Nowadays DoS and DDoS attacks become very popular among the hackers and worm writers. MyDoom and Blaster are the examples for this. In this article we see what is DoS and DDoS attacks and how they can be misused while denying services.
If we ask developers about the SQL injection attacks, the examples known to them are the most basic ones, like the ones existing in the login forms. However, the OWASP 2010 vulnerability list (http://www.owasp.org/images/0/0f/OWASP_T10_-_2010_rc1.pdf) clearly puts the injection vulnerabilities on the top. The SQL injection vulnerabilities may exist at anyplace in the applications where the interaction with the database is involved. Now, if you are a developer, you might need to exercise your mind, that where your application is interacting with the database, after reading this article hopefully.
Disclaimer
The information provided in this article is purely for educational purpose and for computer security awareness. The views expressed in this article are purely based on my experience and does not reflect the views of my present or past employers. The author does not promote computer hacking in any way or the misuse of this information against any individual or organization. Computer hacking and identity theft is a punishable offense. The author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by the use of information provided in this article. By reading this article you agree to those terms.
Introduction
We are living in the cyber age. Computers are being used in some of the most important places. Just as we are concerned about our physical security, we must have a basic awareness of security for our cyber presence as well. There is a saying that a similarity exists between a successful magic trick and a successful hack. After the act, everyone has one mystery question: How did you do that? This article attempts to throw light on one of the most common way of information theft - keystroke logging.
Welcome to the world of hacking. Past decade has completely changed the way we live and perform our day to day work. Life in internet age is easy, simpler but vulnerable.
In the beginning it was fun for people to find loop holes in computers and show-off there skills. It was fun to write viruses and pop a friendly “happy birthday to me” message on your computer. Then came the age of writing viruses to harm people delete data on your machine infect your boot sector and propagate through floppy. It was followed by age of internet, whole new range of hacking tricks evolved.
WordPress is a free and open source blogging tool and a dynamic content management system (CMS) based on PHPand MySQL. It has many features including a plug-in architecture and a template system. WordPress is used by over 14.7% of Alexa Internet's "top 1 million" websites and as of August 2011 manages 22% of all new websites. WordPress is currently the most popular CMS in use on the Internet.
It was first released on May 27, 2003, by Matt Mullenweg as a fork of b2/cafelog. As of December 2011, version 3.0 had been downloaded over 65 million times.
Features of shared Web hosting
Usually, when you join a shared Web hosting plan, the hosting company gives you a number of facilities, such as a Web-based control panel for managing your site, some usage statistics, and email accounts. Nearly all Web hosting plans include at least the following: