List of faces, Facebook (2012)

The trick of the year, at least so far, is definitely a bug in the Facebook  system that allows you to insert new and an endless amount of emoticons in chat and messages . Thanks to this trick anyone can create new smileys that you can send to friends (and others) in chat, or use to customize and beautify your messages on Facebook. Today we have gathered for you a list of brand new and unique smileys for Facebook ! To use them, simply copy the code of the emoticon on the cha...

Facebook shortcuts : everyone should know

For FireFox:     Shift+Alt+1: View your News Feed     Shift+Alt+2: View your own Profile     Shift+Alt+3: View pop-up of friend requests     Shift+Alt+5: View pop-up of notifications     Shift+Alt+6: View Account Settings     Shift+Alt+7: View Privacy Settings     Shift+Alt+? : Search bar  For Google Chrome: Alt+?: Search   Alt+1: View your News Feed Alt+2: View your own Profile Alt+3: View pop-up of friend requests Alt+4: View pop-up of messages Alt+5: View pop-up of notifications Alt+6: View Account Settings Alt+7: View Privacy Settings Alt+8: View Facebook’s own profile Alt+9: Read latest Terms of Service agreement...

MULTIPLE LOGIN IN YAHOO MESSENGER

  Multiple login in yahoo Without Using any Software You can login with multiple id’s on the same yahoo messenger without any download or patch . Follow these steps : 1. Go to Start —-> Run . Type regedit, then enter . 2.Navigate to HKEY_CURRENT_USER ——–> Software —>yahoo —–>pager—->Test 3.On the right page , right-click and choose new Dword value . 4.Rename it as Plural. 5.Double click and assign a decimal value of 1. Its done!! Now close registry and restart yahoo messenger and try Multiple Login...

UK Facebook Hacker Jailed For 8 Months

It’s a pretty harsh sentence if you ask me, especially since Facebook decided in July 2011 to start paying bug bounties. I have to say though, this guy must be a pretty talented hacker to break into the Facebook servers – they aren’t exactly low hanging fruit. I’d imagine they are some of the most hammered servers in the World (especially by script kiddies). Sadly, however talented he is, or whatever his intention was in reality – what he did was illegal and he can be punished (fairly harshly) for it...

Automatic SQL Injection Tool – SQLMAP

Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in webapplications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer...

Breaking the Internet: Researchers Successfully Hack SSL

Secure Socket Layers and Transport Layer Security (SSL/TLS) is the foundation of Web security. Banks, travel booking sites, social networks like Facebook and Twitter, email services and a plethora of other industries built their security based on the fact that it is very hard to crack SSL. Yet, a group of researchers has figured out how to do just that. SSL encryption protects data in transit from the client to the server. This communication happens very rapidly and the encryption effectively makes a secure tunnel for information. The researchers that have cracked SSL used a vulnerability that until now was considered only a theory. Like wormhole...

Plesk control panel bug left FTC sites (and thousands more) exposed to Anons

A critical vulnerability in some versions of Parallels' Plesk Panel control panel software appears to have been key to the recent penetration of two servers hosting websites for the Federal Trade Commission. The vulnerability in the software, which is used for remote administration of hosted servers at a large number of Internet hosting companies, could spell bad news for hosting providers who haven't applied the latest updates, as well as their customers. Because the vulnerability allows someone to make significant changes to the user accounts, files, and security of a targeted site, hackers who took advantage of the Plesk vulnerability...
Page 1 of 7512345Next

 
Design by gitstein | Bloggerized by Kuldeep