How To Defend An Input Validation Attack

defend input validation attacks

Input Validation Attacks: It is one of the very ‘easy to implement’ attack. It injects malicious scripts into an application and by running such application the system can be attacked and it becomes vulnerable. It is even hard to defend than passive attacks. Following are some of the best countermeasures against input validation attacks: Application … Read moreHow To Defend An Input Validation Attack

Passive Attack Gathering and the Tools Required

passive-attacking-gathering

Passive attack gathering is one of the Pre-attack stage where attacker collects information about his victim. It is also known as footprinting.This attack is done on big organization having very large network. It is the method by which we collect information about structure under organizational network. We sort of predict the flow of network by … Read morePassive Attack Gathering and the Tools Required

What is Stegnography? – Way The Hackers Hide Files

Stegnography is the method by which data or files can be hidden in Image files or any other type of file. Well, Purpose can vary according to user. E.g: We can send a stegnographic message to our friend by email  which can be secretly shared only between you and your friend. If any other person … Read moreWhat is Stegnography? – Way The Hackers Hide Files

Green Planet Campaign

green planet campaign

www.hackersenigma.com is announcing a green planet campign with three of partners named www.geniushackers.com, www.hackingethics.com, www.hiddentechno.co.cc and Youth Hackers Club. Under this campign we are creating a website named www.greenplanetcampaign.com This website will providing you database about Green Buildings and other construction techniques. With this there is also a section about green IT concepts and implementations. … Read moreGreen Planet Campaign

Network Security: Replicated Services (For Corporates)

One of the most convenient methods of securing private data is using ‘‘Replicated services”. This method is actually done for backing up your data. We have to create two or more systems (or networks) having same function. These are used for performing same work. Both the systems are exact replicas of each other. Advantages: 1. … Read moreNetwork Security: Replicated Services (For Corporates)

Trojans | File Binding: Its Like Mixing Poison In A Drink

file binding trojans joining

I am continuing the Trojans introduction to little advanced version in this post. Read the first part of this post, What are Trojans and how to prevent them? As I already told you that there are two parts in trojan . One is server and other is client. The hacker have client installed on his … Read moreTrojans | File Binding: Its Like Mixing Poison In A Drink

What are Trojans? – History, Prevention, Explanation

what are trojans history prevention

Trojans History: According to the history, Trojans are the most harmful tool ever developed by the hackers, Back in 1998 the first Trojan named subseven was released and created a new history in the world of hackers. How Trojans Enter into System? Trojans actually comes from the file with dual extensions. Dual extensions mean one … Read moreWhat are Trojans? – History, Prevention, Explanation

Track IP-Address Just by Sending an E-mail

Track IP address

IP address: In this world everyone has some address having all details about your location in real life. In the same way, Every internet user have his address in the world of internet. It is named as Internet Protocol address. Shortly named as IP address When you send/receive emails they are transferred from IP address … Read moreTrack IP-Address Just by Sending an E-mail