Internet shutdown on July 9 2012 and DNSChanger malware attack                                      
Your Ad Here

 
 
Here’s How to Download Windows 8 Release Preview Right Now


Want to get the latest version of Windows 8 right now? This one is called the Release Preview, and it’s available for download right now. There’s a lot of little bugs resolved, the multi-monitor support has improved, and you should download it now.

You can grab the regular installer, or you can get the ISO image and use it in a virtual machine.

Download Windows 8 Release Preview in ISO format

Download the Windows 8 Release Preview

If you want a quick way to install it without messing up your partitions, you can read our guide on seamlessly dual-booting Windows 7 and Windows 8 the easy way, which uses the VHD boot feature to install with a virtual hard drive.


 
Nowadays DoS and DDoS attacks become very popular among the hackers and worm writers. MyDoom and Blaster are the examples for this. In this article we see what is DoS and DDoS attacks and how they can be misused while denying services.


 
If we ask developers about the SQL injection attacks, the examples known to them are the most basic ones, like the ones existing in the login forms. However, the OWASP 2010 vulnerability list (http://www.owasp.org/images/0/0f/OWASP_T10_-_2010_rc1.pdf) clearly puts the injection vulnerabilities on the top. The SQL injection vulnerabilities may exist at anyplace in the applications where the interaction with the database is involved. Now, if you are a developer, you might need to exercise your mind, that where your application is interacting with the database, after reading this article hopefully.    

 

Disclaimer

The information provided in this article is purely for educational purpose and for computer security awareness. The views expressed in this article are purely based on my experience and does not reflect the views of my present or past employers. The author does not promote computer hacking in any way or the misuse of this information against any individual or organization. Computer hacking and identity theft is a punishable offense. The author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by the use of information provided in this article. By reading this article you agree to those terms.

Introduction

We are living in the cyber age. Computers are being used in some of the most important places. Just as we are concerned about our physical security, we must have a basic awareness of security for our cyber presence as well. There is a saying that a similarity exists between a successful magic trick and a successful hack. After the act, everyone has one mystery question: How did you do that? This article attempts to throw light on one of the most common way of information theft - keystroke logging.


 
Welcome to the world of hacking. Past decade has completely changed the way we live and perform our day to day work. Life in internet age is easy, simpler but vulnerable.
In the beginning it was fun for people to find loop holes in computers and show-off there skills. It was fun to write viruses and pop a friendly “happy birthday to me” message on your computer. Then came the age of writing viruses to harm people delete data on your machine infect your boot sector and propagate through floppy. It was followed by age of internet, whole new range of hacking tricks evolved.