Showing headlines posted by justashik4u

( 1 ... 2 ) Next »

False Alarm: XSS Vulnerability in WordPress 3.2.1

Dear Friends, My earlier post about the XSS vulnerability in WordPress 3.2.1 turned out to be a False Alarm. I am sorry for the inconvenience. My Intentions were to make all you guys aware of this vulnerability so that you could save your blog from being hacked.

XSS Injection Vulnerability in WordPress 3.2.1

Bad news for just about every wordpress blogger out there. Thousands of wordpress 3.2.1 installations are at risk of being compromised. It has been found that the latest version 3.2.1 of WordPress, an extremely popular suite of tools for powering blogs, is vulnerable to XSS injection attack which allows users to inject malicious javascript due to failure to sanitise the comments feild. Without discussing much about what this vulnerability could do to your blog I will jump to how it works and the solution.

How to Change the Position of Control Buttons in Ubuntu

As you know that in windows the control button like maximize, minimize and close are at right side of window but in ubuntu these are at left side, so today i will show you a small trick to take these buttons to right.

SQL Injection Using Havij

SQL Injection can be done manually or via automatic tools. Automatic tools are easy to use and do not require much technical knowledge. In this tutorial we will discuss Havij. Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page

Hack a Website Using Remote File Inclusion

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it.

Create your own Proxy Server instantly

I had a lot of trouble in last few weeks with a company’s browsing restrictions. It used an extensive directory of ‘forbidden websites’ that kept out all but a few popular sites. In effect, no games sites, no personal email, and no Hacking Truths. None of the conventional proxy servers worked, and even Google Translate failed. My hopes were down until, yesterday, I discovered that one of my personal domains could be accessed. Back on my home computer, in a matter of minutes, I had set up my own functioning proxy server. With the instructions below, so can you.

VLC 1.1.0 for Linux – Complete Review

As always, VideoLAN has come up with interesting tweaks, updates and enhancements to its all popular VLC media player with the release of version 1.1.0.

3 Amazing Firefox Hacks

What good is a browser unless you can tweak it, hack it and bend it to your will? No good at all. The more you can hack it, the better it is. And that means that Firefox must be a great browser as when ever you feel that you know everything about it you come across a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. So today I have come up with 3 amazing firefox tricks you might not be aware of.

Access Google from your Terminal

This weekend, Google proudly announced GoogleCL, a set of new command-line tools for some of its popular services, such as Google Calendar, Google Docs, Blogger, YouTube and Picasa. GoogleCL will allow you to upload photos to Picasa and videos to YouTube, add Google Calendar events or contacts on Google Contacts, edit Google Docs documents or post on your Blogger blog… all straight from the Linux terminal. Well, you will say now… “Who needs this stuff? We are in mid 2010 and command-line is for geeks only.” You are right! But this is a very good opportunity for some developers to create a nice graphical user interface (GUI) for this command-line tool.

Adobe fixes the Flash Bug with a Massive Update

Adobe has released a Flash Player update that fixes a flurry of vulnerabilities including a critical zero-day flaw (CVE-2010-1297) that has been actively exploited in attacks since last week. In addition to the numerous security patches, the new Flash player 10.1.53.64 version brings major functionality and performance improvements.

New Flash Bug Exploited By Hackers : How to avoid it?

A new attack on a Flash bug has surfaced that would give attackers control of a victim’s computer after crashing it, reports PC World. Adobe put out a Security Advisory about this on June 4. It is categorized as a critical issue and all operating systems with Flash are vulnerable including Windows, Linux, and Apple and it is also found in the recent versions of Reader and Acrobat.

Why are you Scared of Linux?

Most of the people I know think Linux is very difficult for a layman to understand. They fear that after installing Linux they will not be able to do the normal tasks they do with Windows and thus they prefer paying money to Microsoft instead of even trying Linux.

How to Recover Important Data after your System is Crashed

  • hungry-hackers.com; By Ashik (Posted by justashik4u on May 23, 2010 4:55 AM EDT)
  • Story Type: Tutorial
Suppose your computer commits suicide by inviting the latest virus and you are not able to get it back up and running. As a last resort you decide to backup your important documents, photos that you took of your girl friend and the ASCII text file containing your passwords. Today I will show how to do this very easily.

How to Install any Linux on a USB

There are so many reasons why having a Linux distribution on a USB drive can come in handy. From having a “rescue” OS on your keyring to being able to install a new distribution on your EeePC, a “thumb drive” Linux has many uses. But getting Linux onto a USB drive can’t be simple. Right? Wrong. There is a tool, UNetbootin, that makes installing Linux on a USB drive simple. UNetbootin can be used on either Linux or Windows. In this article, we’ll be illustrating it for Both.

How to Keep Your Ubuntu System Clean

If you are an geeky user who keeps installing various software and updates then with the passage of time you will feel that your system is messed up. Here is what you need to do.

Google Talk Cheat Sheet

Are you crazy about Google Talk. Do you want to be become a master of Google Talk? Then here is a source for you to know each and every secret of Google Talk. I think this is a complete list of tips, tricks, hacks, howto’s, keyboard shortcuts and few miscellaneous facts about Google Talk.

7 Alternatives for Microsoft Office

Microsoft Office is one of the most popular application suits which no doubt facilitates the users to the full extent. But due to its high price or due to any compatibility issue with the operating system, it is always desirable to have some alternatives. Lets have a summarized look on the available alternatives.

43 Excellent Wordpress Security Tips & Plugins

  • hungry-hackers.com (Posted by justashik4u on Jan 12, 2010 7:11 PM EDT)
  • Story Type: Reviews
After putting in all of the time, and perhaps money, into your Wordpress website or blog, its now time to secure and protect it from outside enemies and general bad guys: hackers, spammers and all round tossers. Here, I have listed some wordpress security tips and plugins that you can use to secure WordPress blog.

List of all the SQL Injection Strings

SQL injection attacks are executed via front-end Web applications that don’t properly validate user input. SQL Injection attack includes use of some interesting Strings which when formed and used properly act as tool for Cracking a Website. This tutorial is not going to go into detail on why these string work but it will show you how you can form and use these Strings which can be used to crack a website.

How to Hack passwords using a USB

Have you ever thought that a Simple USB Drive can be used as a Destructive Tool for Hacking Passwords? Today I will show you how to hack Passwords using an USB Pen Drive.

( 1 ... 2 ) Next »