Monday, 2019-10-14, 8:40 PM
TechGeenix MainRegistrationLogin
Welcome Guest | RSS
Site menu
Section categories
Computer tricks and tips [5]
Advanced Computing [6]
H4ckers' Z0n3 [8]
Statistics

Total online: 1
Guests: 1
Users: 0
Login form
  
Main » 2012 » August » 28

SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organisations. It is perhaps one of the most common application layer attack techniques used today.
Web applications allow legitimate website visitors to submit and retrieve data to/from a database over the Internet using their preferred web browser.
Databases are central to modern websites – they store data needed for websites to deliver specific content to visitors and render information to customers, suppliers, employees and a host of stakeholders. User credentials, financial and payment information, company statistics may all be resident within a database and accessed by legitimate users through off-the-shelf and custom web applications. Web applications and databases allow you to regularly run your business.
SQL Injection is the hacking technique which attempts to pass SQL commands through a web app ... Read more »
Views: 594 | Added by: geenix | Date: 2012-08-28 | Comments (0)


1. What is a Keylogger?
A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.
2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the target computer.
Let’s take up a small example: The user on the target computer goes tohttp://mail.yahoo.com and types his "username” and the "password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured " ... Read more »
Category: H4ckers' Z0n3 | Views: 900 | Added by: geenix | Date: 2012-08-28 | Comments (0)

The 10 of may the backtrack team has released the version number 5 (codename "revolution”) of their penetration tool.
Yes backtrack it’s a live Linux Distribution made with this goal, be the best penetration and learning tool around.
It’s Based on Ubuntu Lucid LTS (10.04). Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant. In this release you can choose to have Gnome or KDE and install it on 32 or 64 bit computer. The former release supported only 32 bit installation.
... Read more »
Category: H4ckers' Z0n3 | Views: 1570 | Added by: geenix | Date: 2012-08-28 | Comments (0)


Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking ... Read more »
Category: H4ckers' Z0n3 | Views: 843 | Added by: geenix | Date: 2012-08-28 | Comments (0)

Search
Calendar
«  August 2012  »
SuMoTuWeThFrSa
   1234
567891011
12131415161718
19202122232425
262728293031
Entries archive
Site friends
  • Create a free website
  • Online Desktop
  • Free Online Games
  • Video Tutorials
  • All HTML Tags
  • Browser Kits
  • Copyright k4ll0l © 2019