By Galen Gruman Remember when we all loved Google? Its search engine was both simple to use and an unbiased portal to anything you wanted to know. It was founded by two college students at a time when Silicon Valley was a shining beacon of what...
Wednesday, April 16, 2014
6:37 AM
THE DARK SIDE OF GOOGLE YOU NEVER KNEW: WAS IN GMAIL
NULL
1 comment
I recently wrote about Google’s Street View program, and how after a series of investigations in the US and Europe, we learned that Google had used its Street View cars to carry out a covert — and certainly illegal — espionage operation on a global scale, siphoning loads...
Friday, April 11, 2014
2:39 PM
MICROSOFT LAUNCHES FREE OPEN SOURCE OS AN RELEASES SOURCE CODE FOR .NET
Microsoft hasn't been very open, but under new management of CEO Satya Nadella, the company might be heading towards the open direction like, Google's open source This was gotten from CNET NEWS, MICROSOFT'S JOURNEY TO AN OPEN SOURCE .NET Microsoft's decision to open-source more of its .Net platform...
2:28 PM
SSL/TLS COMPROMISED HOW TO FIX OPEN SOURCE OPENSSL HEARTBLEED BUG
Recently a bug was found in the popular cryptographic software library Openssl This information was gotten from the official documentation on Heartbleed.com The Heartbleed Bug The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal...
Saturday, March 22, 2014
5:33 AM
DEFACING ANY WEBSITE USING GOOGLE

HERE ARE JUST A FEW GOOGLE DORKS THAT CAN BE USED FOR SQL INJECTIONS THIS POST IS NOT FOR NEWBIES ON THE INTERNET, ONLY FOR THOSE WHO UNDERSTAND WHAT SQL INJECTIONS ARE AND HOW THEY ARE USED. . aftr 6line ad dis at d end you can find...
4:49 AM
THE BEST HACKING BOOKS YOU MUST READ TO BECOME A HACKER

Hacking is considered to be a two-way tool wherein a computer system is penetrated either to make it more secure or to create mischief. Ethical hacking is defined as making use of programming skills, so as to penetrate a computer system, and determine its vulnerabilities. The ethical hackers...
Subscribe to:
Posts (Atom)