<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Hacking Articles</title>
		<link>http://shehab3451.ucoz.de/</link>
		<description></description>
		<lastBuildDate>Tue, 13 Dec 2011 13:41:52 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://shehab3451.ucoz.de/news/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>Hack a Website using Directory Transversal Attack</title>
			<description>&lt;b&gt;What is root directory of web server ?&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
It is a specific directory on server in which the web contents are 
placed and can be seen by website visitors. The directories other that 
root may contain any sensitive data which administrator do not want 
visitors to see. Everything accessible by visitor on a website is&amp;nbsp; 
placed in root directory. The visitor can not step out of root 
directory.&lt;br&gt;
&lt;br&gt;
&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;b&gt;what does ../ or ..&amp;#92; (dot dot slash) mean&amp;nbsp; ? &lt;/b&gt;&lt;br&gt;
&lt;br&gt;
The ..&amp;#92; instructs the system to go one directory up. For example, we are at this location &lt;b&gt;C:&amp;#92;xx&amp;#92;yy&amp;#92;zz&lt;/b&gt;. On typing ..&amp;#92; , we would reach at C:&amp;#92;xx&amp;#92;yy.&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/_fMrF3L8CTmg/TKBKiLMtFlI/AAAAAAAAA-I/ygCit6KC100/s1600/d1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;http://1.bp.blogspot.com/_fMrF3L8CTmg/TKBKiLMtFlI/AAAAAAAAA-I/ygCit6KC100/s1600/d1.jpg&quot;...</description>
			<content:encoded>&lt;b&gt;What is root directory of web server ?&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
It is a specific directory on server in which the web contents are 
placed and can be seen by website visitors. The directories other that 
root may contain any sensitive data which administrator do not want 
visitors to see. Everything accessible by visitor on a website is&amp;nbsp; 
placed in root directory. The visitor can not step out of root 
directory.&lt;br&gt;
&lt;br&gt;
&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;b&gt;what does ../ or ..&amp;#92; (dot dot slash) mean&amp;nbsp; ? &lt;/b&gt;&lt;br&gt;
&lt;br&gt;
The ..&amp;#92; instructs the system to go one directory up. For example, we are at this location &lt;b&gt;C:&amp;#92;xx&amp;#92;yy&amp;#92;zz&lt;/b&gt;. On typing ..&amp;#92; , we would reach at C:&amp;#92;xx&amp;#92;yy.&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/_fMrF3L8CTmg/TKBKiLMtFlI/AAAAAAAAA-I/ygCit6KC100/s1600/d1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;http://1.bp.blogspot.com/_fMrF3L8CTmg/TKBKiLMtFlI/AAAAAAAAA-I/ygCit6KC100/s1600/d1.jpg&quot; border=&quot;0&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;
Again on typing&lt;b&gt; ..&amp;#92; &lt;/b&gt;, we would rech at &lt;b&gt;C:&amp;#92;xx &lt;/b&gt;.&amp;nbsp; &lt;br&gt;
&lt;br&gt;
Lets again go at locatio&lt;b&gt;n C:&amp;#92;xx&amp;#92;yy&amp;#92;zz&lt;/b&gt;. Now suppose we want to access a text file abc.txt placed in folder xx. We can type&lt;b&gt; ..&amp;#92;..&amp;#92;abc.txt&lt;/b&gt; . Typing ..&amp;#92; two times would take us two directories up (that is to directory xx) where abc.txt is placed.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Note : Its ..&amp;#92; on windows and ../ on UNIX like operating syatem.&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
&lt;b&gt;What is Directory Transversel attack?&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Directory Traversal is an HTTP exploit which allows attackers to access 
restricted directories and execute commands outside of the web server&apos;s 
root directory.&lt;br&gt;
&lt;br&gt;
The goal of this attack is&amp;nbsp; to access sensitive files placed on web 
server by stepping out of the root directory using dot dot slash .&lt;br&gt;
&lt;br&gt;
The following example will make clear everything&lt;br&gt;
&lt;br&gt;
Visit this website vulnerable to directory transversal attack&lt;br&gt;
&lt;br&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=notification.php&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=notification.php&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;br&gt;
This webserver is running on UNIX like operating system. There is a 
directory &apos;etc&apos; on unix/linux which contains configration files of 
programs that run on system. Some of the files are 
passwd,shadow,profile,sbin&amp;nbsp; placed in &apos;etc&apos; directory. &lt;br&gt;
&lt;br&gt;
The file&lt;b&gt; etc/passwd&lt;/b&gt; contain the login names of users and even passwords too.&lt;br&gt;
&lt;br&gt;
Lets try to access this file on webserver by stepping out of the root 
directory. Carefully See the position of directories placed on the 
webserver. &lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/_fMrF3L8CTmg/TKBLBOponsI/AAAAAAAAA-M/2bVv6CUxJEk/s1600/d2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;http://2.bp.blogspot.com/_fMrF3L8CTmg/TKBLBOponsI/AAAAAAAAA-M/2bVv6CUxJEk/s400/d2.jpg&quot; border=&quot;0&quot; height=&quot;390&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;
We do not know the actual names and contents of directories except &apos;etc&apos; which is default name , So I have&lt;br&gt;
marked them as A,B,C,E or whatever. &lt;br&gt;
&lt;br&gt;
We are in directory in F accessing the webpages of website. &lt;br&gt;
&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../etc/passwd&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;br&gt;
&lt;/a&gt;&lt;br&gt;
Lets type this in URL field and press enter&lt;br&gt;
&lt;br&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=etc/passwd&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=etc/passwd&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;br&gt;
This will search the directory &apos;etc&apos; in F. But obviously, there is nothing like this in F, so it will return nothing&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Now type&lt;/b&gt;&lt;br&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../etc/passwd&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../etc/passwd&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;Now this will step up one directory (to directory E ) and look for &apos;etc&apos; but again it will return nothing.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Now type&amp;nbsp;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../../etc/passwd&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../../etc/passwd&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/_fMrF3L8CTmg/TKBLZnT8LyI/AAAAAAAAA-Q/DY5wDyp2M2Y/s1600/d3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br&gt;
&lt;/a&gt;&lt;/div&gt;Now this will step up two directories&lt;b&gt; (to directory D )&lt;/b&gt; and look for &apos;etc&apos; but again it will return nothing.&lt;br&gt;
