
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 19 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile work user process database share manage hardware professional buy industry internet dance advice installation developer 3d search camera material access customer travel test standard review documentation css money engineering webdesign engine develop device photography digital api speed source program management phone discussion question event client story simple water marketing app content yacht setup package fast idea interface account communication cheap compare script study market easy live google resource operation startup monitor training
Tag selected: hack.
Looking up hack tag. Showing 19 results. Clear
Saved by uncleflo on June 30th, 2017.
So I have this friend. I've told him time and time again how dangerous XSS vulnerabilities are, and how XSS is now the most common of all publicly reported security vulnerabilities -- dwarfing old standards like buffer overruns and SQL injection. But will he listen? No. He's hard headed. He had to go and write his own HTML sanitizer. Because, well, how difficult can it be? How dangerous could this silly little toy scripting language running inside a browser be?
security horror protect write dangerous difficult vulnerable story blog explanation howto steal session script inject website administration escape xss hack
Saved by uncleflo on June 27th, 2017.
Based in San Francisco, California, StopTheHacker is one of the tech industry’s most respected leaders; a provider of SaaS services focused on cyber warfare in the arenas of web malware, security and reputation protection. StopTheHacker’s Artificial Intelligence and Machine Learning based technology is supported by the National Science Foundation and has won multiple awards since 2009. StopTheHacker has become widely recognized globally, protecting website owners ranging from large multi-nationals to web hosting companies and small business owners, all who are vulnerable to malicious hacker attacks.
reputation website hacker prevention security hack technology industry company support service cyberattack warfare online internet global protect administration prevent preventative saas lookup list analysis web blacklist award
Saved by uncleflo on June 27th, 2017.
Q&A for information security professionals. Ask questions and get answers on any and all information security related topics.
information security information security question answer stackexchange problem incident reference lookup technical business hacker hack community solve solution topic professional relate computer server linux windows os operating system site database advice
Saved by uncleflo on April 2nd, 2015.
IT security products have become as complex as the networks they’re trying to secure. At Sophos we know that the solution to complexity is not more complexity. We tackle security challenges with clarity and confidence, knowing that simple security is better security.
security antivirus utm encryption server web wireless dlp endpoint protection business network service resell confidence secure solution administration complex product online hack crack break computer it technology
Saved by uncleflo on February 22nd, 2015.
Don’t write your own security controls! Reinventing the wheel when it comes to developing security controls for every web application or web service leads to wasted time and massive security holes. The OWASP Enterprise Security API (ESAPI) Toolkits help software developers guard against security‐related design and implementation flaws.
esapi owasp php security google code development safe net host project hole toolkit software server hack design implementation enterprise control flaw
Saved by uncleflo on February 22nd, 2015.
As any good web developer knows, it's important to be constantly vigilant with the handling of user data. We avoid buffer overflows and format string exploits (remember those?) by using safer languages or being careful in our C. To avoid SQL injection, we never build database queries by concatenating user-supplied data. These measures protect the integrity of the data on our servers, but what about our (non-malicious) users?
javascript escape html json ajax hack foolproof approach development web integrity server user security safe malicious administration
Saved by uncleflo on January 20th, 2015.
A list of XSS attack to check for. Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed.
security javascript html web test attack reference xss hack crack development check list
Saved by uncleflo on January 20th, 2015.
Cross Site Scripting (XSS) vulnerabilities can be pretty dangerous. On web applications, they can lead to everything from breaches in privacy to complete account compromisation. One of the many ways that attackers can take advantage of XSS holes is by reading the information stored in the browser cookies and using it to impersonate a legitimate user. To the vulnerable site, there is usually no difference between the credentials provided by the real user and those provided by an attacker– so everything looks peachy on the surface.
xss attack hack crack cookie protect secure security http script web browser limit regular header server development administration privacy account flag operation httponly apache
Saved by uncleflo on January 20th, 2015.
A few months back, I decided to make a permanent myspace account so that I could easily view pictures of random girls whenever I please without creating a new account each time. I also had a number of friends on there and figured I would see what all the hype was about. Myspace is a site for keeping up with friends, meeting new people, and even getting laid (sorry ladies, I'm taken.) It allows you to set up a profile/web page with a limited ability to make it look and feel how you wanted. Too limiting. I couldn't even fit a good line into my "headline" without taking words out and sounding like G.W.B. trying to respond to an arbitrary question. Hell, I couldn't even fit more than 12 glamour shots on my photos page. Like an illegal alien with a plan, I ventured to evade these limiting borders.
myspace hack crack user web funny humor profile restrict effect people headline cool girl account question story howto security vulnerability
Saved by uncleflo on November 14th, 2014.
