All for Joomla All for Webmasters
Home Tags OTHERS

Tag: OTHERS

others

Linux Essential Root Subdirectories

In this article, let us review the Linux filesystem structures (linux essential root subdirectories) and understand the meaning of individual high-level directories. root contains...

Exploit with OS Command Injection

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application....

Indian Ministry of Home Affairs website hacked

The Ministry of Home Affairs website was hacked today, prompting authorities to temporarily block it, an official said. The MHA website was immediately blocked by...

Bypass HTTP Basic Authentication with Nmap and Metasploit

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user...

Saudi Arabia again hit with disk-wiping malware Shamoon 2

Saudi Arabia has issued a warning to local organizations that the Shamoon virus that had hit state-held oil giant Saudi Aramco in 2012 has...

How to configure Proxychains with tor in Kali Linux

The goal of this tutorial is to configure proxychains with tor in Kali Linux in order to anonymize all the web traffic including network...

Google Bangladesh hacked by Pakistani hackers

Google’s Bangladesh domain came under attack by some Pakistani hackers. The said hackers altered the domain address in BTCL’s DNS entry to redirect users...

Introduction to HTTP Parameter Pollution

HTTP Parameter Pollution, or HPP, occurs when a website accepts input from a user and uses it to make an HTTP request to another system...

Massive DDOS attack against Dyn DNS knocked out Popular Websites

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host...

What is HTTP request/response header?

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider's...

Russia no longer denies hacking DNC

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks...

Server-Side Includes (SSI) Injection

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later...

Earn $1.5 million for hacking iPhone

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a...

What is Man-in-the-middle attack (MITM)

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker...
increase blog traffic

36 Ways to Increase Blog Traffic Without Investing on Ads

Below described scenarios are truly researched from Authentic and well-known resources, who grew their blog traffic up to 100,000 in just a month. You...