&lt;br&gt;
So by proceeding like this, we we go for this URL &lt;br&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../../../../../etc/passwd&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.chitkara.edu.in/chitkara/chitkarauniversity.php?page=../../../../../etc/passwd&lt;/a&gt; &lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;br&gt;
It takes us 5 directories up to the main drive and then to &apos;&lt;b&gt;etc&lt;/b&gt;&apos; directory and show us contents of &apos;&lt;b&gt;passwd&lt;/b&gt;&apos; file.&lt;br&gt;&lt;span&gt;
To understand the contents of &apos;passwd&apos; file, visit &lt;a href=&quot;http://www.cyberciti.biz/faq/understanding-etcpasswd-file-format&quot; class=&quot;smarterwiki-linkify&quot;&gt;http://www.cyberciti.biz/faq/understanding-etcpasswd-file-format&lt;/a&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/_fMrF3L8CTmg/TKBLl-yeb9I/AAAAAAAAA-U/xRtC6IAFh3s/s1600/d3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img src=&quot;http://4.bp.blogspot.com/_fMrF3L8CTmg/TKBLl-yeb9I/AAAAAAAAA-U/xRtC6IAFh3s/s400/d3.jpg&quot; border=&quot;0&quot; height=&quot;367&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;
You can also view&lt;b&gt; etc/profile ,etc/services&lt;/b&gt; and many others files
 like backup files which may contain sensitive data. Some files like 
etc/shadow may be not be accessible because they are accesible only by 
privileged users.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;Note- If proc/self/environ would be accessible, you might upload a shell on server which is called as Local File Inclusion.&lt;/b&gt;&lt;br&gt;</content:encoded>
			<link>https://shehab3451.ucoz.de/news/hack_a_website_using_directory_transversal_attack/2011-12-13-24</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/hack_a_website_using_directory_transversal_attack/2011-12-13-24</guid>
			<pubDate>Tue, 13 Dec 2011 13:41:52 GMT</pubDate>
		</item>
		<item>
			<title>For twitter users: How to Put the New New Twitter Content Pane Back on the Left</title>
			<description>&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2011/12/image.png&quot; border=&quot;0&quot; alt=&quot;&quot;/&gt; &lt;br /&gt;&lt;br /&gt; If you’ve managed to get access to the newest version of the Twitter web site, also known as #NewNewTwitter, you might have noticed that the content is now on the right-hand side, which just feels unnatural. Here’s how to fix it in Chrome or Firefox. &lt;br /&gt;&lt;br /&gt; It’s pretty simple—all you need to do is install a quick user script. Chrome users can simply click the link, but Firefox users will need to install the &lt;a class=&quot;link&quot; href=&quot;https://addons.mozilla.org/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Greasemonkey&lt;/a&gt; extension first. Internet Explorer users… well, you’re out of luck. &lt;br /&gt;&lt;br /&gt; Disclaimer: This is a simple script and shouldn’t break your browser, but if it does, it’s not my fault. If you want to uninstall the user script, you’ll want to open up Tools –&gt; Extensions and you can disable it from there. Note: user scripts break all the time when the original site is...</description>
			<content:encoded>&lt;img src=&quot;http://www.howtogeek.com/wp-content/uploads/2011/12/image.png&quot; border=&quot;0&quot; alt=&quot;&quot;/&gt; &lt;br /&gt;&lt;br /&gt; If you’ve managed to get access to the newest version of the Twitter web site, also known as #NewNewTwitter, you might have noticed that the content is now on the right-hand side, which just feels unnatural. Here’s how to fix it in Chrome or Firefox. &lt;br /&gt;&lt;br /&gt; It’s pretty simple—all you need to do is install a quick user script. Chrome users can simply click the link, but Firefox users will need to install the &lt;a class=&quot;link&quot; href=&quot;https://addons.mozilla.org/addon/748&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Greasemonkey&lt;/a&gt; extension first. Internet Explorer users… well, you’re out of luck. &lt;br /&gt;&lt;br /&gt; Disclaimer: This is a simple script and shouldn’t break your browser, but if it does, it’s not my fault. If you want to uninstall the user script, you’ll want to open up Tools –&gt; Extensions and you can disable it from there. Note: user scripts break all the time when the original site is updated. This one is pretty simple, but if you are reading this next year, it probably won’t work. &lt;br /&gt;&lt;br /&gt; &lt;a class=&quot;link&quot; href=&quot;http://www.howtogeek.com/lowell/twitter-content-left.user.js&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Install the Fix Twitter: Move Content Pane Left user script&lt;/a&gt; (&lt;a class=&quot;link&quot; href=&quot;http://www.howtogeek.com/lowell/twitter-content-left.user.txt&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;view source&lt;/a&gt;)</content:encoded>
			<link>https://shehab3451.ucoz.de/news/for_twitter_users_how_to_put_the_new_new_twitter_content_pane_back_on_the_left/2011-12-12-23</link>
			<dc:creator>kzshantonu</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/for_twitter_users_how_to_put_the_new_new_twitter_content_pane_back_on_the_left/2011-12-12-23</guid>
			<pubDate>Mon, 12 Dec 2011 18:39:18 GMT</pubDate>
		</item>
		<item>
			<title>Hackers hate ads, don&apos;t they?</title>
			<description>Ads are annoying and sometimes flashy animations and images that provide publicity for a product, service, or company. Many users find ads annoying on websites. Some ads even harm your computer by installing small programs that monitor your computer. To prevent this some users choose to block ads. With Mozilla Firefox and an add-on named Adblock Plus you can do it easily. Adblock Plus even blocks the occasional pop-up ad that gets past the Firefox built in blocker. &lt;br /&gt;&lt;br /&gt; Adblock Plus for chrome, firefox, thunderbird can be downloaded from &lt;a class=&quot;link&quot; href=&quot;http://adblockplus.org/en/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; &lt;br /&gt;&lt;br /&gt; Enjoy an ad-free &apos;hacker-type&apos; web browsing experience!</description>
			<content:encoded>Ads are annoying and sometimes flashy animations and images that provide publicity for a product, service, or company. Many users find ads annoying on websites. Some ads even harm your computer by installing small programs that monitor your computer. To prevent this some users choose to block ads. With Mozilla Firefox and an add-on named Adblock Plus you can do it easily. Adblock Plus even blocks the occasional pop-up ad that gets past the Firefox built in blocker. &lt;br /&gt;&lt;br /&gt; Adblock Plus for chrome, firefox, thunderbird can be downloaded from &lt;a class=&quot;link&quot; href=&quot;http://adblockplus.org/en/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; &lt;br /&gt;&lt;br /&gt; Enjoy an ad-free &apos;hacker-type&apos; web browsing experience!</content:encoded>
