Code:
@echo off |
Cryptocat is an open source web application intended to allow secure, encrypted online chatting. Cryptocat encrypts chats on the client side, only trusting the server with data that is already encrypted. Cryptocat is offered as an app for Mac OS X or as a browser extension for Google Chrome,Mozilla Firefox and Apple Safari. |
|
Hello friends i am back again, but this time with something big, today we will talk about a web vulnerability known as Cross Site Scripting aka XSS. |
Hello Friends yea i knw its a long time i havnt share anything new with you , but today you gona love this post for sure :). so what this post is all about ? well as we all know WEP encryptions are easy to crack and hence can be vulreable if applied as security on your wireless devices beacuse it does not required a hard job to exploit , but when it comes to talk about WPA and WPA-2 then obviously its bit hard beacuse till now everyone knows that We can crack WPA and WPA 2 with only dictionary attack, yes i write it as TILL NOW :) , beacause security researchers now come up with a new solution to crack down WPA and WPA-2 encryption without any dictionary attack and also via a very easy manner.
So in this post i am sharing a new method for cracking WPA and WPA-2 to test the security of your wireless devices. Before we proceed first lets understand what do you mean by WEP, WPA and WPA-2 encyptions. ... Read more » |
Dive InBuckle up and brace yourselves to experience the awesomely amazing life-like 3D picture quality without the need of any 3D glasses! Here's the first look. Naked Eye 3D Explosive Screen Enter a whole new era of entertainment with the Canvas 3D! Now bring alive all your entertainment on a 12.7CM 3D screen that does not require 3D glasses for viewing! Capture Pictures and Videos in 3D now Capture all your favorite moments in supreme clarity with its 5MP camera & put a face to all your chats with its 0.3 MP front facing camera. Record videos, click images and do much more with you ... Read more » |
What is SSL ? |
Was ill today but was not finding myself comfortable so decided to write this post. This post will reveal the real way of tracing the lost cell phone. If you Google trace lost cell phone you will find lots of blogs having the procedure to get it back but unfortunately , from 100 posts 90% are failed to impress me so I decided to write It by my own in simple words so that will be easy for all of you to understand.
So let’s start as you discovered that your cell phone is missing then following are the steps you should follow to get it back. 1.You should have I IMEI number code for the lost mobile. If you didn’t noted down before then no worries just get the cell phone box and look for IMEI number it should be there. ... Read more » |
Defending any server from DDoS is always like , protecting a virgin on a lonely island from 100 rapists. But we have a effective method to stop these brutal f*cking to protect our respective Apache web server. Here we have one Apache module called Mod_evasive, Mod_evasive is an Apache unit that is intended to boundary the shock of unusual types of attacks like Distributed Denial of Services Attack or may be brute force on your web site/server. while incorporated with iptables, mod_evasive can set up to even larger attacks. The component detect attack by creating an domestic hash of IP Addresses and URIs, and denying any single IP address from executing request a page more than the allowed times per second, make more than 50 concurrent requests per second on the same child process, make a single request while blacklisted
On an ... Read more » |