre-release, and it didn’t work as well as BT3. Do yourself a favor and stick with BackTrack 3 for now.) A nearby WEP-enabled Wi-Fi network : The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of succ...

Ebaumsworld Hacks YouTube, Redirects Users

YouTube is under attack from a user named 'ebaumsworld' who has placed malicious links in the comments are of the website. Several videos on the web have been under the attack. Though it is common for users to place links that redirect other users to other websites and pop-ups but the recent posts by 'ebaumsworld' and '4chan' has lead to various disturbing and abusive videos and pop-ups that can pose a potential virus threat for the users. The comments ad links posted started with the users like '4chan' and 'ebaumsworld' targeting the Justin Bieber videos. The star has already been plagued by several obscene rumors over the last few months. The recent hacking of the net by the users have caused several other videos being affected. Users have been redirected to several unwanted pages and videos. '4chan' has claimed responsibility for the corrupting of the video links of Justin Bieber. YouTube has been trying to solve the issue by blockin...

Activate Facebook Feature to Notify You If Others Log in Your Facebook Account

Despite the increasing complexity of security measures to prevent, detect and remove malicious programs, spyware, viruses, etc, computer crime is hot on their heels and becoming more sophisticated and prevalent. Popular social networking sites such as Twitter, Friendster, Facebook, etc are common targets for cyber criminals. They provide a rich treasure trove for phishers and hackers as personal information is readily available and guards are lowered in these social websites. Hence it is always a good idea to fully capitalize and utilize the security features which are available to minimize hackers’ attack and invasion. Some Facebook enthusiasts are probably not aware that this site offers a pretty good feature which can inform users of logins to their Facebook accounts from mobile devices or other computer systems. With a simple activation, users will be notified when hackers or others access their Facebook account from other devices. To configure and activate this notification of u...

Top Ten Google Voice Hacks and Tips

Just over a year ago Google had released their web based platform for communications - Google Voice. The only catch was that you need to request and receive an invitation to try it out. Now Google Voice has been opened to the public with no invitation required. It is packed with an array of cool features for sophisticated telephony.   In order to use Google Voice you need to configure your current phones to work with it. The application can be used in conjunction with the mobile phone and VoIP services. To make your work on Google Voice more interesting you might receive an invitation to try it out. 1. Try to create bookmarks/favorites or desktops shortcuts that act as the speed dials Most of the contact in Google Voice has a unique URL at the mobile version of the site. In case you click on the contact, its URL must be brought to you there and is unique to that particular contact. It is not URL which will automatically start the call, its just one click away. Click on "call...

Facebook hack day: Zuckerberg talks up merits of personalisation

Facebook CEO and founder Mark Zuckerberg. Photograph: Craig Ruttle/AP Personalisation of the web is creating a new wave of opportunity for developers and content companies, said Facebook founder Mark Zuckerberg on Monday, as the social networking site signalled an aggressive phase of expansion across Europe. Speaking at Facebook's first officially organised European hack day at London's Barbican Centre, Zuckerberg said the growth of social gaming and his own experience using the new version of Spotify illustrated the potential of "products built around people". "Every industry will go through this wave where there are new versions of apps for those industries built from ground up around people," he said. "There's the opportunity for new wave of developers to be a part of building new software, websites and mobile apps.