			<link>https://shehab3451.ucoz.de/news/hackers_hate_ads_don_39_t_they/2011-12-12-22</link>
			<dc:creator>kzshantonu</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/hackers_hate_ads_don_39_t_they/2011-12-12-22</guid>
			<pubDate>Mon, 12 Dec 2011 18:34:13 GMT</pubDate>
		</item>
		<item>
			<title>Find Vulnerabilities in PHP Applications --&gt; PHP Vulnerability Hunter</title>
			<description>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool that can elicit a wide range of exploitable faults in PHP web applications. Since most of the webapplications now a days are on PHP, therefore PHP applications have been one of the major target of&amp;nbsp;hackers, PHP&amp;nbsp;Vulnerability&amp;nbsp;scanner is the same tool that helped detect most of the web application vulnerabilities listed on the advisories page.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;a rel=&quot;nofollow&quot; name=&quot;more&quot; style=&quot;text-decoration: underline; color: rgb(35, 71, 134); outline-width: 0px; outline-style: initial; outline-color: initial; font-family: Georgia, Helvetica, Arial, sans-serif; f...</description>
			<content:encoded>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;PHP Vulnerability Hunter is an advanced automated whitebox fuzz testing tool that can elicit a wide range of exploitable faults in PHP web applications. Since most of the webapplications now a days are on PHP, therefore PHP applications have been one of the major target of&amp;nbsp;hackers, PHP&amp;nbsp;Vulnerability&amp;nbsp;scanner is the same tool that helped detect most of the web application vulnerabilities listed on the advisories page.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;a rel=&quot;nofollow&quot; name=&quot;more&quot; style=&quot;text-decoration: underline; color: rgb(35, 71, 134); outline-width: 0px; outline-style: initial; outline-color: initial; font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;/a&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://2.bp.blogspot.com/-pR6zsVoTRlU/Tsp7x44W8YI/AAAAAAAAAUI/GSu6waOshro/s1600/PHP-VH-Launcher.png&quot; style=&quot;text-decoration: none; color: rgb(0, 0, 153); outline-width: 0px; outline-style: initial; outline-color: initial; font-weight: bold; font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;img alt=&quot;&quot; id=&quot;yiv1232899868BLOGGER_PHOTO_ID_5677486377266508162&quot; src=&quot;http://2.bp.blogspot.com/-pR6zsVoTRlU/Tsp7x44W8YI/AAAAAAAAAUI/GSu6waOshro/s320/PHP-VH-Launcher.png&quot; style=&quot;border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; display: block; height: 317px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; text-align: center; width: 368px; &quot; border=&quot;0&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;Like all the best tools in the world, this also needs little or no configuration at all, and doesn&apos;t require a user specified starting URI. So, you can begin scanning as soon as you download and install this software.&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;The tool itself runs on a pretty basic mechanism. At the core of the PHP Vulnerability Hunter scan algorithm is dynamic program analysis. It analyzes the program as it’s running to get a clear view of all input vectors ergo better code coverage leading to greater confidence in code security.&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;div class=&quot;yiv1232899868separator&quot; style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); clear: both; text-align: center; &quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-PKCcG5E9B-4/TsrPuBuZzrI/AAAAAAAABis/92Ysz3rRI6Q/s1600/PHPVHReportViewer-2.png&quot; style=&quot;text-decoration: none; color: rgb(0, 0, 153); outline-width: 0px; outline-style: initial; outline-color: initial; font-weight: bold; margin-left: 1em; margin-right: 1em; &quot;&gt;&lt;img src=&quot;http://3.bp.blogspot.com/-PKCcG5E9B-4/TsrPuBuZzrI/AAAAAAAABis/92Ysz3rRI6Q/s640/PHPVHReportViewer-2.png&quot; style=&quot;border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-width: initial; border-color: initial; &quot; border=&quot;0&quot; height=&quot;374&quot; width=&quot;577&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;This new version brings to us many improvements such as:&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;ul style=&quot;margin-top: 1em; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 1em; list-style-type: square; list-style-position: initial; list-style-image: initial; font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Added code coverage report&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Updated GUI validation&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Several instrumentation fixes&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Fixed lingering connection issue&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Fixed GUI and report viewer crashes related to working directory&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;And its key features include:&lt;/span&gt;&lt;br style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;ul style=&quot;margin-top: 1em; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 1em; list-style-type: square; list-style-position: initial; list-style-image: initial; font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Automated input vector discovery&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Integrate fault detection&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Minimal configuration&lt;/li&gt;&lt;li style=&quot;margin-bottom: 1em; margin-left: 1em; &quot;&gt;Proven effective.&lt;/li&gt;&lt;/ul&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://code.google.com/p/php-vulnerability-hunter/downloads/list&quot; style=&quot;text-decoration: none; color: rgb(0, 0, 153); outline-width: 0px; outline-style: initial; outline-color: initial; font-weight: bold; font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1322211582_2&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Georgia, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; background-color: rgb(255, 255, 255); &quot;&gt;&amp;nbsp;PHP Vulnerability v1.1.4.6&lt;/span&gt;</content:encoded>
			<link>https://shehab3451.ucoz.de/news/find_vulnerabilities_in_php_applications_php_vulnerability_hunter/2011-11-25-21</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/find_vulnerabilities_in_php_applications_php_vulnerability_hunter/2011-11-25-21</guid>
			<pubDate>Fri, 25 Nov 2011 09:01:00 GMT</pubDate>
		</item>
		<item>
			<title>Wireless Hacking</title>
			<description>Wireless networks broadcast their packets using radio 
 frequency or optical wavelengths. A modern laptop computer can listen in. 
