uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 19 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   work   user   process   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   camera   material   access   customer   travel   test   standard   review   documentation   css   money   engineering   webdesign   engine   develop   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   app   content   yacht   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   easy   live   google   resource   operation   startup   monitor   training  


Tag selected: hack.

Clear all

Showing 19 results.

Looking up hack tag. Showing 19 results. Clear

Protecting Your Cookies: HttpOnly

https://blog.codinghorror.com/protecting-your-cookies-httponly/

Saved by uncleflo on June 30th, 2017.

So I have this friend. I've told him time and time again how dangerous XSS vulnerabilities are, and how XSS is now the most common of all publicly reported security vulnerabilities -- dwarfing old standards like buffer overruns and SQL injection. But will he listen? No. He's hard headed. He had to go and write his own HTML sanitizer. Because, well, how difficult can it be? How dangerous could this silly little toy scripting language running inside a browser be?

security horror protect write dangerous difficult vulnerable story blog explanation howto steal session script inject website administration escape xss hack


StopTheHacker

https://www.stopthehacker.com/

Saved by uncleflo on June 27th, 2017.

Based in San Francisco, California, StopTheHacker is one of the tech industry’s most respected leaders; a provider of SaaS services focused on cyber warfare in the arenas of web malware, security and reputation protection. StopTheHacker’s Artificial Intelligence and Machine Learning based technology is supported by the National Science Foundation and has won multiple awards since 2009. StopTheHacker has become widely recognized globally, protecting website owners ranging from large multi-nationals to web hosting companies and small business owners, all who are vulnerable to malicious hacker attacks.

reputation website hacker prevention security hack technology industry company support service cyberattack warfare online internet global protect administration prevent preventative saas lookup list analysis web blacklist award


Information Security Stackexchange

https://security.stackexchange.com/

Saved by uncleflo on June 27th, 2017.

Q&A for information security professionals. Ask questions and get answers on any and all information security related topics.

information security information security question answer stackexchange problem incident reference lookup technical business hacker hack community solve solution topic professional relate computer server linux windows os operating system site database advice


Cloud Antivirus, Endpoint, UTM, Encryption, Mobile, DLP, Server, Web, Wireless Security, Network Storage and Next-Gen Firewall Solutions | Sophos Data Protection for Business

https://www.sophos.com/

Saved by uncleflo on April 2nd, 2015.

IT security products have become as complex as the networks they’re trying to secure. At Sophos we know that the solution to complexity is not more complexity. We tackle security challenges with clarity and confidence, knowing that simple security is better security.

security antivirus utm encryption server web wireless dlp endpoint protection business network service resell confidence secure solution administration complex product online hack crack break computer it technology


owasp-esapi-php - Project Hosting on Google Code

https://code.google.com/p/owasp-esapi-php/

Saved by uncleflo on February 22nd, 2015.

Don’t write your own security controls! Reinventing the wheel when it comes to developing security controls for every web application or web service leads to wasted time and massive security holes. The OWASP Enterprise Security API (ESAPI) Toolkits help software developers guard against security‐related design and implementation flaws.

esapi owasp php security google code development safe net host project hole toolkit software server hack design implementation enterprise control flaw


Foolproof HTML escaping in Javascript - #! (shebang)

http://shebang.brandonmintern.com/foolproof-html-escaping-in-javascript/

Saved by uncleflo on February 22nd, 2015.

As any good web developer knows, it's important to be constantly vigilant with the handling of user data. We avoid buffer overflows and format string exploits (remember those?) by using safer languages or being careful in our C. To avoid SQL injection, we never build database queries by concatenating user-supplied data. These measures protect the integrity of the data on our servers, but what about our (non-malicious) users?

javascript escape html json ajax hack foolproof approach development web integrity server user security safe malicious administration


HTML Purifier XSS Attacks Smoketest

http://htmlpurifier.org/live/smoketests/xssAttacks.php

Saved by uncleflo on January 20th, 2015.

A list of XSS attack to check for. Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed.

security javascript html web test attack reference xss hack crack development check list


Secure Cookies: The HttpOnly Flag | Security Musings

http://securitymusings.com/article/909/secure-cookies-the-httponly-flag

Saved by uncleflo on January 20th, 2015.

Cross Site Scripting (XSS) vulnerabilities can be pretty dangerous. On web applications, they can lead to everything from breaches in privacy to complete account compromisation. One of the many ways that attackers can take advantage of XSS holes is by reading the information stored in the browser cookies and using it to impersonate a legitimate user. To the vulnerable site, there is usually no difference between the credentials provided by the real user and those provided by an attacker– so everything looks peachy on the surface.

xss attack hack crack cookie protect secure security http script web browser limit regular header server development administration privacy account flag operation httponly apache


samy is my hero.

http://fast.info.nyud.net:8090/myspace/

Saved by uncleflo on January 20th, 2015.

A few months back, I decided to make a permanent myspace account so that I could easily view pictures of random girls whenever I please without creating a new account each time. I also had a number of friends on there and figured I would see what all the hype was about. Myspace is a site for keeping up with friends, meeting new people, and even getting laid (sorry ladies, I'm taken.) It allows you to set up a profile/web page with a limited ability to make it look and feel how you wanted. Too limiting. I couldn't even fit a good line into my "headline" without taking words out and sounding like G.W.B. trying to respond to an arbitrary question. Hell, I couldn't even fit more than 12 glamour shots on my photos page. Like an illegal alien with a plan, I ventured to evade these limiting borders.

myspace hack crack user web funny humor profile restrict effect people headline cool girl account question story howto security vulnerability


Wireshark · Go Deep.

https://www.wireshark.org/

Saved by uncleflo on November 14th, 2014.

