Web Application Security – SQL Injection
December 31st, 2012 📆 | 2438 Views ⚑
SQL Injection is a big application flaw. It’s important to know because it can shatter your dreams, so here is
December 31st, 2012 📆 | 2438 Views ⚑
SQL Injection is a big application flaw. It’s important to know because it can shatter your dreams, so here is
December 30th, 2012 📆 | 1578 Views ⚑
Hello, I’m a motion designer based in Athens, Greece. I always wanted to make the move from fusion to after
December 30th, 2012 📆 | 8620 Views ⚑
Produced by: The Test Shot Camera: LGW Sound: Jamie Pallas Many thanks to: Barbers: Felix Bear Lane Greygory James Vass
December 29th, 2012 📆 | 4483 Views ⚑
SecureMic is a simple and effective smartphone application designed to prevent your private conversations from being eavesdropped on, either through
December 29th, 2012 📆 | 7655 Views ⚑
Speaker: Luka Milkovic Aside from further development of traditional forensic techniques which involve post-mortem hard disk analysis, in the last
December 28th, 2012 📆 | 5261 Views ⚑
ex1) Database automatically search # cd /pentest/database/sqlmap # ./sqlmap.py -u “http://example.com/index.php?id=1″ –user-agent=”-” –dbs ex2) Selecting a Database # cd /pentest/database/sqlmap
December 26th, 2012 📆 | 2361 Views ⚑
Download for free: http://bit.ly/PhotoZoomPro5Free All photographers at some point need to play around with digital image sizing. Many users need
December 24th, 2012 📆 | 7865 Views ⚑
Marajin, Realshard and a random extra who joined as we waited for Kitsuna77 to turn up do battle in honour
December 24th, 2012 📆 | 1906 Views ⚑
Microsoft SQL Server fingerprinting can be a time consuming process, because it involves trial and error methods to determine the
December 24th, 2012 📆 | 2170 Views ⚑
(Full Movie Now Out! https://vimeo.com/69695831) This is the 20 minute preview reel of the DEFCON Documentary, a film about the
December 23rd, 2012 📆 | 6359 Views ⚑
Features of Xenotix XSS Exploit Framework Built in XSS Payloads XSS Key logger XSS Executable Drive-by downloader Automatic XSS Testing
December 22nd, 2012 📆 | 4612 Views ⚑
I would like to share with you a collection of books about hacking and hacking techniques…. All books are in
December 21st, 2012 📆 | 4374 Views ⚑
Computer Security Expert: Singularity University’s Keren Elazari – Full talk from Wired 2012 For the full story on computer security
December 21st, 2012 📆 | 6123 Views ⚑
Want the ultimate malware-proof system?This is almost as good as it gets. The test was carried out on Windows 7
December 20th, 2012 📆 | 1866 Views ⚑
video, sharing, camera phone, video phone, free, upload 2012-12-20 12:05:20 source
December 19th, 2012 📆 | 3241 Views ⚑
In this interview, George Kurtz, CrowdStrike co-founder and CEO, and former CTO of McAfee, discusses how CrowdStrike has built development
December 19th, 2012 📆 | 6714 Views ⚑
SQL Injection & LFI shell upload Anti-armenia.Org 2012-12-19 16:09:42 source
December 19th, 2012 📆 | 4726 Views ⚑
On January 28, 2011, the Egyptian government, after three days of massive anti-regime protests, mostly organized through social networks, switched
December 19th, 2012 📆 | 7969 Views ⚑
Computer virus and worm are malicious code. The security threats and measures are described in this episode. To learn more
December 18th, 2012 📆 | 2122 Views ⚑
Um breve vídeo que gravei no servidor de testes da Game Campus, atual responsável pelo servidor “Global” de RF. Este
Comments