 Worse, an attacker can manufacture new packets on the fly and persuade wireless 
 stations to accept his packets as legitimate.&lt;br&gt;
 The step by step procerdure in wireless hacking can be explained with help 
 of different topics as follows:-&lt;br&gt;&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;1) Stations and Access 
 Points :-&lt;/strong&gt; A wireless network interface card (adapter) 
 is a device, called a station, providing the network physical layer over 
 a radio link to another station.&lt;br&gt;
 An access point (AP) is a station that provides frame distribution service 
 to stations associated with it. &lt;br&gt;
 The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 
 32 byte long Service Set Identifier (SSID) that is also commonly called 
 a network name. The SSID is used to segment the airwaves for usage.&lt;br&gt;&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;2) Channels...</description>
			<content:encoded>Wireless networks broadcast their packets using radio 
 frequency or optical wavelengths. A modern laptop computer can listen in. 
 Worse, an attacker can manufacture new packets on the fly and persuade wireless 
 stations to accept his packets as legitimate.&lt;br&gt;
 The step by step procerdure in wireless hacking can be explained with help 
 of different topics as follows:-&lt;br&gt;&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;1) Stations and Access 
 Points :-&lt;/strong&gt; A wireless network interface card (adapter) 
 is a device, called a station, providing the network physical layer over 
 a radio link to another station.&lt;br&gt;
 An access point (AP) is a station that provides frame distribution service 
 to stations associated with it. &lt;br&gt;
 The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 
 32 byte long Service Set Identifier (SSID) that is also commonly called 
 a network name. The SSID is used to segment the airwaves for usage.&lt;br&gt;&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;2) Channels :-&lt;/strong&gt; The stations 
 communicate with each other using radio frequencies between 2.4 GHz and 
 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks 
 using neighboring channels may interfere with each other.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;3) Wired Equivalent Privacy (WEP) :-&lt;/strong&gt; 
 It is a shared-secret key encryption system used to encrypt packets transmitted 
 between a station and an AP. The WEP algorithm is intended to protect wireless 
 communication from eavesdropping. A secondary function of WEP is to prevent 
 unauthorized access to a wireless network. WEP encrypts the payload of data 
 packets. Management and control frames are always transmitted in the clear. 
 WEP uses the RC4 encryption algorithm.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;4) Wireless Network Sniffing :-&lt;/strong&gt; 
 Sniffing is eavesdropping on the network. A (packet) sniffer is a program 
 that intercepts and decodes network traffic broadcast through a medium. 
 It is easier to sniff wireless networks than wired ones. Sniffing can also 
 help find the easy kill as in scanning for open access points that allow 
 anyone to connect, or capturing the passwords used in a connection session 
 that does not even use WEP, or in telnet, rlogin and ftp connections.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;5 ) Passive Scanning :-&lt;/strong&gt; Scanning is 
 the act of sniffing by tuning to various radio channels of the devices. 
 A passive network scanner instructs the wireless card to listen to each 
 channel for a few messages. This does not reveal the presence of the scanner. 
 An attacker can passively scan without transmitting at all. &lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;6) Detection of SSID :-&lt;/strong&gt; The attacker 
 can discover the SSID of a network usually by passive scanning because the 
 SSID occurs in the following frame types: Beacon, Probe Requests, Probe 
 Responses, Association Requests, and Reassociation Requests. Recall that 
 management frames are always in the clear, even when WEP is enabled.&lt;br&gt;
 When the above methods fail, SSID discovery is done by active scanning 
 
 &lt;br&gt;&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;7) Collecting the MAC Addresses :-&lt;/strong&gt; 
 The attacker gathers legitimate MAC addresses for use later in constructing 
 spoofed frames. The source and destination MAC addresses are always in the 
 clear in all the frames.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;8) Collecting the Frames for Cracking WEP 
 :-&lt;/strong&gt; The goal of an attacker is to discover the WEP shared-secret key. 