Co-founded by Laura Chappell, inspirational instructor, consultant, and Wireshark expert, provides training, Network Analyst Certification, and resources for all levels of Wireshark users.
security network tools hack hacking software packet communication deep wire shark winpcap win windows analyse training instructor program install opensource code book capture
Saved by uncleflo on August 9th, 2014.
These are full-featured open source software products, free as in beer and speech that I started to use recently. Vivek Gite picks his best open source software of 2013.
software linux tools free source opensource open source operating system tool utility discover good link project idea product list reference interest interesting tutorial hack feature cool great useful tip wishlist howto installation open-source development photography administration productive developer office
Saved by uncleflo on June 4th, 2014.
Biometric authentication seems to be, on the face of it, a groovy idea. Do away with hard-to-remember passwords and easy-to-lose keys and cards; authenticate your identity with your voice, or your face, or your fingerprint. What could possibly be wrong with that? Well, lots of things, actually. High on the list is the fact that if biometric authentication is compromised - if someone finds a way to fake your voice or face or finger - you're up a brown and smelly creek without any way to propel your barbed wire canoe.
biometrics hardware security information crack hack break system finger surface digital pesonal howto scan scanner fingerprint print
Saved by uncleflo on February 11th, 2014.
What follows is a (long) chronicle of my adventures customizing a Bootstrap Typeahead control to fit my needs. I can't claim that this is an ordained methodology because the documentation is pretty scant on what exactly you can and can't do with them; but it works and my changes will be used in production very soon.
development javascript bootstrap customize control html guide howto hack display jquery typeahead dropdown data
Saved by uncleflo on September 14th, 2013.
THIS HACK IS DETECTABLE, AND USERS HAVE BEEN BANNED ! Forge of Empires Hack v 5.3 works very well. The tool we have developed is safe to use. Forge of Empires Hack works very quickly without any problems. Testing tools were held in many countries. All the tests that we conducted were successful. Forge of Empires Hack v 5.3 works on all operating systems. Its advantage is to generate: Forge Points, Gold, Supplies and Diamonds. See? We managed to create a tool that adds diamonds! Now your enemies see who rules in the area. Why do you think many players moving up fast in the rankings? Oh yes - you should already know the answer. See you in game!
forge empires game online hack point tool cheat code area ranking enemy gold ban system guarantee browser advantage
Saved by uncleflo on August 24th, 2013.
When we first designed targeted policy, we defined a domain that allowed users and administrators to login and have the same access privileges they would have had if SELinux was disabled. Similarly, we wanted to allow third party applications to be installed and run without requiring the administrator/user to write special policy rules for these applications. They would just work.
idea application crack security type blog hacker kernel linux selinux break hack rule administrator context fedora
Saved by uncleflo on July 14th, 2013.
A very clever man called Rudolf Diesel invented a new type of engine that operated at a higher compression ratio and didn't have spark plugs. The first thing that he noticed was that it was about 30% more efficient than a petrol engine and, also, he could run it on vegetable oil! Very quickly, the engine became adapted for use with fossil fuels since they were, and still are, very much cheaper than vegetable oil and Rudolf's second idea became forgotten.
vegetable oil engine burn study discussion blog information efficiency fossil fuel cheap price hack convert government introduction diesel alternative
Saved by uncleflo on September 6th, 2011.
Unshredder is a simple program that unleashes the power of a desktop computer to reduce the time consumed by investigators reconstructing shredded documentary evidence. Until now the only alternative to manual processing was to engage a third party to process the work on computers at their premises. By comparison to external processing of the evidence Unshredder reduces the turnaround time, keeps full control of the investigation in-house and there is less risk of a security risk or loss of the evidence. The original shreds remain unchanged from the process and the integrity of the original is captured electronically to be printed or despatched electronically by wire or disc.
unshredder security software digital hacking hack tools paper scan shredding scanning reconstruction risk management secret inhouse electronic papers pieces evidence
Saved by uncleflo on August 2nd, 2011.
If you want to change the screen brightness in Ubuntu (I can’t change it using the keyboard shortcuts or the Ubuntu Power Management menu), open a terminal and execute the following.
linux ubuntu hack terminal brightness screen laptop tips information solution
Saved by uncleflo on January 24th, 2011.
wordd.org offers the ability to find out reverse look-up salt-less md5 hashed words such as "yahoo" and a set of common variants. This is not intended as a tool to hack passwords, but to recover them from databases such as wordpress that store unsalted hashes. Got salt? Salting means prepending or appending a letter or word to a your object prior to hashing it. In theory this makes sites like this one useless, as common hashes cannout be anticipated. It is recommended that everyone salts passwords before hashing. This prevents brute-force cracking to say the least.
No further bookmarks found.