List of faces, Facebook (2012)


The trick of the year, at least so far, is definitely a bug in the Facebook  system that allows you to insert new and an endless amount of emoticons in chat and messages .
Thanks to this trick anyone can create new smileys that you can send to friends (and others) in chat, or use to customize and beautify your messages on Facebook.
Today we have gathered for you a list of brand new and unique smileys for Facebook ! To use them, simply copy the code of the emoticon on the chat.

Facebook shortcuts : everyone should know

For FireFox:

    Shift+Alt+1: View your News Feed
    Shift+Alt+2: View your own Profile
    Shift+Alt+3: View pop-up of friend requests
    Shift+Alt+5: View pop-up of notifications
    Shift+Alt+6: View Account Settings
    Shift+Alt+7: View Privacy Settings
    Shift+Alt+? : Search bar 

For Google Chrome:
  • Alt+?: Search  
  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.

MULTIPLE LOGIN IN YAHOO MESSENGER


 

Multiple login in yahoo Without Using any Software
You can login with multiple id’s on the same yahoo messenger without
any download or patch .
Follow these steps :
1. Go to Start —-> Run . Type regedit, then enter .
2.Navigate to HKEY_CURRENT_USER ——–> Software —>yahoo
—–>pager—->Test
3.On the right page , right-click and choose new Dword value .
4.Rename it as Plural.
5.Double click and assign a decimal value of 1.
Its done!!
Now close registry and restart yahoo messenger and try Multiple Login


UK Facebook Hacker Jailed For 8 Months


It’s a pretty harsh sentence if you ask me, especially since Facebook decided in July 2011 to start paying bug bounties.
I have to say though, this guy must be a pretty talented hacker to break into the Facebook servers – they aren’t exactly low hanging fruit. I’d imagine they are some of the most hammered servers in the World (especially by script kiddies).
Sadly, however talented he is, or whatever his intention was in reality – what he did was illegal and he can be punished (fairly harshly) for it.

Automatic SQL Injection Tool – SQLMAP


Sqlmap is an open source command-line automatic SQL injection tool and its goal is to detect and take advantage of SQL injection vulnerabilities in webapplications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and apply vulnerabilities and injections,but in the end,you really must have a good knowledge of SQL some real pwning out there..
You Can download sqlmap 0.7 here:
Linux Source: sqlmap-0.7.tar.gz 
Windows Portable:
 sqlmap-0.7_exe.zip

Breaking the Internet: Researchers Successfully Hack SSL


Secure Socket Layers and Transport Layer Security (SSL/TLS) is the foundation of Web security. Banks, travel booking sites, social networks like Facebook and Twitter, email services and a plethora of other industries built their security based on the fact that it is very hard to crack SSL. Yet, a group of researchers has figured out how to do just that.
SSL encryption protects data in transit from the client to the server. This communication happens very rapidly and the encryption effectively makes a secure tunnel for information. The researchers that have cracked SSL used a vulnerability that until now was considered only a theory. Like wormholes.

Plesk control panel bug left FTC sites (and thousands more) exposed to Anons


A critical vulnerability in some versions of Parallels' Plesk Panel control panel software appears to have been key to the recent penetration of two servers hosting websites for the Federal Trade Commission. The vulnerability in the software, which is used for remote administration of hosted servers at a large number of Internet hosting companies, could spell bad news for hosting providers who haven't applied the latest updates, as well as their customers.
Because the vulnerability allows someone to make significant changes to the user accounts, files, and security of a targeted site, hackers who took advantage of the Plesk vulnerability may still have access to sites they have breached even after patches are applied. If your site is hosted with a provider that uses Plesk for site administration, it's worth taking a good look at the content on your server, and the accounts configured to access it—and resetting all your accounts' passwords.

 
Design by gitstein | Bloggerized by Kuldeep