 The attacker sniffs a large number of frames An example of a WEP cracking 
 tool is AirSnort ( http://airsnort.shmoo.com ).&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;9) Detection of the Sniffers :-&lt;/strong&gt; Detecting 
 the presence of a wireless sniffer, who remains radio-silent, through network 
 security measures is virtually impossible. Once the attacker begins probing 
 (i.e., by injecting packets), the presence and the coordinates of the wireless 
 device can be detected.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;10) Wireless Spoofing :-&lt;/strong&gt; There are 
 well-known attack techniques known as spoofing in both wired and wireless 
 networks. The attacker constructs frames by filling selected fields that 
 contain addresses or identifiers with legitimate looking but non-existent 
 values, or with values that belong to others. The attacker would have collected 
 these legitimate values through sniffing.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;11) MAC Address Spoofing :-&lt;/strong&gt; The attacker 
 generally desires to be hidden. But the probing activity injects frames 
 that are observable by system administrators. The attacker fills the Sender 
 MAC Address field of the injected frames with a spoofed value so that his 
 equipment is not identified.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;12) IP spoofing :-&lt;/strong&gt; Replacing the true 
 IP address of the sender (or, in rare cases, the destination) with a different 
 address is known as IP spoofing. This is a necessary operation in many attacks.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;13) Frame Spoofing :-&lt;/strong&gt; The attacker 
 will inject frames that are valid but whose content is carefully spoofed.&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;&lt;br&gt;
 14) Wireless Network Probing :-&lt;/strong&gt; The attacker then sends artificially 
 constructed packets to a target that trigger useful responses. This activity 
 is known as probing or active scanning.&lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;&lt;br&gt;
 15) AP Weaknesses :-&lt;/strong&gt; APs have weaknesses that are both due to design 
 mistakes and user interfaces&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;16) Trojan AP :-&lt;/strong&gt; An attacker sets 
 up an AP so that the targeted station receives a stronger signal from it 
 than what it receives from a legitimate AP.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;17) Denial of Service :-&lt;/strong&gt; A denial 
 of service (DoS) occurs when a system is not providing services to authorized 
 clients because of resource exhaustion by unauthorized clients. In wireless 
 networks, DoS attacks are difficult to prevent, difficult to stop. An on-going 
 attack and the victim and its clients may not even detect the attacks. The 
 duration of such DoS may range from milliseconds to hours. A DoS attack 
 against an individual station enables session hijacking.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;18) Jamming the Air Waves :-&lt;/strong&gt; A number 
 of consumer appliances such as microwave ovens, baby monitors, and cordless 
 phones operate on the unregulated 2.4GHz radio frequency. An attacker can 
 unleash large amounts of noise using these devices and jam the airwaves 
 so that the signal to noise drops so low, that the wireless LAN ceases to 
 function.&lt;br&gt;
 &lt;br&gt;
 &lt;strong style=&quot;color:#0033FF&quot;&gt;19) War Driving :-&lt;/strong&gt; Equipped with wireless 
 devices and related tools, and driving around in a vehicle or parking at 
 interesting places with a goal of discovering easy-to-get-into wireless 
 networks is known as war driving. War-drivers (http://www.wardrive.net) 
 define war driving as &quot;The benign act of locating and logging wireless 
 access points while in motion.” This benign act is of course useful 
 to the attackers. &lt;br&gt;
 Regardless of the protocols, wireless networks will remain potentially 
 insecure because an attacker can listen in without gaining physical access.&lt;br&gt;
 &lt;br&gt;
 
 &lt;table align=&quot;center&quot; width=&quot;100%&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td align=&quot;right&quot; width=&quot;21%&quot;&gt;&lt;img src=&quot;http://insecure.in/images/tips.gif&quot;&gt;&lt;/td&gt;
 &lt;td align=&quot;center&quot;&gt;&lt;strong style=&quot;color:#0033FF&quot;&gt;Tips for Wireless Home 
 Network Security&lt;/strong&gt;&lt;/td&gt;&lt;td align=&quot;left&quot; width=&quot;22%&quot;&gt;&lt;img src=&quot;http://insecure.in/images/tips.gif&quot;&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br&gt;
 &lt;strong&gt;1)&lt;/strong&gt; Change Default Administrator Passwords (and Usernames)&lt;br&gt;
 &lt;strong&gt;2)&lt;/strong&gt; Turn on (Compatible) 
 WPA / WEP Encryption&lt;br&gt;
 &lt;strong&gt;3)&lt;/strong&gt; Change the Default SSID&lt;br&gt;
 &lt;strong&gt;4)&lt;/strong&gt; Disable SSID Broadcast 
 &lt;br&gt;&lt;strong&gt;5)&lt;/strong&gt; Assign Static IP Addresses to Devices&lt;br&gt;&lt;strong&gt;6)&lt;/strong&gt; Enable MAC Address Filtering 
 &lt;br&gt;&lt;strong&gt;7)&lt;/strong&gt; Turn Off the Network During Extended Periods of Non-Use&lt;br&gt;
 &lt;strong&gt;8)&lt;/strong&gt; Position the Router or Access Point Safely
 &lt;br&gt;</content:encoded>
			<link>https://shehab3451.ucoz.de/news/wireless_hacking/2011-10-17-20</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/wireless_hacking/2011-10-17-20</guid>
			<pubDate>Mon, 17 Oct 2011 13:36:51 GMT</pubDate>
		</item>
		<item>
			<title>Doxing : The Other name For Password Hacking</title>
			<description>Doxing is the process of getting information about a person by using the
 resources on the Internet using other skills. Doxing derived from the 
word &quot;document&quot; which in the brief that is making &quot;Documents&quot; on a 
person or company. &lt;br&gt;&lt;br&gt;There are several ways to obtain personal information online. The most popular method is through a website called &lt;a href=&quot;http://www.pipl.com/&quot;&gt;Pipl&lt;/a&gt;.
 Pipl allows you to search the full name, email, user name and even a 
phone number though. So that makes Pipl become a very useful tool for 
hackers. &lt;br&gt;&lt;br&gt;Another source hackers can be used is through social networking site &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;.
 But most hackers do not use Facebook to search for the name, they just 
use it to search their email address, since names are often in short or 
fake. &lt;br&gt;&lt;br&gt;Doxing main objective is to find the email address of the 
target. Because, Email basically serves as a passport when registering 
at a website. There is personal infor...</description>
			<content:encoded>Doxing is the process of getting information about a person by using the
 resources on the Internet using other skills. Doxing derived from the 
word &quot;document&quot; which in the brief that is making &quot;Documents&quot; on a 
person or company. &lt;br&gt;&lt;br&gt;There are several ways to obtain personal information online. The most popular method is through a website called &lt;a href=&quot;http://www.pipl.com/&quot;&gt;Pipl&lt;/a&gt;.
 Pipl allows you to search the full name, email, user name and even a 
phone number though. So that makes Pipl become a very useful tool for 
hackers. &lt;br&gt;&lt;br&gt;Another source hackers can be used is through social networking site &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;.