Co-founded by Laura Chappell, inspirational instructor, consultant, and Wireshark expert, provides training, Network Analyst Certification, and resources for all levels of Wireshark users.

security network tools hack hacking software packet communication deep wire shark winpcap win windows analyse training instructor program install opensource code book capture


30 Cool Open Source Software I Discovered in 2013

http://www.cyberciti.biz/open-source/30-cool-best-open-source-softwares-of-2013/

Saved by uncleflo on August 9th, 2014.

These are full-featured open source software products, free as in beer and speech that I started to use recently. Vivek Gite picks his best open source software of 2013.

software linux tools free source opensource open source operating system tool utility discover good link project idea product list reference interest interesting tutorial hack feature cool great useful tip wishlist howto installation open-source development photography administration productive developer office


Review: DigitalPersona U.are.U Personal fingerprint scanner.

http://www.dansdata.com/uareu.htm

Saved by uncleflo on June 4th, 2014.

Biometric authentication seems to be, on the face of it, a groovy idea. Do away with hard-to-remember passwords and easy-to-lose keys and cards; authenticate your identity with your voice, or your face, or your fingerprint. What could possibly be wrong with that? Well, lots of things, actually. High on the list is the fact that if biometric authentication is compromised - if someone finds a way to fake your voice or face or finger - you're up a brown and smelly creek without any way to propel your barbed wire canoe.

biometrics hardware security information crack hack break system finger surface digital pesonal howto scan scanner fingerprint print


Heavily Customizing a Bootstrap Typeahead • FusionGrokker

http://fusiongrokker.com/post/heavily-customizing-a-bootstrap-typeahead

Saved by uncleflo on February 11th, 2014.

What follows is a (long) chronicle of my adventures customizing a Bootstrap Typeahead control to fit my needs. I can't claim that this is an ordained methodology because the documentation is pretty scant on what exactly you can and can't do with them; but it works and my changes will be used in production very soon.

development javascript bootstrap customize control html guide howto hack display jquery typeahead dropdown data


Forge of Empires Hack v 5.3 2013 - this4u.eu

http://this4u.eu/forge-empires-hack-v-5-3-2013

Saved by uncleflo on September 14th, 2013.

THIS HACK IS DETECTABLE, AND USERS HAVE BEEN BANNED ! Forge of Empires Hack v 5.3 works very well. The tool we have developed is safe to use. Forge of Empires Hack works very quickly without any problems. Testing tools were held in many countries. All the tests that we conducted were successful. Forge of Empires Hack v 5.3 works on all operating systems. Its advantage is to generate: Forge Points, Gold, Supplies and Diamonds. See? We managed to create a tool that adds diamonds! Now your enemies see who rules in the area. Why do you think many players moving up fast in the rankings? Oh yes - you should already know the answer. See you in game!

forge empires game online hack point tool cheat code area ranking enemy gold ban system guarantee browser advantage


None

http://danwalsh.livejournal.com/30084.html

Saved by uncleflo on August 24th, 2013.

When we first designed targeted policy, we defined a domain that allowed users and administrators to login and have the same access privileges they would have had if SELinux was disabled. Similarly, we wanted to allow third party applications to be installed and run without requiring the administrator/user to write special policy rules for these applications. They would just work.

idea application crack security type blog hacker kernel linux selinux break hack rule administrator context fedora


Using Vegetable oil as a diesel fuel - introduction

http://www.vegetableoildiesel.co.uk/introduction.html

Saved by uncleflo on July 14th, 2013.

A very clever man called Rudolf Diesel invented a new type of engine that operated at a higher compression ratio and didn't have spark plugs. The first thing that he noticed was that it was about 30% more efficient than a petrol engine and, also, he could run it on vegetable oil! Very quickly, the engine became adapted for use with fossil fuels since they were, and still are, very much cheaper than vegetable oil and Rudolf's second idea became forgotten.

vegetable oil engine burn study discussion blog information efficiency fossil fuel cheap price hack convert government introduction diesel alternative


Unshredder - Document Reconstruction Software

http://www.unshredder.com/

Saved by uncleflo on September 6th, 2011.

Unshredder is a simple program that unleashes the power of a desktop computer to reduce the time consumed by investigators reconstructing shredded documentary evidence. Until now the only alternative to manual processing was to engage a third party to process the work on computers at their premises. By comparison to external processing of the evidence Unshredder reduces the turnaround time, keeps full control of the investigation in-house and there is less risk of a security risk or loss of the evidence. The original shreds remain unchanged from the process and the integrity of the original is captured electronically to be printed or despatched electronically by wire or disc.

unshredder security software digital hacking hack tools paper scan shredding scanning reconstruction risk management secret inhouse electronic papers pieces evidence


Change Screen Brightness From Terminal

http://wilmor24.wordpress.com/2010/05/11/change-screen-brightness-from-terminal-ubuntu-10-04/

Saved by uncleflo on August 2nd, 2011.

If you want to change the screen brightness in Ubuntu (I can’t change it using the keyboard shortcuts or the Ubuntu Power Management menu), open a terminal and execute the following.

linux ubuntu hack terminal brightness screen laptop tips information solution


MD5 Hash for "yahoo" and its variants. Reverse look-up.

http://wordd.org/241FE8AF1E038118CD817048A65F803E

Saved by uncleflo on January 24th, 2011.

wordd.org offers the ability to find out reverse look-up salt-less md5 hashed words such as "yahoo" and a set of common variants. This is not intended as a tool to hack passwords, but to recover them from databases such as wordpress that store unsalted hashes. Got salt? Salting means prepending or appending a letter or word to a your object prior to hashing it. In theory this makes sites like this one useless, as common hashes cannout be anticipated. It is recommended that everyone salts passwords before hashing. This prevents brute-force cracking to say the least.

salt hash php development regex recover hack


No further bookmarks found.