Skip to main content

Posts

Showing posts from 2014

100,000+ WordPress Websites infected By SoakSoak Malware

WordPress is the Best Content Management System (CMS) and number of bloggers and internet marketers uses WordPress CMS for their blog because of its simplicity and awesomeness. But Recently more than 100,000 WordPress websites/blogs are affected by the SoakSoak Malware. And millions of websites on the internet are currently using WordPress and this Malware can be the great threat. How to know whether your WordPress websites are infected by SoakSoak Malware ? Once you are infected with this Malware then you might experience some unexpected redirection to SoakSoack.ru and you will end up downloading malicious files in your computer without your knowledge.   Google (The Search Engine giant) has added more than 10,000+ WordPress websites to their blacklisted sites to protect the users and that can effect the revenue of the website owners. What dose SoakSoak Malware do to your WordPress Website/blog ? The SoakSoak Malware simply modifies the php f

How To Stop People From Being Able To See That You Read Their Facebook Message

We all probably have a friend or two with an iPhone who chooses to leave their "Read receipts" on so you can tell when they've read a text. A lot of people think read receipts are the worst, which is why it's great that Apple allows you to turn them off. Facebook however, does not. When you read someone's Facebook message, they'll always know, seeing the specific time or just the date of when you read the message, depending on when they look back at it themselves. Quite frankly, sometimes you just want to be able to let someone assume that you missed their note. But that "Seen" check-mark makes it impossible to fake: Turns out, there actually  is  a way to disable Facebook read receipts, though not technically through Facebook. You can't avoid read receipts on mobile, but there are a few ways to essentially turn them off on desktop. W Unseen  is a free Facebook app that will let you secretly read messages without the sender

How to Bypass Whatsapp “Message Read” Confirmation

World’s most popular messaging service just got an update today which now sends a confirmation to the other person when a message is read in a conversation. The previously grey tickmarks now turn to blue as soon as a person reads the messages. We found a solution to bypass this!  This is what the new Whatsapp tickmarks are all about : The social pressure to reply to a message might be greater if someone knows if you have actually read a message or not, making some people uncomfortable so instead of all that, we have found a simple solution to avoid making your tickmarks turning blue! Here’s a trick you can follow to avoid whatsapp sending message read confirmation : When you receive a whatsapp message while you’re online or on your lock screen, don’t open it at first, let it get received with two grey tickmarks Switch off all your mobile internet and Wi-Fi Open whatsapp and read the conversation close the conversation, come back home and turn your Wi-Fi again

If programming languages were weapons

C  is a sniper - good if you know how to use it but get one pointer wrong and you shoot your allies C++  is a set of nunchuks, powerful and impressive when wielded but takes many years of pain to master and often you probably wish you were using something else. Perl  is a molotov cocktail, it was probably useful once, but few people use it now. Java  is a belt fed 240G automatic weapon where sometimes the belt has rounds, sometimes it doesn’t, and when it doesn’t during firing you get an NullPointerException, the gun explodes and you die. Scala  is a variant of the 240G Java, except the training manual is written in an incomprehensible dialect which many suspect is just gibberish. JavaScript  is a sword without a hilt. Go  is the custom made “if err != nil” starter pistol and after each shot you must check to make sure it actually shot. Also it shoots tabs instead of blanks. Rust  is a 3d printed gun. It may work some day. bash  is a cursed hammer, w

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go

How Heartbleed Works: The Code Behind the Internet's Security Nightmare

By now you've surely heard of Heartbleed,the hole in the internet's security that exposed countless encrypted transactions to any attacker who knew how to abuse it. But how did it actually work? Once you break it down, it's actually incredibly simple. And a little hilarious. But mostly terrifying. You can read our overview of Heartbleed here, but in general terms it's a flaw in something called OpenSSL, a security protocol that lets your computer and a server know they are who they say they are. It left major sites like Yahoo, Flickr, and Imgur vulnerable to data theft for years. It's pretty scary stuff, and worth a closer look. Fortunately, it's out there for everyone to see. The beauty of an open-source project like OpenSSL is that anyone can look at code; there's no way to hide anything in there on purpose. In fact, you can see precisely where Heartbleed was born and where it was fixed, even though you might not be able to make heads or tails of it.

How to Download Torrent Using Internet Download Manager

Hello friends, today I will show you the way to download torrents with  Internet Download Manager .  1. First download the torrent file with .torrent extension which you wish to  download from  the internet directly without any torrent client like  utorrent . 2. Now open  zbigz.com  and you will land on its  homepage . 3. Then Click on upload Torrent and browse your torrent to transfer and click on Go. 4. Then it will ask you  for Free  or Premium service, choose Free to proceed further. 5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.   - H@cK$t@r!

5 Common Mistakes That Fresh Hackers Make

1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work. 2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these. 3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker. 4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to use software only then you would also be limited by the software’s functionalities. 5. A good hacker is a good programmer, security expert, developer and good script writer. It is usually not the other way around. You must known this for cross site scripting like P So, hacking is not simply about making your way into websites and leaving your mark. You have a great set of talent