 But most hackers do not use Facebook to search for the name, they just 
use it to search their email address, since names are often in short or 
fake. &lt;br&gt;&lt;br&gt;Doxing main objective is to find the email address of the 
target. Because, Email basically serves as a passport when registering 
at a website. There is personal information in it, and if someone has 
access to the email, they can pretend to be the owner of an online 
email. &lt;br&gt;&lt;br&gt;If a hacker can see the accounts up, or he may find a few
 other bits of personal information using Pipl, he can do what is called
 the recovery account username and password that is returned by 
answering some questions that the proposed e-mail provider. &lt;br&gt;&lt;br&gt;This
 method is more effective than we imagine, especially for those who 
rarely update the username and password. Doxers tend to spend a few 
moments of time on the web for information they can use. &lt;br&gt;&lt;br&gt;This 
method can work effectively Doxing purely based on the ability of 
hackers to recognize the valuable information about the target and use 
this information to his interests. It is also based on the idea that, 
&quot;The more you know about your target, the easier it will find 
shortcomings.&quot; Then how do you ensure that you will not be in Doxed?</content:encoded>
			<link>https://shehab3451.ucoz.de/news/doxing_the_other_anme_for_password_hacking/2011-09-20-19</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/doxing_the_other_anme_for_password_hacking/2011-09-20-19</guid>
			<pubDate>Tue, 20 Sep 2011 13:24:34 GMT</pubDate>
		</item>
		<item>
			<title>Nokia Cable Drivers</title>
			<description>When installing USB Nokia cable driver, some users have trouble finding 
the right driver for cell phone type. Various output drivers in the 
trial, but to no avail and the phone still can not connect to the 
computer. &lt;br&gt;&lt;br&gt;Driver Nokia Connectivity Cable 
Rel 6824 is perhaps appropriate to the type of your Nokia mobile phone 
USB. In several trials, the drive type is always compatible with any 
mobile phone type. &lt;br&gt;&lt;br&gt;To Install are: &lt;br&gt;1. Unplug your phone and 
remove the cable driver and PC Suite Nokia phones are already installed 
on your computer through the Uninstall or also via the Control Panel 
-&amp;gt; Add Remove Programs.&lt;br&gt; &lt;br&gt;2. Once the process is complete, download drivers Nokia &lt;a href=&quot;http://saving.berita86.com/2011/04/all-type-cable-drives-for-nokia.html&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;3. Install Driver has been downloaded earlier, and then re-install PC Suite. &lt;br&gt;&lt;br&gt;4. Mobile Cable Install. Finish!</description>
			<content:encoded>When installing USB Nokia cable driver, some users have trouble finding 
the right driver for cell phone type. Various output drivers in the 
trial, but to no avail and the phone still can not connect to the 
computer. &lt;br&gt;&lt;br&gt;Driver Nokia Connectivity Cable 
Rel 6824 is perhaps appropriate to the type of your Nokia mobile phone 
USB. In several trials, the drive type is always compatible with any 
mobile phone type. &lt;br&gt;&lt;br&gt;To Install are: &lt;br&gt;1. Unplug your phone and 
remove the cable driver and PC Suite Nokia phones are already installed 
on your computer through the Uninstall or also via the Control Panel 
-&amp;gt; Add Remove Programs.&lt;br&gt; &lt;br&gt;2. Once the process is complete, download drivers Nokia &lt;a href=&quot;http://saving.berita86.com/2011/04/all-type-cable-drives-for-nokia.html&quot;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;3. Install Driver has been downloaded earlier, and then re-install PC Suite. &lt;br&gt;&lt;br&gt;4. Mobile Cable Install. Finish!</content:encoded>
			<link>https://shehab3451.ucoz.de/news/nokia_cable_drivers/2011-09-20-17</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/nokia_cable_drivers/2011-09-20-17</guid>
			<pubDate>Tue, 20 Sep 2011 13:01:23 GMT</pubDate>
		</item>
		<item>
			<title>Make Flash Drive Virus Immune</title>
			<description>lash drive is currently a manual storage media are most effective. So do
 not be surprised if the flash drive is also a most effective medium for
 distributing viruses as well. Here&apos;s how to flash drives become immune 
to the virus.&lt;br&gt;&lt;br&gt;1. Format the flash drive.&lt;br&gt;&lt;br&gt;2. Create a folder in your flash drive, and give &quot;autorun.inf&quot; Name (without the quotes).&lt;br&gt;&lt;br&gt;3.
 Go into the folder you just created and make a notepad document 
therein. Right click, select NEW&amp;gt; TEXT DOCUMENT. Give any name for 
the file you just created. This name will we replace with some special 
characters.&lt;br&gt;&lt;br&gt;4. Then, we will open Character Map program that is in START&amp;gt; ALL PROGRAMS&amp;gt; ACCESORIES&amp;gt; SYSTEM TOOLS&amp;gt; CHARACTER MAP.&lt;br&gt;&lt;br&gt;5.
 Select an existing font like Arial unicode, Unicode or Lucida Sans 
Unicode. Scroll down until you see the letters of the Japanese, Korean, 
Chinese, or other strange characters.&lt;br&gt;&lt;br&gt;6. Select 4 or 5 characters that you want, then click copy.&lt;br&gt;&lt;br&gt;7.
 R...</description>
			<content:encoded>lash drive is currently a manual storage media are most effective. So do
 not be surprised if the flash drive is also a most effective medium for
 distributing viruses as well. Here&apos;s how to flash drives become immune 
to the virus.&lt;br&gt;&lt;br&gt;1. Format the flash drive.&lt;br&gt;&lt;br&gt;2. Create a folder in your flash drive, and give &quot;autorun.inf&quot; Name (without the quotes).&lt;br&gt;&lt;br&gt;3.
 Go into the folder you just created and make a notepad document 
therein. Right click, select NEW&amp;gt; TEXT DOCUMENT. Give any name for 
the file you just created. This name will we replace with some special 
characters.&lt;br&gt;&lt;br&gt;4. Then, we will open Character Map program that is in START&amp;gt; ALL PROGRAMS&amp;gt; ACCESORIES&amp;gt; SYSTEM TOOLS&amp;gt; CHARACTER MAP.&lt;br&gt;&lt;br&gt;5.
 Select an existing font like Arial unicode, Unicode or Lucida Sans 
Unicode. Scroll down until you see the letters of the Japanese, Korean, 
Chinese, or other strange characters.&lt;br&gt;&lt;br&gt;6. Select 4 or 5 characters that you want, then click copy.&lt;br&gt;&lt;br&gt;7.
 Rename the text file that you created in step 2 above. Right-click on 
the file, select rename, then press [CTRL] + [V]. The file name was 
changed. Do not be surprised if later on you will see characters such as
 boxes or other signs.&lt;br&gt;&lt;br&gt;8. Change the attributes of a super hidden
 autorun.inf folder. Open a command prompt, then enter the drive where 
you saved the flash drive. After that, type attrib + s + h autorun.inf.&lt;br&gt;&lt;br&gt;The
 steps above is in the logic underlying that Windows can not read the 
two files with the same name. Because in our existing flash drive 
autorun.inf name, another file can not enter, so the virus could not use
 the name autorun.inf</content:encoded>
			<link>https://shehab3451.ucoz.de/news/make_flash_drive_virus_immune/2011-09-20-16</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/make_flash_drive_virus_immune/2011-09-20-16</guid>
			<pubDate>Tue, 20 Sep 2011 12:59:06 GMT</pubDate>
		</item>
		<item>
			<title>How Hackers Hack</title>
			<description>&lt;div id=&quot;articleText&quot;&gt;
 
 
 
 
 


 

 
&lt;div&gt;&lt;p&gt;With the click of a mouse on one computer, the screen of the 
laptop a few feet away flashes wildly as a flood of data flies silently 
across a private network cable connecting the two machines. Within a 
minute the laptop&apos;s file sharing password is compromised.&lt;/p&gt;&lt;p&gt;&quot;The 
computer is having a bad day,&quot; says a reporter as he watches the effect 
of the attack on his machine. &quot;Packets are coming at it so fast, the 
firewall doesn&apos;t know what to do.&quot;&lt;/p&gt;&lt;p&gt;Some hackers claim they can 
teach a monkey how to hack in a couple of hours. We asked two hackers, 
Syke and Optyx (at their request, we are using their hacking pseudonyms 
rather than their real names), to give us non-simian reporters a 
demonstration.&lt;/p&gt;&lt;p&gt;What we got was a sometimes-frightening view of how
 easily nearly anyone&apos;s computer--at home or at work, protected or 
not--can be cracked by a determined hacker. But we also found out that 
computer users can make a hacker&apos;s job m...</description>
			<content:encoded>&lt;div id=&quot;articleText&quot;&gt;
 
 
 
 
 


 

 
&lt;div&gt;&lt;p&gt;With the click of a mouse on one computer, the screen of the 
laptop a few feet away flashes wildly as a flood of data flies silently 
across a private network cable connecting the two machines. Within a 
minute the laptop&apos;s file sharing password is compromised.&lt;/p&gt;&lt;p&gt;&quot;The 
computer is having a bad day,&quot; says a reporter as he watches the effect 
of the attack on his machine. &quot;Packets are coming at it so fast, the 
firewall doesn&apos;t know what to do.&quot;&lt;/p&gt;&lt;p&gt;Some hackers claim they can 
teach a monkey how to hack in a couple of hours. We asked two hackers, 
Syke and Optyx (at their request, we are using their hacking pseudonyms 
rather than their real names), to give us non-simian reporters a 
demonstration.&lt;/p&gt;&lt;p&gt;What we got was a sometimes-frightening view of how
 easily nearly anyone&apos;s computer--at home or at work, protected or 
not--can be cracked by a determined hacker. But we also found out that 
computer users can make a hacker&apos;s job much harder by avoiding a few 
common mistakes.&lt;/p&gt;&lt;p&gt;Syke, a 23-year-old a white Hat Hacker, and Optyx, a 19-year-old self-proclaimed Black HAt,
 both work in computer security (Syke, until recently, for a well-known 
security software vendor; Optyx for an application service provider). &lt;/p&gt;&lt;p&gt;They
 launch their attack on our notebook from desktop computers located in 
the windowless basement that is New Hack City, a sort of hacker 
research-and-development lab (and part-time party lounge).&lt;/p&gt;&lt;p&gt;The 
lab&apos;s rooms are filled with over a dozen Sun SPARC servers, assorted 
network hubs and mountains of ethernet cable, an arcade-size Ms. Pac Man
 game, and a DJ tower stocked with music-mixing equipment for all-night 
hacker jams.&lt;/p&gt;&lt;p&gt;The methods hackers use to attack your machine or network are fairly 
simple. A hacker scans for vulnerable systems by using a demon dialer 
(which will redial a number repeatedly until a connection is made) or a 
wardialer (an application that uses a modem to dial thousands of random 
phone numbers to find another modem connected to a computer). &lt;/p&gt;&lt;p&gt;Another
 approach used to target computers with persistent connections, such as 
DSL or cable connections, employs a scanner program that sequentially 
&quot;pings&quot; IP addresses of networked systems to see if the system is up and
 running.&lt;/p&gt;&lt;p&gt;Where can a hacker find such tools? On the Internet, of course.&lt;/p&gt;&lt;p&gt;Sites
 containing dozens of free, relatively easy-to-use hacking tools 
available for download are easy to find on the Net. While understanding 
how these tools work is not always easy, many files include homegrown 
documentation written in hacker shoptalk. &lt;/p&gt;&lt;p&gt;Among the programs 
available are scanning utilities that reveal the vulnerabilities on a 
computer or network and sniffing programs that let hackers spy on data 
passing between machines.&lt;/p&gt;&lt;p&gt;Hackers also use the Net to share lists 
of vulnerable IP addresses--the unique location of Internet-connected 
computers with unpatched security holes. Addresses of computers that 
have already been loaded with a Trojan horse are available for anyone to
 exploit (in many cases without the owner of the computer knowing). &lt;/p&gt;&lt;p&gt;Once
 the hacker finds a machine, he uses a hacker tool such as Whisker to 
identify in less than a second what operating system the machine is 
using and whether any unpatched holes exist in it. Whisker, one of a 
handful of legitimate tools used by system administrators to test the 
security of their systems, also provides a list of&amp;nbsp;&lt;a href=&quot;http://www.pcworld.com/features/article/0,aid,44370,00.asp&quot;&gt;&lt;/a&gt;exploits the hacker can use to take advantage of these holes. &lt;br&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;WAIT FOR THE NEXT PART&lt;/b&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;
 
 
 

 &lt;/div&gt;</content:encoded>
			<link>https://shehab3451.ucoz.de/news/how_hackers_hack/2011-09-20-15</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/how_hackers_hack/2011-09-20-15</guid>
			<pubDate>Tue, 20 Sep 2011 12:16:06 GMT</pubDate>
		</item>
		<item>
			<title>theregister.co.uk hacked by T.G</title>
			<description>Here is one of the most shocking news of today, One of the biggest News 
website Theregister.co.uk has been hacked few minutes before from Now, 
The website was not hacked by any traditional web application attacks 
like SQL Injection, Remote File Inclusion or local file inclusion, 
However DNS Hijacking or DNS redirection attack was used. &amp;nbsp;The website 
was hacked by&amp;nbsp;Turkguvenligi who is also known as TG hacker and is also 
responsible for the major website&amp;nbsp;defacements in the pasts including 
Microsoft, Dell and other big websites.&lt;br&gt;
&lt;br&gt;
&lt;div class=&quot;yiv1202186684separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-m839kgQ6w7A/TmPlZQw8NTI/AAAAAAAABak/l3XT7jBUh9w/s1600/Untitled+%25281%2529.png&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img src=&quot;http://1.bp.blogspot.com/-m839kgQ6w7A/TmPlZQw8NTI/AAAAAAAABak/l3XT7jBUh9w/s640/Untitled+%25281%2529.png&quot; width=&quot;577&quot; border=&quot;0&quot; height=&quot;271&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;
&lt;a rel=&quot;no...</description>
			<content:encoded>Here is one of the most shocking news of today, One of the biggest News 
website Theregister.co.uk has been hacked few minutes before from Now, 
The website was not hacked by any traditional web application attacks 
like SQL Injection, Remote File Inclusion or local file inclusion, 
However DNS Hijacking or DNS redirection attack was used. &amp;nbsp;The website 
was hacked by&amp;nbsp;Turkguvenligi who is also known as TG hacker and is also 
responsible for the major website&amp;nbsp;defacements in the pasts including 
Microsoft, Dell and other big websites.&lt;br&gt;
&lt;br&gt;
&lt;div class=&quot;yiv1202186684separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://1.bp.blogspot.com/-m839kgQ6w7A/TmPlZQw8NTI/AAAAAAAABak/l3XT7jBUh9w/s1600/Untitled+%25281%2529.png&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img src=&quot;http://1.bp.blogspot.com/-m839kgQ6w7A/TmPlZQw8NTI/AAAAAAAABak/l3XT7jBUh9w/s640/Untitled+%25281%2529.png&quot; width=&quot;577&quot; border=&quot;0&quot; height=&quot;271&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;br&gt;
&lt;a rel=&quot;nofollow&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br&gt;
If you would check the hackers &lt;a id=&quot;yui_3_2_0_1_1315207816680396&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://zone-h.org/archive/notifier=turkguvenligi.info&quot;&gt;zone-h record&lt;/a&gt;&amp;nbsp;,
 You will find that this hacker only goes after major websites, It&apos;s 
quite sad to see that even major websites don&apos;t pay proper attention to 
their website security.&lt;br&gt;
&lt;br&gt;
&lt;div id=&quot;yui_3_2_0_1_1315207816680393&quot; class=&quot;yiv1202186684separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;a rel=&quot;nofollow&quot; target=&quot;_blank&quot; href=&quot;http://3.bp.blogspot.com/-xzTCzvwpNDw/TmPnVelWyZI/AAAAAAAABao/ViXMaopxsyk/s1600/DNS.png&quot; style=&quot;margin-left:1em;margin-right:1em;&quot;&gt;&lt;img src=&quot;http://3.bp.blogspot.com/-xzTCzvwpNDw/TmPnVelWyZI/AAAAAAAABao/ViXMaopxsyk/s640/DNS.png&quot; width=&quot;577&quot; border=&quot;0&quot; height=&quot;334&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;yiv1202186684separator&quot; style=&quot;clear:both;text-align:center;&quot;&gt;&lt;br&gt;
&lt;/div&gt;&lt;div id=&quot;yui_3_2_0_1_1315207816680397&quot; class=&quot;yiv1202186684separator&quot; style=&quot;clear:both;text-align:left;&quot;&gt;From
 the above screenshot, you can clearly see that the hacker has 
redirected the name servers of register.co.uk to his own name server.&lt;/div&gt;</content:encoded>
			<link>https://shehab3451.ucoz.de/news/theregister_co_uk_hacked_by_t_g/2011-09-05-14</link>
			<dc:creator>shehab3451</dc:creator>
			<guid>https://shehab3451.ucoz.de/news/theregister_co_uk_hacked_by_t_g/2011-09-05-14</guid>
			<pubDate>Mon, 05 Sep 2011 08:34:10 GMT</pubDate>
		</item>
	</channel>
</rss>